DAY 03 · LAB PROJECT 015 HOURS · 2-3-3 PONDERATIONDUE · MIDNIGHT EST · SUN MAY 3, 2026OPEN-TOOL POLICY
First Response & Evidence Handling
A hands-on lab project for the cumulative Incident Management portfolio. Five hours of work — not five hours of reading — to secure a digital crime scene, capture volatile and persistent evidence, and produce a five-page research report a lawyer could actually use.
5 hWorking time
2 + 3 + 3Weighting
5 ppA4 deliverable
1 / 9Portfolio chapter
What you'll hand in
One ZIP, five things inside
Submit to the LMS — Learning Management System — on or before the due date.
report.pdf — the graded 5-page report + cover
case-archive.tar.gz — sealed evidence directory
master_sha256.txt — integrity hash of the archive
coc_form.pdf — completed and signed chain of custody
ir_notebook.txt — full unedited responder notebook
!
Read this before you touch a virtual machine. Every technique below is taught for the academic objective of preparing students to defend networks and respond to incidents inside their own employer or client engagement. The procedures stay strictly inside virtual machines you control on your own laptop. Use against any system you do not own — or do not have explicit, written authorisation to test — is unlawful. The instructor and Cyber.SoHo Educational Hub are not responsible for use of these techniques outside the lab boundary defined in the Disclaimer section at the bottom of this page.
Overview
How this lab fits into your nine-week portfolio
Each week of the Incident Management course produces one chapter of your final individual project. Today's report becomes your Chapter 1 — write it cleanly enough that the version you bind at the end of term is the version you submit tonight.
Week
Chapter (your portfolio section)
2
Securing Crime Scenes & Collecting Digital Evidence ← this lab
3
Malware Detection, Analysis & Containment
4
Analysing Email Headers & Tracing Attacks
5
Mid-Term Review
6
Mid-Term Examination
7
Network Traffic Analysis & Incident Validation
8
Detecting & Eradicating Insider Activity
9
Mobile & IoT (Internet of Things) Forensics and Analysis
10
Final Review and Examination
📌 The five-hour rule
Five hours of work, not five hours of reading. Read this whole brief once, fast — call it a 20-minute warm-up that does not eat your budget. The clock starts when you open your terminal for Step A.1.
If you reach the five-hour mark before completing every step, stop and submit what you have. A partial, well-documented response is graded; a complete but rushed and undocumented one is not.
Learning objectives
By the moment you upload your ZIP, you will be able to:
Secure a digital crime scene to a defensible standard before any evidence is touched.
Capture volatile and non-volatile digital evidence in the order recommended by the IETF in RFC 3227 — Guidelines for Evidence Collection and Archiving.
Hash each captured artefact with SHA-256 (Secure Hash Algorithm, 256-bit) and record the hash on a chain-of-custody form.
Document every action with the 5W+H discipline (Who, What, Where, When, Why, How) in a contemporaneous IR (Incident Response) notebook.
Produce a five-page professional research report with proper screenshots, hyperlinks, copyright-safe images, and academic citations.
Time spent installing software does not count against your five-hour budget. Set everything up the day before, snapshot both VMs (Virtual Machines), and verify network reachability between them. If you cannot snapshot, you are not ready.
Target VM ("the victim") — Ubuntu 22.04 LTS (Long Term Support) Desktop with at least 2 GB RAM and 20 GB disk.
Shared folder on your host laptop named lab03_evidence/ — this represents the removable USB drive in the scenario; share it into the responder VM as a read-write mount.
Plain-text editor that does not auto-format — Notepad++, VS Code, or nano.
Every tool listed in this lab is a suggestion, not a requirement. If you prefer QEMU/KVM over VirtualBox, use it. If you want to write your own evidence-capture script in Go, Rust, or Python instead of Bash — please do, and explain your choice in the report. The lab grades the process, not the toolset.
The scenario you will work in
NorthBridge Health Cooperative · Tuesday, 28 April 2026
A small, fictional clinic in the lab simulation. Any resemblance to a real organisation, patient, or ransomware family is coincidental — the names, dates, and IP addresses below are invented for didactic purposes.
Case ID: CASE-NBH-2026-04-28-001
Reported: 08:51 local · 13:51 UTC
Affected user: "Anna" (office manager)
Suspected nature: Ransomware
NorthBridge Health Cooperative is a small medical clinic with 28 staff and a single Linux file server. On the morning of Tuesday, 28 April 2026, the office manager — Anna — arrives at her desk at 08:47 local time and finds her Ubuntu workstation showing an unfamiliar terminal window. The text on the screen reads:
Your files have been visited.
