DFIR Flashcards

(50 cards)

1
Q

DF

A

Digital Forensics: Examining and analyzing artifacts after a cyberattack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IR

A

Incident Response: Performing actions when a cyber event occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DFIR

A

Investigate and respond to a cyberattack after an incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat Hunting

A

Active defense. Proactively search for threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IRP

A

Incident Response Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Stages of Incident Response Planning

A

Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DFIR Process

A

Collect Evidence, Examine Collected Data, Analyze Important Artifacts, Report the Findings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DF Analysis Types

A

Dead Analysis (powered off computers)
Live Analysis (powered on computers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Targeted Artifacts

A

Files on a Drive, Memory Artifacts, Processes, Log Files, Cached Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Acquisition Tools

A

dd (data Dump): Drive Acquisition
FTK Imager: Drive and Memory Acquisition
DumpIt: Memory Acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Non-Repudiation

A

Provides proof of the origin and integrity of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RACI

A

Responsible, Accountable, Consulted, Informed
Used to assigned roles and responsibilities for each incident alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NIST

A

National Institution of Standards and Technology
Government agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SANS

A

Private organization. Offers research and education in the field of information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DRP

A

Disaster Recovery Plan
Outlines response strategies for unplanned events. Helps minimize the effects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data Acquisition Recommendations

A

Memory before drive acquisition
Memory captures are better is user is logged on
Use sterilized media
Document the capture properly
System interaction should be minimal
Capture to an external source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Full Clone

A

The closest option to having the actual drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Logical Image

A

Narrows the search field. Some evidence may be spread across multiple partitions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Capture Formats

A

RAW, ISO, EWF, dd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Clonezilla

A

Linux distribution for cloning drives. Not typically for forensic purposes.
Can clone over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

FTK Imager

A

Part of Forensic Toolkit Suite. Clone drive through interactive wizard

22
Q

Forensic Image Formats

A

E01: Provides compression per file checksum and password protection
AFF: Stores the imaged disk as compressed segments for better saving and metadata of the image

23
Q

Autopsy

A

Uses forensic tools from The Sleuth Kit. Created cases for captures

24
Q

Image Splitting

A

Virtualization software may split a drive into multiple files. Splitting is done to increase read and write speeds

25
History
Includes entered URLs and webpages marked as favorites
26
Cache
Files, images, scripts, and other media-related data
27
Prefetch Files
Applications executed in Windows create prefetch filed The files are used as cache for loading time optimization
28
Power Forensics
Add-on to PowerShell and is a Forensics framework Works with FAT and NTFS and can be launched from live systems Depends mostly on the MFT (Master File Table)
29
PowerForensics Operation Modes
Live System and Mounted Drive Errors can occur if the drive is lager than 2TB
30
PowerForensics Analysis Capabilities
Boot and Partitions, NTFS and EXT4, Windows Artifacts, Windows Registry, Application Cache
31
Boot Record types
MBR: Supports up to 4 partitions per storage device and only with storage devices up to 2 TB GPT: Supports up to 16 exabytes and supports up to 128 partitions
32
NTFS Specialties
Journaling: Recording storage device activity Indexing: Enables quick access to files stored on devices Alternate Data Stream (ADS): More than one resource included in a single file
33
File Carving
Reassembles files from fragments when no metadata is available. Can be used to recover partially overwritten files
34
Memory Analysis 6 Investigation Steps
Processes, DLL & Handles, Network, Code Injection, Rootkits, Dump
35
Network Investigation: Network Connections
Connscan: Scans for identifiable TCP connections in older versions of Windows (Netscan can be used in more recent versions of Windows) Sockets: Scans for all open sockets
36
Logs
Automatically created to sore records of events
37
Log Classification
Informational, Debug, Warning, Error, Alert
38
Log Attacks- What to Attack
Host which logs are generated, Transmitted logs, Agents that collect logs, Database in which logs are stored
39
Threat Hunting
Proactive approach to handling cyberattacks. Aims to protect an organization from covert cyberthreats
40
Threat Intelligence
Based on learning from other's mistakes. Forensic researchers can learn about new exploration techniques from public sources
41
IOC
Indicators of Compromise. Help determine is an organization was harmed by a threat that was implemented. Can be used to distinguish false positives.
42
Malware Forensics Suspicious Behavior
Increased Traffic, Accessed File Types, Service Inspection, Domain Identification, Persistence
43
Zeek
Framework used to parse, normalize, and correlate logs. Focuses on extracting security-related information from logs to detect anomalies.
44
Malware Analysis
Describes all actions, methods, and tools used to identify and study malicious behavior.
45
Reverse Engineering
The process of deconstructing an executable to reveal its design, architecture, and activity
46
Static Analysis
Can provide a lot of info even without executing the code. Used to identify IoC's
47
Binwalk
Static Malware Analysis tool. Enables identification of magic byte patterns in a file.
48
DLL
Dynamic Linked Library: A Windows file containing code and data that can be used by another program
49
Dynamic Analysis
Methodology based on executing malware. Used to analyze malware's behavior and impact on the system
50
Monitored Data
File System Changes, Network Activity, Registry Changes