“These courses expects a high standard of professionalism from its students with regard to how security testing is conducted. We expect all students to act in good faith at all times […]”
TL;DR Don’t be mean
Have a look at the guidelines here
Choose one of the principles of Handling Digital Evidence and explain its importance in a practical sense
What could go wrong if it isn’t followed?
What is an ethical repercussion you could imagine of not adhering to this principle?
Demo: disk acquisition
Where could you look for hidden information on a drive?
Read more here
Would it be harder to carve files on a SSD or HDD, why?
What is a file?
fileWhat does the file command in Linux does?
Does it just look at the extension?
The first few bytes of a file indicate its “type”
file just reads these bytes (a MIME-type check)nWhy do we need file systems?

FAT: linked list of statuses of all clusters
| status | indicates |
|---|---|
0x?0000000 | free cluster |
0x?0000002 | cluster in use (value is next cluster for file) |
0x?FFFFFFF | cluster in use EOF marker |
What happens to file contents when a file is deleted?
What else happens (specifically in FAT?)
0xE50x00Why are these important
demo: undeletion
demo: file recovery
$MFT (DEs of NTFS)
$BITMAP (FATs of NTFS)
Everything is a file™
Everything in a file is an attribute

Read more here
$MFT marks $FILE entry as available$DATA attribute read, $BITMAP updated to show cluster runs no longer used$MFT or clustersUntil the FILE entry is overwritten, the data is still there
demo: usb capacity spoofing
Investigation