Forensics Flashcards

(10 cards)

1
Q

State the 4 types of forensics

A

Disk
Log file
Network
Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are 3 important things to remember when doing disk forensics?

A

Document the state of the system before doing anything
Use a hardware write blocker
Do not change anything on the disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What metadata does encrypted network traffic still leak?

A

Who was communicating with who
Time and duration of communication
Amount of data exchanged
Protocol parameters (e.g. TLS handshake)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe step by step how to perform forensics on a hard drive

A

Document state of system, peripherals, serial numbers, location,
date/time, internal connection of disks
Shut the powered system down
Remove the drive
Use a hardware write blocker
Use second system to image with dedicated software
Take an image of each disk separately
Store hash of the image, write it down
Run your full analysis only on the images you took, reassemble RAID or similar storage in software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

State 6 things you can do with a disk image

A

Recover partition tables
Identify file systems
Determine content of file systems
Use logfiles to create a timeline of events
Check for possibly deleted files
Check for abnormalities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What would partition tables with alignment not used by the OS installer suggest?

A

Maybe the partition was fabricated with another tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What would unusual ordering of data on a drive suggest?

A

The data may have been copied there in one go

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What would no fragments of old data in the free space of a drive suggest?

A

Drive may have been cleaned or cloned from another system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

State 4 advantages of remote logging

A

One central place for all events (correlate events from different machines)
Local attacker cannot modify/delete
Diskless systems are possible
Last messages from a system that died

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

State 3 disadvantages of remote logging

A

Some protocols are unencrypted:
data might be exposed
Some don’t support authentication: attacker might add new messages
Messages might be lost when network is down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly