Lecture 9 - Process of digital forensics Step 3 Flashcards

1
Q

What is the 3rd step of computer forensics

A

Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Steps of analysis?

A
  • physical searching
  • whitelist production
  • registry examination
  • browser analysis
  • reconstruction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

First step of the analysis step?

A

Create a case in Autopsy
-> ensure to check hash (no changes to the copy)
-> pick relevant autopsy features for the case (e.g. foremost fetches deleted files , e.g. keyword searching e.g. metacam (getting camera files))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the step of whitelist production?

A

Producing a list of files that will be excluded from the analysis as they’re not relevant to the investigation. This is done by comparing hashes of the files with whitelisted hashes. Files not on this list are restricted from running on a normal system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can we get whitelist hashes?

A

using md5deep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can a whitelist be used in digital forensics?

A

Files that are not on the whitelist might be suspect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the step of registry examination?

A

Here we identify the installed applications, devices and users on the OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What software can we use for registry examination?

A

regviewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why do we have a registry step in the analysis?

A

For:
- User Activity Tracking
* Malware Analysis
* Network Activity Analysis
* Recovery of Deleted Data
* User Authentication Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the step of browser analysis?

A

Where we go through browser activities of that device. Mainly history, bookmarks and recent items

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What software can we use to discover browser files e.g. index.dat

A

autopsy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the step of reconstruction within the analysis?

A

Creation of .fls file and use of Zeitline
for examining all the events. This program can also be used to create a timeline of events.

-> this can be used to further investigate or dig into files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is establishing a timeline important?

A

establishing a timeline is one of the most crucial parts of the investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly