DFIR Test Review Flashcards
Define the CSIRT acronym
Computer Security Incident Response Team
Let’s build an IR team, whom do we need?
A. Analyst – Does ALL the work! Like a paralegal to an attorney
B. IR Manager – Manages up, helps herd the cats, removes blockers
C. Researcher – Malware analysis, digs into vulnerabilities, etc.
- Do we need a technician?
- Technicians work on infrastructure gear
- We can request techs do something (spanning or mirroring)
- We would not want one on our team as they must have adequate access and
tribal knowledge of the infrastructure. Our team member would have none
of that.
Need A,B, and C
What types of things do we do in Digital
Forensics
A. Collecting information – Collecting artifacts to analyze
B. Examining artifacts - Looking for malware and signs of compromise
C. Reporting – We write comprehensive technical reports
- During an DF or IR, do we ‘hack’?
We do A, B, and C
Which of the following is a digital forensics
method?
A. Deleting files
B. Steganography
C. Live Analysis
D. All of the above
C, live analys
What is the order of the IR lifecycle?
Preparation, Detection and Analysis, Containment, Eradication and
Recovery, and Post Incident Activity
- Note: No ‘identification’, ‘termination
Which of the following tools can interface
with Windows OS and a RAM dump?
A. CAINE
B. Volatility
C. Wireshark
D. SIFT
RAM = Volatility , answer is B
A. CAINE Computer Aided Investigative Environment (KALI of forensics)
C. Wireshark - Protocol Analyzer
D. SIFT - SANS Incident (SANS Incident Forensics Toolkit) (KALI of forensics)
How can malware be detected?
A. By scanning the system folder
B. It cannot be detected
C. By searching for abnormal activities
D. By changing folder permissions
C By searching for abnormal activities
What is a sandbox used for?
A. Isolating an operating system to check files
B. Testing malware w/out affecting the host system
C. Running new apps
D. Clearing infected files from the host system
Testing malware w/out affecting the host system
What is the difference between wireshark
and t-shark?
- T-shark does not have a GUI
- T-shark is more efficient than wireshark
What is a disadvantage of a planned attack?
A. When an attack is planned, the AV cannot scan it
B. When an attack focuses on a company, it is harder to track it
C. When an attack is planned, the firewall does not monitor it
D. It is easier to bypass security measures when an attack is planned
When an attack focuses on a company, it is harder to track it
What is TCPFLOW?
- https://www.tecmint.com/tcpflow-analyze-debug-network-traffic-in-linux/
- Free, open source, powerful command line based tool for analyzing network traffic on unix-like systems such as Linux. Captures data received or xferred over TCP connections and stores it in a file for later analysis.
- It breaks the data up by IP
- Does not capture all the header info (only the data)
- Does not capture the entire packet like TCPDUMP does
What is TCPReplay?
TCPReplay allows a user to open a .pcap file and then replay it back onto the network.
What is TCPDUMP?
- Packet capture tool that captures all the data in the packet
- Also called a packet sniffing tool
- Also called a Network Sniffing Tool
What is the different between soft and hard filters in wireshark?
- Hard filters are set a ‘capture time’
- Remember that wireshark is a protocol analyzer and not a packet capture or sniffer tool.
- Hard filters set the packet sniffer wireshark is coupled with to ONLY capture what the filter tells it to.
- Soft filters are set in wireshark (protocol analyzer) not the packet capture tool
- Hard filters limit captures, not soft filters.
- Soft filters can be modified, hard filters are preset at the beginning of a capture
What is the difference between captured
HTTP requests and HTTPS requests?
- All data transferred over an HTTPS connection is encrypted
- HTTPS requests are encrypted
In what way is a file hidden when using
steganography?
- A file can be hidden inside of another file
- A command is typically hidden in images being posted to control
posts (Indonesian malware posting to infected word press servers)
What is FTK Imager?
FTK Imager is a tool that lets you quickly assess electronic evidence to determine if further analysis with a forensic tool such as FTK is warranted.
* Forensic Tool Kit = FTK
* What is a forensic image?
* A forensic image is one in which during the copy no ability to write to the original disk/evidence was possible
* What is a byte by byte copy? (perfect copy)
* A byte by byte copy is one in which a byte is read, written, read again and verified
it was written as is the original byte. Each byte is checked. Versus a ‘group of
bytes’ copy (normal copy) where large sections are read, written, hash generated
of section – and hash pulled of section written. If the hash matches it is assumed
to be 100% accurate copy – not every byte is checked.
* Hashing algorithms do not check every single byte – just a LOT of them.
What is HxD
Hexadecimal Editor
* a tool NOT USED IN NETWORK FORENSICS MONITORING!!!!
What is wireshark?
- A protocol analyzer
What is ntopng?
- High speed web based traffic analysis and flow collection
- ntopng is a high performance, low resource replacement for ‘ntop’.
- The name is derived by: ntop next generation.
- Provides persistent traffic statistics in RRD format.
- RRD=round robin database, or fixed in size. As one entry enters,
another leaves. - Layer 7 analysis by leveraging on nDPI (OS DPI framework)
- DPI=Deep Packet Inspection
- Can be used in forensics
What is Explico?
Open source network forensic analysis tool (NFAT)
* https://www.xplico.org/
Which statement is true?
* When data is erased from the operating system, it cannot be restored
* When data is erased from the OS, it remains on the HDD until it is
overwritten
* Data is kept only in RAM, and cannot be restored from the HDD
* Data is erased when the operating system reboots
When data is erased from the OS, it remains on the HDD until it is
overwritten