Do not turn off this computer.
Wait for further instructions.
Several patient appointment files on the shared drive return a "permission denied" error from her terminal. Anna calls the IT (Information Technology) helpdesk at 08:51. You are the on-call first responder.
Your task for the next five hours: secure the scene, collect digital evidence in a forensically sound manner, and produce a five-page report that the clinic's lawyer can hand to the Agencia Española de Protección de Datos (AEPD) within the seventy-two-hour breach-notification window mandated by Article 33 of the GDPR — the General Data Protection Regulation.
The "Anna's workstation" in this scenario is your Target VM. You will simulate the responder workflow against it from your Responder VM.
Time budget at a glance
Part
Title
Weight
Working time
A
Securing the digital crime scene
2 / 8
≈ 60 min
B
Collecting digital evidence
3 / 8
≈ 120 min
C
Writing the 5-page research report
3 / 8
≈ 120 min
Total
8 / 8
300 min · 5 h
⚒
Open tools, open techniques, open creativity
Every command, library, and workflow that follows is one defensible way to reach the lab outcome. You are encouraged to substitute any of them with a tool you find yourself in the open-source ecosystem, a script you write from scratch, or a method described in a paper you have read. The point of the exercise is the discipline of the response, not loyalty to any particular utility.
Research thoroughly — read the RFC, read the NIST guide, read recent DFIR (Digital Forensics and Incident Response) blog posts from SANS, read the FIRST incident handler guidelines — then make your own choices and defend them in the report.
A
Part A · ≈ 60 minutes
Securing the digital crime scene
Establish the scene before anything is touched: define perimeter, document state, restrict access, identify evidence sources. You will not touch the keyboard of the target VM until Part B.
2 / 8 POINTS5 STEPS · A.1 → A.5
A.1
Set up the lab clock and your IR notebook
10 MIN
Open a terminal on your responder VM and confirm the system clock is in UTC (Coordinated Universal Time). Every timestamp in your notebook from this point forward must be UTC — local time is forbidden.
Bashresponder VM · check & set clock
# expected output similar to: Tue Apr 28 13:47:00 UTC 2026$ date -u
# if your VM is on local time, switch it$ sudo timedatectl set-timezone UTC
Create your case directory on the shared folder, then create the IR notebook file:
Bashcase directory bootstrap
$ mkdir -p ~/lab03_evidence/CASE-NBH-2026-04-28-001/{notebook,volatile,nonvolatile,photos,custody}
$ cd ~/lab03_evidence/CASE-NBH-2026-04-28-001
$ touch notebook/ir_notebook.txt
Make the first three entries in the notebook now. Use this exact entry format — copy it; do not invent your own:
Notebookir_notebook.txt — first three entries
=== ENTRY 0001 ===
WHEN : 2026-04-28T13:47:00Z
WHO : <Your Full Name>, Student ID <…>, Cyber.SoHo Lab Project 01
WHAT : Started case file CASE-NBH-2026-04-28-001
WHERE : Responder VM (Kali 2025.4) on host laptop
WHY : Anna at NorthBridge Health called helpdesk at 08:51 local;
suspect ransomware on her Ubuntu workstation
HOW : Created /home/<user>/lab03_evidence/CASE-NBH-2026-04-28-001/
=== ENTRY 0002 ===
WHEN : 2026-04-28T13:48:30Z
WHO : <Your Full Name>
WHAT : Confirmed Responder VM clock is on UTC
WHERE : Responder VM
WHY : All evidence timestamps must be UTC per Lesson 4
HOW : `date -u` returned <paste literal output here>
=== ENTRY 0003 ===
WHEN : 2026-04-28T13:50:00Z
WHO : <Your Full Name>
WHAT : About to take baseline photograph of Target VM screen
WHERE : Target VM console (no input yet)
WHY : Preserve scene-as-found before any interaction
HOW : Will use host-OS screenshot tool, save to photos/00_scene_as_found.png
Discipline reminder
From here on, write at least one notebook entry before every step. Forgot? Add it retrospectively — but mark it as such with both WHEN-RETRO: and WHEN-LOGGED: timestamps. Never silently fix the past — that is the difference between a defensible record and a fabricated one.
A.2
Photograph the scene-as-found
10 MIN
Without clicking anything on the target VM, capture three baseline images:
Full-screen screenshot of the target VM's current state → photos/00_scene_as_found.png
Screenshot of the target VM's network adapter settings (right-click VM → Settings → Network) → photos/01_network_settings.png
Screenshot of the responder VM terminal showing date -u output and the directory listing → photos/02_responder_baseline.png
Hash each image and add the hash to the matching notebook entry.
Two months from now, in a hearing or audit, the question will be: "has this image been edited since the night of the response?" The hash printed in your notebook entry is the answer.
A.3
Establish the logical perimeter
15 MIN
Isolate the target VM from the public internet without powering it off. In your virtualisation platform, change the target VM's network adapter from NAT (Network Address Translation) or Bridged to Internal Network named crime-scene. The VM stays running but cannot phone home to a C2 (Command and Control) server.
Move the responder VM onto the same internal network so you keep reachability. Both VMs now share crime-scene; both are isolated from your home network and the public internet.
Bashverify isolation from responder
# adapt the range to your internal network$ nmap -sn 192.168.99.0/24
Capture photos/03_isolation_before.png and photos/04_isolation_after.png with hashes and notebook entries for every change.
A.4
Identify and label evidence sources
15 MIN
Walk the responder through this checklist; in your notebook record yes / no for each, with a one-line justification. This is your evidence-source inventory.
#
Potential evidence source
In scope today?
1
Target VM RAM (live process memory)
yes / no
2
Target VM running processes list
yes / no
3
Target VM open network connections
yes / no
4
Target VM logged-in users
yes / no
5
Target VM /var/log/ system logs
yes / no
6
Target VM /etc/ configuration files
yes / no
7
Target VM /home/anna/ user directory
yes / no
8
Target VM full disk image
yes / no
9
Network packet capture from crime-scene LAN (Local Area Network)
yes / no
10
Office camera footage
yes / no (out of lab scope)
For each yes, name the tool you intend to use, the output filename, and the sequential evidence ID — EVIDENCE-001, EVIDENCE-002, and so on. Save the inventory as nonvolatile/evidence_inventory.md; this becomes Appendix A of your report.
A.5
Build the chain-of-custody form
10 MIN
Inside custody/, create coc_form.md using the template below. You will fill it in as Part B progresses; it does not need to be complete at the end of Part A.
Markdowncustody/coc_form.md — template
CHAIN OF CUSTODY FORM
=====================
Case ID : CASE-NBH-2026-04-28-001
Case description: Suspected ransomware incident at NorthBridge Health Cooperative
Custody opened : 2026-04-28T13:47:00Z
Custody closed : <to be filled at end of Part B>
Acquiring person : <Your full name>, Student ID <…>
Affiliation : Cyber.SoHo Educational Hub / Schiller International University
EVIDENCE MANIFEST
-----------------
| Item ID | Filename | Type | SHA-256 | Acquired (UTC) |
|---------------|----------------|------|-----------------------------|-----------------------|
| EVIDENCE-001 | | | | |
| EVIDENCE-002 | | | | |
| ... | | | | |
TRANSFER LOG
------------
| Date/Time (UTC) | From | To | Method | Initials |
|-----------------------|---------------|-----------------|------------|----------|
| 2026-04-28T13:47:00Z | (acquisition) | <Your initials> | first cap. | |
INTEGRITY DECLARATION
---------------------
I declare that the evidence above was acquired in accordance with IETF RFC 3227,
ISO/IEC 27037:2012, and NIST SP 800-61 Rev. 2 procedures, and that the SHA-256
hashes were computed at the time of acquisition.
Signed: ________________________ Date: ________________________
Marker for Part A
When Part A is finished you should have: a populated case directory; an IR notebook with at least eight numbered entries; four to six baseline photographs (each hashed); a completed evidence-source inventory; and a chain-of-custody template ready to fill in.
B
Part B · ≈ 120 minutes
Collecting digital evidence
Climb the volatility pyramid. For every artefact: capture, hash, log, transfer, repeat. The original is sacred — analysis runs on a copy.
3 / 8 POINTSRFC 3227 ORDER
Part B follows the order of volatility prescribed by IETF RFC 3227. For each artefact you will: (1) capture it on the target VM, (2) push it to the responder over SCP (Secure Copy Protocol), (3) hash it on the responder with SHA-256, (4) record the hash on the chain-of-custody form, and (5) add a notebook entry. Every capture in this part is performed from the responder VM, over the internal network.
