5A. Digital Forensics Techniques obj 4.4, 5.3 Flashcards

1
Q

Forensic Procedure

A

1) Identification
2) Collection
3) Analysis
4) Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Identification
A
  • ensure scene is safe
  • secure scene to prevent contamination
  • identify scope of evidence to be collected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

2) collection

A
  • ensure authorisation to collect evidence
  • use tools/methods that will withstand legal scrutiny
  • document and prove integrity of evidence
  • store evidence in secure packaging
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3) Analysis

A
  • create verifiable copy of evidence for analysis
  • use repeatable methods
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

4) Reporting

A
  • create report of methods/tools used
  • present findings/conclusions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Legal hold

A

refers to the fact that information that may be relevant to a court case must be preserved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

work product retention

A

refers to the way in which a forensic examiner is retained (hired) to investigate a case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Acquisition

A

the process of obtaining a forensically clean copy of data from a device held as evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Order of volatility

A

1) CPU registers and cache memory
2) RAM (incl, routing table, ARP cache, process table, kernel stats, temp file systems/virtual memory)
3) Persistent storage (HDD, SSD, flash)
4) Remote logging and monitoring data
5) Physical configuration and network topology
6) Archival media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Forensics software

A
  • Encase (case management)
  • Forensic Toolkit (FTK)
  • Sleuth kit (open-source, command line tools, disk imaging and file analysis)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why use Bit-by-Bit copies instead of using Copy command?

A

to ensure that slack space and unallocated space are both copied as part of the image. This captures deleted files that have not yet been overwritten, fragments of older files, and data that was stored on a drive before it was partitioned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tool for making bit-by-bit clones of drives…

A

dd utility in Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do system memory dump file reveal?

A
  • running processes
  • temp file contents
  • registry data
  • network connections
  • cryptographic keys
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Disk Image Acquisition methods:

A

1) Live
- copying data with computer running
- not legally sound
2) Static (by shutting down)
- risk malware will detect the shutdown process and perform anti-forensics
3) Static (by pulling the plug)
- legally sound, but may corrupt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Write blocker

A

Forensic tool to prevent the capture or analysis device or workstation from changing data on a target disk or media.
- hardware blocker more popular

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Issue with MD5

A

No longer considered secure as there are ways to exploit collisions. Still used by some: - faster than SHA
- more compatible with other tools

17
Q

Why is hashing and validation important?

A
  • To verify the integrity of an image to demonstrate that it has not been tampered with or changed from its original state
  • To validate binaries (file containing code, libraries, drivers) to detect (malicious) changes to the binaries
18
Q

Carving

A

The process of recovering data that has been deleted where there us no associated file system metadata. A file-carving tool analyses the disk at sector/page level and attempts to piece together data fragments from unallocated and slack space to reconstruct deleted files

19
Q

Chain of custody

A

reinforces the integrity and proper custody of evidence from collection, to analysis, to storage, and finally to presentation