DFIR Flashcards
DF
Digital Forensics: Examining and analyzing artifacts after a cyberattack
IR
Incident Response: Performing actions when a cyber event occurs
DFIR
Investigate and respond to a cyberattack after an incident
Threat Hunting
Active defense. Proactively search for threats
IRP
Incident Response Plan
Stages of Incident Response Planning
Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned
DFIR Process
Collect Evidence, Examine Collected Data, Analyze Important Artifacts, Report the Findings
DF Analysis Types
Dead Analysis (powered off computers)
Live Analysis (powered on computers)
Targeted Artifacts
Files on a Drive, Memory Artifacts, Processes, Log Files, Cached Data
Acquisition Tools
dd (data Dump): Drive Acquisition
FTK Imager: Drive and Memory Acquisition
DumpIt: Memory Acquisition
Non-Repudiation
Provides proof of the origin and integrity of data
RACI
Responsible, Accountable, Consulted, Informed
Used to assigned roles and responsibilities for each incident alert
NIST
National Institution of Standards and Technology
Government agency
SANS
Private organization. Offers research and education in the field of information security
DRP
Disaster Recovery Plan
Outlines response strategies for unplanned events. Helps minimize the effects
Data Acquisition Recommendations
Memory before drive acquisition
Memory captures are better is user is logged on
Use sterilized media
Document the capture properly
System interaction should be minimal
Capture to an external source
Full Clone
The closest option to having the actual drive
Logical Image
Narrows the search field. Some evidence may be spread across multiple partitions.
Capture Formats
RAW, ISO, EWF, dd
Clonezilla
Linux distribution for cloning drives. Not typically for forensic purposes.
Can clone over the network