Day 3: Manual Examination, Reporting, Hashing and Imaging Flashcards

1
Q

Why do we manually examine a device? (6 answers)

A
  • Unsupported device.
  • Corroboration (Make sure the files in the logical read match up).
  • As the user saw it (more impactful).
  • Incomplete Extraction (Files missing)
  • Incomplete decoding (Files there but unreadable)
  • Time sensitive (I.e TTL, imminent harm, serious case)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When, ideally should a manual examination be conducted? Why?

A

Manual examinations may change the data on a device. As such, conduct them after all required extractions have been performed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What should be contained within the “mobile examination package” (5 options)

A
  • Media (photographs and video of examination).
  • A log auditing your actions.
  • Tool logs.
  • Tool reports.
  • Recovered data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Hashing?

A

An irreversible, one way, mathematical algorithm that produces a digital fingerprint of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How long is a MD5 hash?

A

32 characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How long is a SHA1 hash?

A

40 characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Are hashes unique?

A

No! They are prone to hash collisions (where more than one input generates the same output).

However the probability of this occurring is low enough for forensic purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why are MD5 and SHA1 used at the same time to compare hashes?

A

It further reduces the probability of a hash collision occurring. It’s very unlikely that two will occur at the same time, so we can thus validate the input is the same even if we encounter one hash collision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why do we use hashes in forensics?

A
  • Validation. Is the file/data the same or has it changed?
  • Verification - Is that file the one we expect? Does the file match a specific signature we are after? Is it a file we’re not interested in and can this be discarded. See known and notable.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Hash Set?

A

A collection of hashes that generated hashes are compared against to determine if they are known or notable.

If known, the input is most likely a common system file that can be ignored from the examination.

If the match is notable, we’ve found a file that we are specifically searching for based on its input. This is useful as people may try changing names for the same file data, but we can still identify the same content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is imaging

A

A bit for bit copy of data on a storage medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a RAW image (DD)

A

A Raw image is an exact copy of all of the storage medium including empty storage space. No compression takes place so it the size of the image is equal to the size of the original storage volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a compressed image (E01)

A

An image that compresses the copied data for a reduction in size. The file format includes the compressed data, metadata and an embedded computed hash of the content just image for validation purposes.

A compressed image will always be smaller than the original source of the image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a logical image?

A

A logical image is a bit for bit copy of a specified portion of memory (for example a drive partition). A logical image will have some parts of the data missing from the entirety of the storage medium the image was taken from.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the benefits of taking an image?

A
  • Entire data space is copied (including deleted files).
  • Tools such as carvers can be used to retrieve missing or partially corrupted data.
  • Can easily pass to other tools which may give us different results/find us files that others couldn’t.
  • We can find hidden partitions and data.
  • We can hash to verify the integrity of any changes we make to ensure our examinations don’t make changes.
  • Multiple copies can be made.
  • If we take a copy of the data, the original data can be preserved, and we can work on the image, thus ACPO 1 is preserved.
  • We create an audit trail by creating a snapshot of memory that can be compared against and referred to in our contemporaneous notes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why should a write blocker be used when creating the image.

A

To stop the machine running the imaging process from accidentally writing to our original disk during the imaging process and changing the original data. This would violate ACPO 1.