Research Article

Investigation Methodology of a Virtual Desktop Infrastructure for IoT

Table 13

Comparison of hash values for various tools.

IndexOriginal virtual
hard disk
Copy of virtual
hard disk
Result

EnCaseC69289228xxxxxx64C4D1298xxxxxxMismatch
FTKC5F64F49CxxxxxxC5F64F49CxxxxxxMatch
X-Way ForensicsC5F64F49CxxxxxxC5F64F49CxxxxxxMatch