5A. Digital Forensics Techniques obj 4.4, 5.3 Flashcards
Forensic Procedure
1) Identification
2) Collection
3) Analysis
4) Reporting
- Identification
- ensure scene is safe
- secure scene to prevent contamination
- identify scope of evidence to be collected
2) collection
- ensure authorisation to collect evidence
- use tools/methods that will withstand legal scrutiny
- document and prove integrity of evidence
- store evidence in secure packaging
3) Analysis
- create verifiable copy of evidence for analysis
- use repeatable methods
4) Reporting
- create report of methods/tools used
- present findings/conclusions
Legal hold
refers to the fact that information that may be relevant to a court case must be preserved
work product retention
refers to the way in which a forensic examiner is retained (hired) to investigate a case
Data Acquisition
the process of obtaining a forensically clean copy of data from a device held as evidence
Order of volatility
1) CPU registers and cache memory
2) RAM (incl, routing table, ARP cache, process table, kernel stats, temp file systems/virtual memory)
3) Persistent storage (HDD, SSD, flash)
4) Remote logging and monitoring data
5) Physical configuration and network topology
6) Archival media
Forensics software
- Encase (case management)
- Forensic Toolkit (FTK)
- Sleuth kit (open-source, command line tools, disk imaging and file analysis)
Why use Bit-by-Bit copies instead of using Copy command?
to ensure that slack space and unallocated space are both copied as part of the image. This captures deleted files that have not yet been overwritten, fragments of older files, and data that was stored on a drive before it was partitioned.
Tool for making bit-by-bit clones of drives…
dd utility in Linux.
What do system memory dump file reveal?
- running processes
- temp file contents
- registry data
- network connections
- cryptographic keys
Disk Image Acquisition methods:
1) Live
- copying data with computer running
- not legally sound
2) Static (by shutting down)
- risk malware will detect the shutdown process and perform anti-forensics
3) Static (by pulling the plug)
- legally sound, but may corrupt data
Write blocker
Forensic tool to prevent the capture or analysis device or workstation from changing data on a target disk or media.
- hardware blocker more popular