One-time SSH-key push
On the target VM, as Anna, run ssh-copy-id <responder_user>@<responder_ip> once. From that point you can scp files to the responder without typing a password.
B.1 — Capture volatile evidence (60 min)
1
Process table
ps -auxef --forest — what is running, in what parent-child tree
2
Network connections
ss -tunap · lsof -i -nP — every open socket and the process behind it
3
Logged-in users
who -a · last · w — who is on the box, who has been on it
4
Open files
lsof — every file descriptor held by every process
5
ARP & routing
ip neigh · ip route — neighbours seen, paths taken
6
RAM image
Built using LiME — Linux Memory Extractor — the most important capture in the lab
B.1
Process table, network, users, open files, ARP
21 MIN total · 5 + 5 + 3 + 5 + 3
Each artefact is captured on the target into /tmp/vol/, then pushed to the responder where it is hashed and logged. The EVIDENCE-001 through EVIDENCE-005 identifiers go on the chain-of-custody form in the same order.
Bashtarget VM · capture & push
$ sudo mkdir -p /tmp/vol
# EVIDENCE-001 — process table$ ps -auxef --forest > /tmp/vol/01_processes.txt 2>&1
$ scp /tmp/vol/01_processes.txt <responder>@<ip>:~/lab03_evidence/CASE-NBH-2026-04-28-001/volatile/
# EVIDENCE-002 — network connections$ ss -tunap > /tmp/vol/02_network_connections.txt
$ sudo lsof -i -nP >> /tmp/vol/02_network_connections.txt 2>&1
# EVIDENCE-003 — logged-in users$ who -a > /tmp/vol/03_logged_in.txt
$ last -F -n 50 >> /tmp/vol/03_logged_in.txt
$ w >> /tmp/vol/03_logged_in.txt
# EVIDENCE-004 — open files$ sudo lsof > /tmp/vol/04_open_files.txt 2>&1
# EVIDENCE-005 — ARP and routing$ ip neigh show > /tmp/vol/05_arp_table.txt
$ ip route show >> /tmp/vol/05_arp_table.txt
On the responder, hash each file as it arrives, take a screenshot of the hash output, and log a notebook entry referencing the matching EVIDENCE-XXX identifier:
The most important capture in the whole lab. LiME is a Linux kernel module specifically designed for forensic memory acquisition; it produces an image you can later analyse with Volatility 3.
Bashtarget VM · build LiME and acquire RAM
# 1) Install build prerequisites and clone LiME from upstream$ sudo apt update
$ sudo apt install -y build-essential linux-headers-$(uname -r) git
$ git clone https://github.com/504ensicslabs/lime.git ~/lime
$ cd ~/lime/src
$ make
# 2) Acquire RAM directly to disk in LiME format$ sudo insmod ./lime-$(uname -r).ko "path=/tmp/vol/06_ram.lime format=lime"
$ sudo rmmod lime
$ ls -lh /tmp/vol/06_ram.lime
# 3) Push to responder (1–3 minutes typically)$ scp /tmp/vol/06_ram.lime <responder>@<ip>:~/lab03_evidence/CASE-NBH-2026-04-28-001/volatile/
On the responder: hash as EVIDENCE-006, take two screenshots — one for the hash, one for the file size, since the RAM-image size is itself a piece of evidence. Then add the notebook entry.
Why memory matters more than the disk
Most ransomware encryption keys live in RAM at the moment of detonation. Capturing memory before the malware process completes and exits is often the difference between recovering data and paying. See your Day 02 lecture notes, Lesson 3.
Paste the literal output of cat MANIFEST.sha256 into a notebook entry and record both manifest hashes on the chain-of-custody form.
B.2
Capture non-volatile evidence — targeted, not full disk
45 MIN
Imaging the entire disk would consume the whole five-hour budget. Capture three targeted areas instead: the system-log archive, user-directory metadata, and a sample of the encrypted files.
On the responder, hash as EVIDENCE-010. Then copy the archive into a working directory and extract that copy for analysis. The original in nonvolatile/ is never modified — that is the "original is sacred" principle from the chain-of-custody lecture.
