Chapter 13 Flashcards
What are the components of a forensic toolkit?
Workstation
Cables and adapters
Forensic software
Write blockers
Duplicators and clones
Removable media (USB)
Camera
Labeling supplies
What are the 3 types of carving?
File based
Content
Header and footer
What is it called when a set of tools look at data in sections or block by block?
Carving
How can you validate files and images?
Hashing
Which hashing algorithm is used because it’s fast and available everywhere?
MD 5
Which hashing algorithm is used because it’s low risk
Sha-1
What is a method used by Linux to pull human readable text
Strings
What is it called when attackers use A method that makes code difficulty to read and is apart of a malware package?
Packers
What is built in forensics toolkits to look up similar information to compare?
Log viewers
What is wireShark’s nickname?
Packet sniffer
Which Linux utilities tools are used to sort and analyze packet data?
Topdump and prep
. What are disadvantages of using containers in forensics?
Don’t last long in the system
Designed to be disposable
May cause you to lose your forensic evidence
Name the 3 areas that are focused on in the post-incident Analysis phase?
Root cause analysis
Forensic analysis
Lessons learned
Is the post-incident analysis phase during or after the incident?
During (despite post means after)
Name the 2 output by using forensic analysis?.
Forensic analysis = x+y
Root cause
Lessons learned