Forensics Walk-Through Flashcards

1
Q

First Steps for any Incident:

A
  • Consider photographs of the scene
  • Ordinary forensic issues, CCTV, fingerprints
  • Locate all physical articles and plane in a sealed bag
  • Identify any witnesses to the events
  • If a computer is switched on - should not be immediately switched off
  • If a computer is switched off - it should not be switched on
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Four Stages of Investigation:

A

1) Collection
2) Examination
3) Analysis
4) Report & Statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Mirror Image Copying Process:

A

1) Use a write-blocking device
2) Use cryptographic hash functions and check-sums to ensure integrity
3) After copying, has values and digital signatures can be verified later

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Creating mirror images may require a large selection of specialised devices and equipment…

A
  • Different connectors, interface specifications
  • e.g. Tableau TD2U DuplicatorImager
  • Such devices are required for different storage interfaces, recent proliferation of standards has made this substantially more expensive
  • Some devices may also be protected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Forensic Image Tools:

A
  • Built-in image capabilities
  • Ability to recover previously deleted files/folders
  • Ability to recover deleted material in space that is not currently allocated to a file
  • Searching through and/or carving files from unallocated space
  • Keyword searches over storage images
  • Sorting files by any property
  • Bookmarking files for subsequent investigation steps
  • Extracting files from images, documenting the provenance and process
  • Creating reports according to approved templates
  • Mounting files such as compressed archives, Microsoft Windows Registry or other database formats
  • Examination of proprietary email files
  • Internet access history analysis including temporary Internet files, cookies, history, favourites
  • Password recovery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Problems in Evidence Collection:

A
  • Losing RAM
  • Deleting evidential files
  • Accidental writing to evidential disk
  • Installing diagnostic software on disk
  • Changes to date & time stamps
  • Re-location of evidential files & directories
  • Creation of files & directories
  • Recovering deleted files directly onto disk
  • Executing native software or applications, batch files, macros on the evidential disk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Maintaining Continuity of Evidence:

A

Ensuring evidence remains admissible.
• Everything in Court must be proved
• Every part of the structure of a disk is evidence
• If tampered with or accessed except under provable circumstances not affecting content, integrity as evidence is lost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Active (live) systems present a number of challenges and opportunities…

A

Both potentially rich sources of additional evidence, but also risks of losing data particularly to counter-forensic techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Copying Volatile Memory Contents Challenge Solutions:

A
  • Virtual Machine snapshots
  • Hardware debuggers and in-circuit emulators
  • Exploiting Hibernating Mode or equivalent
  • Exploit crash dumps
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Key Factors Contributing to Fragility of Digital Evidence and Difficulties in Accessing:

A
  • Data is easily changed
  • Data can be disguised or concealed
  • Encryption
  • Data destruction - overwriting
  • Data can be misinterpreted or unintelligible
  • Clocks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Strict Procedures Followed For Storage Media:

A

• Static electricity must be discharged
• The host system must be switched off
• Computer and configuration must be photographed
• Manufacturer, model & serial numbers noted
• Covers must be removed
• Internal configuration of the system must be photographed
• Storage devices can now be removed from the enclosure
• Device must also itself be photographed
• Manufacturer and other data of device noted
• Any configuration items noted
• Device placed in anti-static bag
Anti-static bag placed in envelope and sealed with tape
• Each aperture of the envelope signed and dated
• Witness must sign and date apertures
• Envelope stored in safe together with a record entry to the safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Examination Phase:

A
  • A technical review conducted under (reproducible) laboratory conditions
  • Critical goal is data reduction due to the potential volume of data on modern systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Examination Phase must include…

A

System timestamps (clock), registry files, input/output access files, swap files, slack space, other nodes where evidence will accumulate, e.g. internet/web cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Analysis Phase - Actus Reus:

A

The guilty act. What is there? or what has been done?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Analysis Phase - Mens Rea:

A

The guilty mind or intent. Is it deliberate?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Analysis Phase - Must Document:

A
  • Date and time of all investigation events
  • All methods used
  • All software or other tools used
  • Any expert re-construction of events
  • Continuity of Evidence
  • Tools used to maintain the documentation