COIS 2750 Flashcards
What will directly impact your ability to write effective report
Your ability to take notes
What will be your foundation for reporting
Your notes
4 fundamental elements of note taking
what you did
what you saw
when you did something
why did you do it
General template for your notes
Administrative info
Executive summary
Narrative
Exhibits/technical details
Glossary
What are the keys to the change in browser history
user experience, security
what does the history database contain on chrome
Downloads, history
What do cookies do
Cookies are designed to track the user’s activity, such as adding an item to a shopping cart or recording the pages the user has visited.
True or False: A cookie is conclusive evidence that the user has accessed a website
False
What format are internet explorer bookmarks in
URL format
What are internet explorer bookmarks found in
Favourites
5 types of subscriber information
name, address, age, usage dates/times, and IP addresses
How does P2P filesharing work
When the user searches the P2P network and finds a file they wish to download, the application will identify all the nodes possessing that file. The application will then connect to the nodes and start downloading pieces of the file from all the available nodes
3 types of cloud based computing
Iaas - Infrastructure as a service
Saas - software as a service
Paas - Platform as a service
Saas
Applications are provided to the customer via the network
Iaas
The remote infrastructure is offered to the customer for use, while the provider maintains ownership and control of the hardware.
Paas
The operating system of the client is provided to the customer via a cloud server.
2 files found in dropbox
filecahce
config
what does config.dbx contain
Contains the user ID, account email address, account username, and path for the dropbox folder
what does filecache.dbx contain
consist of the filename, file path, and file size in the local host ID
3 files in google drive
sync_config.db
snapshot.db
device_db.db
what does sync_config.db contain
Contains the path, show if USB devices are being synced, and the email account associated
what does snapshot.db contian
include the serial number of the volume, filename, modified date/time stamps, file size, and show if it is a file or a folder
what does device_db.db contain
will contain the device ID of the USB device, the file name of the synced file, the file path, and the date/time stamp of when the file was synchronized to cloud-based storage.
What is an email protocol
An email protocol is a standard that is used to allow two computer hosts to exchange email communication
Where does an email go once it is sent
When an email is sent it travels from the senders host to an email server
What is the standardized protocol that allows users to access their inbox and download emails
POP3
What is IMAP
Internet message access protocol
Standard protocol used by an email client to access emails on an email server
What is the most significant difference between IMAP and POP3
The most significant difference between IMAP and POP is that POP retrieves the contents of the mailbox and IMAP was designed as a remote access mailbox protocol
Webmail providers
Gmail, Yahoo, Outlook, Hotmail
What do emails do on web based email
User deleted emails stored on a web-based email server typically remain on the server until the system deletes them
2 unique factors of emails
domain name, along with the message ID
What does it mean when you come across emails with the same message id
The email server is not compliant with the standard
The user has altered the email
What does this message ID mean 20080719233957
2008/july 19th/ at 11:39:57pm
What is the first thing an email touches
The received line is the first server the email touched
Where do undeliverable emails go
The return-path-field
What is MIME
Multipurpose Internet Mail Extensions
the internet standard for allowing emails to accept text other than ASCII, binary attachments, multi-part message bodies and non-ASCII base header information
PART is the file starter for what
MIME extensions
Outlook stores files in what types
pst, mbd, or ost
Thunderbird or Mozilla stores files in what format
.MBOX file
what are MSF files
Mail summary files
What is RAM
Random access memory
contain info about the current running state of the system before you shut it down
snapshot of a live running system, whereas a hard drive examination is static.
RAM is much more transient
What is the downfall to collecting RAM
Capturing the data in RAM will lead to the loss of potential evidence. You are changing evidence when you collect RAM.
True or false: Data can be written on RAM at extremely fast speeds
True
What tactic is no longer recommended in digital investigations
“pull the plug tactic”
What are the two types of RAM
Dynamic ram (Dram) and Static ram (Sram)
What is the difference between Dram and Sram
SRAm is faster and more efficient than DRAM
DRAM is cheaper to produce
You will typically find SRAM being used as cache memory for the CPU
DRAM chips being used for memory chips for the computer system.
What size is data stored in RAM
4KB pages
What is privilege seperation
Privilege determines what a user, user account, and the process is allowed to access. It is a form of access control and when used by the operating system, it helps provide system stability by isolating users and the CPU kernel’s actions
What is a system call
It is a bridge between the application and the operating system to allow the untrusted mode to become trusted for a specific instance
What is a thread
It is the basic unit of using the system’s resources, such as CPU
What contents can you find on RAM
artifacts of what is or has occurred on the system
Configuration information, Typed commands, Passwords, Encryption keys, Unencrypted data, IP addresses, Internet history, Chat conversations, Emails, Malware
What is hiberfill.sys
Hibernation file
Hibernation is the process of powering down the computer while still maintaining the current state of the system.
What is pagefile.sys
Pagefile
Paging is a method of storing/retrieving data being used in the RAM chips with a virtual memory file stored on a traditional storage device
What is swapfile.sys
Swapfile
When the application is suspended, the system will write the application data in its entirety into the swap file.
what is memory.dmp
Crash Dump
Happens when the system crashes
When that occurs, it may create a dump of memory to store information about the state of the system at the time of the crash
3 types of crash dumps
complete memory dump
kernel memory dump
small dump files
what is a complete memory dump
The data contained within the physical memory.
what is a kernel memory dump
Will only contain pages of data that were in kernel mode
what are small dump files
Contains information about running processes/loaded drivers at the time of the crash
What is SWGDE
The Scientific Workgroup on Digital Evidence
5 considerations when collecting volatile data
The application used to collect the data in memory will overwrite some contents of the memory.
The larger the tool and associated files are, the more data it overwrites.
The system may load the USB device driver into memory.
The system may load the USB device driver into the registry.
The application that’s used to collect the data in memory will show up in some Most Recently Used (MRUs).
3 things needed to capture RAM
A capturing device (such as a USB device)
Access to the system
Administrator privileges
What should your external device be formatted as when removing RAM
Your device should be formatted as an NTFS partition
What happens when a user first logs into a system
When the user first logs into the system, it will create a user profile
What will each user profile have
a registry hive
What does the registry hive contain
users preferences and configuration settings
4 types of user profiles
Local
roaming
mandatory
temporary
What is a Local user profile
This profile is created when the user logs on to a computer for the first time
What is a roaming user profile
This profile is an administrator-created, network-based profile.
What is a mandatory user profile
This profile is a profile created by the network administrators to lock users down to a specific set of settings when they use a host on the network.
What is a temporary user profile
This profile is created when an error occurs when the system is loading the user’s profile
what are the 4 hive files
SAM
SECURITY
SOFTWARE
SYSTEM
What is the SAM hive file
The SAM hive is the Security Accounts Manager and contains login information about the users.