FINAL Flashcards
What are Hardware Forensic Tools
single-purpose components to computer systems and servers
What are software forensic tools used for
create copy of data from suspect’s disk drive to an image file
Types of Software forensic tools
Command-line applications, GUI applications
What are the categories of validated tools
Acquisition, Validation & Verification, Extraction, Reconstruction, Reporting
ISO Standard 27037
Digital evidence first responders should use validated tools
Acquisition definition
Making a copy of the original drive
Acquisition subfunctions
Physical data copy, logical data copy, data acquisition format, command-line acquisition, gui acquisition, remote & live & memory acquisition
Acquisition methods
Physically copying entire drive, logically copying disk partition
Format for Disk Acquisition
vary from raw data to vendor-specific proprietary
Acquisition Common feature
Creating smaller segmented files
What do larger organizations use for acquisition
Remote acquisition
Validation Definition
Way to confirm that a tool is functioning as intended
Verification Definition
Proves that two sets of data are identical by calculating hash values or using another similar method, also separating good and suspicious data (filtering)
Validation: common file header value purpose
see whether a file extension is incorrect for the file type, identifiable by most forensic tools
Extraction Definition
Recovery task in digital investigation, most challenging
Extraction Subfunctions
Data viewing, keyword searching, decompressing, carving, decrypting, bookmarking
What can be used to speed up analysis (extraction)
Keyword search
What can you do when things are password protected (2 options)
Brute force or dictionary attack
Reconstruction definition
Re-create a suspect drive to show what happened during a crime or an incident
Reconstruction methods
Disk-to-disk copy, partition-to-partition copy, image-to-disk copy, image-to-partition copy, disk-to-image copy, rebuilding files from data runs and carving
How to recreate an image of a suspect drive
Copy an image to another location, such as a partition, physical disk, or a virtual machine, easiest: direct disk to image copy
Disk to image copy tools
Linux dd command, ProDiscover, Voom technologies shadow drive
Reporting purpose
to perform a forensics disk analysis and examination, you need to create a report
Report subfunctions
Bookmarks or tagging, log reports, timelines, report generator