Week 5 - File Analysis Flashcards

1
Q

Name the common file systems and the operating systems they run on

A

FAT - File Allocation Table - mostly used on removeable media now

NTFS - New Technology File System - Windows

EXT - Linux

HFS- Hierachical File System - Mac

APFS - Apple File System - Mac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why can’t we just view / analyse the HDD using windows explorer (or similar)?

A

This would not be forensically sound.

It would mean we have to mount the file system. This is a process by which the computer’s oeprating system makes the files and directories available to access by the file system. It means you alter it in some way. Even oif you mpiunted it read only you would only have access to live files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Using TSK Commands (a command line tool)

A

When examining an image of a disk

mmls - gives info on DISK STRUCTURE

fstat - gives info on FILE SYSTEM

fls - LISTS FILES

istat - gives file METADATA

icat - EXTRACTS a FILE CONTENTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can we recover files that are no longer recorded in the file system structure?

A

By DATA CARVING

Data carving uses the raw data (not the file system) - examining it for known file signatures and reconstructung them. It will include data that is not referenced by the file system.
Pros are that it can find more files than using forensic file system tools can find alone (because it can find files in unallocated space and soemtimes file slack). But is slower and gives false positives (when file signatures are located by chance)

This is in contrast to file recovery that uses the file system information that remains after a file has been delted. This is quicker

Windows relies on file extensions to decide how to open a file whereas Linux uses the file signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List some common file signatures

A

JPG - FF D8 (start) & FF D9 (end)

DOC - D0 CF

ZIP - 50 4B 03 04

EXE - 4D 5A

MOV - 6D 6F 6F 76 (at offset 0x04 not 0x00)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List some data carving tools

A

PhotoRec

Scalpel

Encase

FTK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are forensic artifacts

A

Forensic artifacts are particular files or structures that are often of interest to investigators.

Once we have recovered the the files we need to analyse the artifacts.

There are lots of different types e.g:

Browser artifacts
Communication artifacts
Windows system artifacts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Browser artifacts

A

Can include things like cookies, history, bookmarks, passwords, downloads, email data (if web based)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Communication artifacts

A

Email, chat apps, voip, message history can be obtained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Window System Artifacts

A

The windows OS creates numerous artifacts such as:

APPLICATION logs: - important value. Info on installed applications.

SYSTEM logs: Info logged by the OS incl - info about start-up, shutdown, hardware failures.

SECURITY logs: Log in and log out events, account management changes and useage such as when files are accessed and deleted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly