Theme 3: Analysis Flashcards

(30 cards)

1
Q

Preliminary Investigation

A

a scientific, structured stage for identifying and organising core investigations to form the groundwork of a defensible, logical case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Stages of Preliminary Investigation

A
  1. Preparation: Prepare hardware, software, tools. Tools must be tested to function as expected and that the process is reliable
  2. Validate Image: Confirm evidential provenance and integrity (imaging report, disk hash)
  3. Understand Disk Layout: Create partition map. Identify gaps, suspicious patterns
  4. Operating Systems: Note the version, system name, installation date etc.
  5. Identify User Accounts: Actions can be linked to accounts
  6. Note Additions: Identify software installed by the user
  7. Investigate Connected Hardware: Understand storage and peripherals
  8. Understand Activity: Build a timeline from programs run, files accessed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Failure to do Preliminary Investigation

A

context may be lost and inability to defend findings in court

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Case-driven Analysis

A

Case-driven analysis contextualises information by corroborating artefacts and connecting supplementary data to understand the case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Corroborating Data

A

Supports other evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Supplementary Data

A

Adds context

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a core operating system artefacts

A

system-level records created by the operating system that can be used to reconstruct user activity and build timelines to support/refute claims

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Core OS Artefact: Registry Store

A

User and system settings useful for understanding user habits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Core OS Artefact: Recent Files List

A

Useful for timeline and intent reconstruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Core OS Artefact: System Logs

A

Logs system and user events for a reliable timeline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Core OS Artefact: Clipboard History

A

Short-lived data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Core OS Artefact: Shellbags

A

Windows feature, preferences of folder views and settings. Shows navigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Core OS Artefact: Print History

A

Logs print jobs to prove intent to share

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Core OS Artefact: Swap/Page File

A

Extends RAM to disk. Contains snapshot of volatile data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Core OS Artefact: Thumbnail Cache

A

Stores image previews, including those of deleted files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Core OS Artefact: Recycle Bin

A

Holds ‘deleted’ files and can be used to recover data

17
Q

Core OS Artefact: Browser History

A

Web activity for intent, research, and external communication

18
Q

Core OS Artefact: App Launch Data

A

Execution of programs, can prove malware execution

19
Q

Core OS Artefact: Restore Points

A

Backups of OS state and files

20
Q

Core OS Artefact: Connected Devices

A

USB and hardware connections

21
Q

Core OS Artefact: Scheduled Tasks

A

Automate system and user tasks. For attempting alibi or for malware to maintain control

22
Q

Altering Artefacts

A
  • Timestomping: Altering metadata to mislead timelines
  • Log Clearing: Manual deletion of logs
  • System Restore Abuse: Rollback artefacts
23
Q

Windows Thumbnail Cache

A

The Windows thumbnail cache stores thumbnail images generated by the OS to provide previews of files.

The cache shows residual evidence of a file’s existence even after the file is deleted. They also can contain useful metadata.

24
Q

Limitations of Thumbnail Cache

A

The OS can generated thumbnails automatically, they are not enough alone to prove access of a file

25
Windows ESE Database
The ***Extensible Storage Engine (ESE)*** is used by Windows desktop search to index file system content for faster search operations. It stores - Filenames/paths - Timestamps - Volume Info It can serve as a historical record of files that were present on the system, even if now deleted. Helps in building timeline using timestamps of index time
26
Limitations of Windows ESE Database
System actions may fill in fields such as `HitCount` and `Accessed` so cannot guarantee it was caused by deliberate user action
27
What makes an unusual device
- **No Analysis Tool Exists**: A new method is needed - **Not Compatible with Existing Tools**: Build/version does not work with tools - **The Device is Modified**: Modification by a user or organised crime - **The Owner has High Technical Skills**: Potential for modification is high - **The Device is Previously Unseen**: New or unfamiliar devices - **Reason to Suspect Non-standard Behaviour**: Such as the device is used for a non-standard reason e.g. a phone only used for tracking creating an unusual usage pattern - **Traditional Techniques Indicate Nothing of Interest**: Other signs suggest something should be unusual but traditional analysis finds nothing - **Traditional Techniques Return Odd Results**: Device context matters
28
How to understand unusual devices
***Controlled experimentation*** is used to understand the data of an unusual device. Perform steps that a user may perform to understand how data can be generated and interpreted Ensure the hardware (batch numbers etc) and versions (OS, updates, etc.) are the same as the seized device
29
Extended Partition Flags
05 0F 85
30
Bootable Flag
00 non bootable 80 Bootable