B.2.2 · User-directory file listing (10 min)
Do not copy Anna's whole home directory — it may contain PHI (Protected Health Information). Capture metadata only: filenames, sizes, modification times, hashes.
Hash both as EVIDENCE-011 and EVIDENCE-012; notebook entries for each.
B.2.3 · Three encrypted-file samples (15 min)
Identify three files in 12_anna_filehashes.txt with anomalous extensions — .locked, .encrypted, .crypt — and copy only those three. This minimises PHI exposure while preserving the malicious modification.
Hash each file individually as EVIDENCE-013, EVIDENCE-014, EVIDENCE-015. Screenshots and notebook entries.
B.2.4 · Non-volatile manifest (5 min)
Bashresponder VM
$ cd ~/lab03_evidence/CASE-NBH-2026-04-28-001/nonvolatile/
$ find . -type f -exec sha256sum {} \; > MANIFEST.sha256
B.3
Sealing and closing custody
15 MIN
Compute a master hash that covers the entire case directory:
Bashresponder VM · master archive & hash
$ cd ~/lab03_evidence/
$ tar -czf CASE-NBH-2026-04-28-001.tar.gz CASE-NBH-2026-04-28-001/
$ sha256sum CASE-NBH-2026-04-28-001.tar.gz
Screenshot the master hash → photos/99_master_hash.png; hash the screenshot; log the entry.
Update custody/coc_form.md: set Custody closed to the current UTC timestamp, append the master hash to the integrity declaration, sign your name and date. Final notebook entry: custody is closed; all subsequent work is analysis on a copy.
Marker for Part B
You should have six volatile artefacts (EVIDENCE-001…006), six non-volatile artefacts (EVIDENCE-010…015), two manifests, a master hash, a complete chain-of-custody form, and a notebook with at least 30 entries — every one in UTC, every one with 5W+H.
C
Part C · ≈ 120 minutes
Writing the 5-page A4 research report
A strict 5-page A4 maximum, plus cover. Reports of six pages or more receive zero on Part C. Write it cleanly enough that you bind the same version into your final portfolio at the end of term.
Same family, 13–16 pt bold — do not invent a different font
Line spacing
1.15
Page numbers
Centred footer, Page X of 5
Header (every page)
Left: Cyber.SoHo · Day 03 · Project 01 · Lab Report · Right: your name + student ID
Cover page (page 0, not counted)
Title · your name · student ID · course · instructor · date · Cyber.SoHo logo
C.2 — Required chapters (5 pages total · written in this order)
1
Executive Summary — ½ page · page 1 top
≤ 150 WORDS
One paragraph in plain English: what was the incident, what did you do, what was the most important finding, what is your main recommendation. Write this last but place it first.
2
Lab Environment & Scope — ½ page · page 1 bottom
Host laptop specs, virtualisation platform and version, both VMs (responder + target), the internal network used for isolation, the date, and the responder identity. Include one labelled topology diagram — sketch in draw.io or Excalidraw and export as PNG.
3
Methodology — ~ 1 page · page 2
Numbered subsections describing Part A and Part B. Do not paste raw command output — paste the commands and reference the resulting evidence by its EVIDENCE-XXX identifier. Cite NIST SP 800-61 Rev. 2, RFC 3227, and ISO/IEC 27037:2012. No more than 2 figures in this chapter.
4
Findings & Evidence Summary — ~ 1.5 pages · pages 3 and top of 4
The analytical heart of the report. Provide:
An evidence table with item ID, filename, size, SHA-256 (truncated to first 16 hex characters), brief description.
At most three annotated screenshots of meaningful findings — a suspicious process tree from EVIDENCE-001, an anomalous outbound socket from EVIDENCE-002, the rename pattern in EVIDENCE-013/014/015.
A short narrative connecting the artefacts into a working hypothesis of what happened on Anna's workstation.
5
Discussion & Lessons Learned — ½ page · page 4
What went well, what would you do differently, what was harder than expected, what evidence might exist that you did not capture, what is the next investigative step. Be concrete and self-critical — graders reward honesty here.
Reproduce nonvolatile/evidence_inventory.md from Part A.4. If anything does not fit on page 5, cut it — do not add a page.
C.3 — Screenshots — six rules (15 min)
Crop to the relevant region. Never paste a full 1920×1080 desktop into a report — crop to the terminal, the dialog, the figure region. 600–900 px wide is the sweet spot.
Annotate every screenshot with at least one arrow, box, or callout pointing to the thing the screenshot is about. Use Greenshot, Flameshot, ShareX, or your operating system's built-in markup. Red boxes / yellow arrows are conventional.
Caption every screenshot directly underneath: Figure 1: SHA-256 hash of EVIDENCE-001 captured on the responder VM at 13:55 UTC. Reference figures by number from the body text.
Redact PII / PHI with a solid black rectangle. Never blur — blur can be reversed with publicly available tools.
Format: PNG (Portable Network Graphics) for terminal output and screenshots; JPEG (Joint Photographic Experts Group) for photographs of physical equipment. Never a phone-camera photo of a screen if a digital screenshot is possible.
Resolution: at least 150 DPI (Dots Per Inch). Pandoc and Word downscale by default; verify text readability at the printed size.
Never embed evidence files into the PDF
The 4 GB RAM image does not appear inside report.pdf. You reference it by EVIDENCE-006 and its hash. The PDF stays small, the evidence stays sealed.
C.4 — Hyperlinks (5 min)
Every external URL appears as a clickable hyperlink in the PDF, not as a bare URL pasted into prose.
Use descriptive anchor text — write "NIST SP 800-61 Rev. 2" and link those words; never write "click here".
The full URL must also appear in the References section so a printed copy stays usable.
Click every hyperlink in your final PDF before submission. Broken hyperlinks cost a point.
C.5 — Images — protect the original authors (10 min)
Whenever you use an image you did not create yourself — a logo, an icon, a stock photograph, a diagram from a paper — you must protect the rights of the original author. Only four licence categories are acceptable for this lab:
Source: NIST (US Government work, public domain), <link>
Your own screenshot or your own diagram
You produced it
Source: own work, <date>
Forbidden — automatic zero on Part C
Images saved from a Google Images search whose origin you cannot prove · paid stock photographs without your active licence · movie / TV stills, copyrighted comic-book characters, brand mascots · screenshots from a paid course, paid book, or paywalled website · anything where you cannot identify the licence in writing under the image. If you have any doubt, do not use the image. A diagram you sketched yourself in five minutes in Excalidraw is always preferable to an unattributed image.
C.6 — Pre-submission checklist (10 min)
Walk through this immediately before exporting your PDF:
Document is exactly 5 pages of body + 1 cover page (= 6 PDF pages total)
Every figure has a number and a caption directly underneath
Every figure is referenced by number from the prose at least once
Every image has a "Source:" line beneath it
All abbreviations expanded on first use — RAM (Random Access Memory), RFC (Request for Comments), etc.
All hyperlinks click through to the right destination from inside the PDF
No raw IP addresses or hostnames belonging to your real home network appear in any screenshot
Header and footer present on every page
Page numbers display Page X of 5
Cover page carries the Cyber.SoHo logo and your full identity
Submission
One ZIP to the LMS — five files inside
Filename convention: <lastname>_<firstname>_day03_project01.zip. The Schiller International University LMS clock is the canonical clock — do not depend on your laptop's.
📦 lastname_firstname_day03_project01.zip
└── report.pdf ← the graded 5-page report + cover
└── evidence/CASE-NBH-2026-04-28-001.tar.gz ← sealed case directory
└── evidence/coc_form.pdf ← signed chain of custody
└── notebook/ir_notebook.txt ← full unedited IR notebook
Late policy
The LMS submission window closes at midnight EST on Sunday, May 3, 2026 and re-opens only by request to the instructor for documented serious illness or family emergency. Equipment failure, broken VMs, lost passwords, internet outages, and "I forgot" are not accepted excuses. Submit a partial report by the deadline rather than a complete one after.
Grading rubric — eight points total
Item
Pts
What graders look for
Part A · Securing the scene
2
Lab clock on UTC; case directory present; ≥4 baseline photos hashed; isolation evidence; populated evidence inventory; chain-of-custody template ready.
Part B · Evidence collection
3
Six volatile artefacts in correct order; non-volatile sample correct; every artefact hashed; manifests present; master hash & signed chain of custody.
Part C · Research report
3
Exactly 5 A4 pages + cover; six required chapters; ≤6 annotated & captioned figures; every image attributed; IEEE references; abbreviations expanded; clean PDF; working hyperlinks.
Penalties
−2 pts any unattributed image or image from a forbidden category · −1 pt report body > 5 pages · −1 pt per missing UTC timestamp in the IR notebook · −1 pt any broken hyperlink in the PDF · 0 on Part C if the deliverable is not a PDF.
An invitation
Tools are open. Techniques are open. Be creative.
The lab brief lists one defensible path through a five-hour incident response. It is not the path — it is a path, chosen because it teaches the underlying principles cleanly with a small toolset that fits on a USB key. You are explicitly encouraged to:
Substitute any tool listed in this brief with another open-source equivalent. Prefer Qubes OS over a single Linux VM? Use it. Want to capture memory with c-aff4 instead of LiME? Use it. Prefer Wireshark over tcpdump? Use it.
Write your own scripts — in any language. A Bash script is one option; a Python program with structured logging, a Go binary you compile statically and copy onto a thumb drive, a Rust utility that produces signed hashes — every one of these is welcome. Document the choice in your report and explain the trade-off.
Build your own diagrams. Drawing a topology, flow, or evidence map yourself is faster than searching for one and always cleaner from a copyright perspective.
Question this brief. If you find a step you believe is suboptimal or outdated, write it up in your Discussion chapter with citations. Constructive, well-evidenced critique earns marks; "the instructor was wrong" with no evidence loses them.
★
The grade is on the discipline of the response
What we measure is whether you preserved before you investigated, whether you climbed the volatility pyramid in the right order, whether you hashed and logged contemporaneously, whether your report is a document a regulator could read. The specific binary you used to capture RAM is — to a first approximation — irrelevant.
References
Standards bodies, regulators, tools — every link is a starting point, not a ceiling
Educational use only · authorisation, proportionality, accountability — always
1 · Educational scope & lab boundary
This material is delivered as part of a university-level Incident Management course at Schiller International University through Cyber.SoHo Educational Hub. Every technique described above is taught for the academic objective of preparing students to defend networks and respond to incidents inside their own employer or client engagement, with explicit written authorisation. The procedures must stay strictly inside virtual machines you own and control, on hardware you own. Anything outside that boundary is outside this course's scope.
2 · Instructor protection — no liability for misuse
The instructor and Cyber.SoHo Educational Hub provide this lab in good faith for educational purposes only. Neither the instructor nor Cyber.SoHo Educational Hub accepts liability — civil, criminal, contractual, professional, or reputational — for any use of the techniques described herein outside the authorised lab boundary defined above. Students who deviate from that boundary do so on their own initiative, against the explicit written instruction of the instructor, and bear sole legal and professional responsibility for the consequences.
3 · Open tools, open techniques
Every tool, library, command, framework, and standard cited above is suggested as one defensible path. Students are explicitly encouraged to substitute any of them with open-source alternatives, with their own scripts in any language, or with techniques drawn from their own research. The lab grades the discipline of the response, not loyalty to a particular utility. Students are encouraged to research thoroughly, cross-reference primary sources, and to build their own tools when no off-the-shelf option fits.
4 · Intellectual property & plagiarism
All original lecture text, lab instructions, code, diagrams, and reference tables in this course are the intellectual property of Cyber.SoHo Educational Hub, prepared by the instructor for educational use within affiliated programmes of Schiller International University. Submitted student reports must be each student's own work; the academic-integrity policy of the University applies in full. Students are responsible for citing every external source — text, image, diagram, code snippet — and for using only properly licensed third-party material as defined in Part C.5 above. Failure to attribute is plagiarism and is sanctioned at the institutional level.
5 · No vendor or organisation affiliation
This lab references organisations, regulators, vendors, standards bodies, and software projects for educational illustration. Cyber.SoHo Educational Hub has no affiliation, sponsorship, partnership, or endorsement relationship with any of them. References are factual; trademarks are the property of their respective owners.
6 · Verify before you click
Submit any external URL — including the ones in this lab brief — to VirusTotal before clicking, especially when the link arrives via email, chat, or any forwarded medium. The Cyber.SoHo Educational Hub copyright disclaimer states that even reputable channels can have descriptions edited if an account is compromised. The URL check costs ten seconds and prevents weeks of incident response.
The "NorthBridge Health Cooperative" scenario, the user "Anna", the case identifier CASE-NBH-2026-04-28-001, and any IP addresses, hostnames, or filenames in this brief are fictional. Any resemblance to a real organisation, individual, ransomware family, or attack campaign is coincidental and unintentional.
From the Industry to the Classroom — Building the IT's Future, Today and Together!