Final Exam 3 Flashcards
MAC and OXS is built on what OP?
Unix Darwin
Junk files:
Junk files are temporary files created by window during the execution of a task, but not deleted after the task has been performed
Prefect files:
Are artifacts for forensics investigation. For example, prefect files are created in window for example when an application is run from a particular location for the very first time
Right of ownership in criminal case is a warrant and a subpoena in civil case
in criminal case is a warrant and a subpoena in civil case
Every email contains a header.
The transport header is read bottom up.
Investigation Technique
preparation survey preservation Examination Presentation
Modus Operandi
refers to the behaviors that are engaged in by a criminal for the purpose of successfully completing an offense. A criminal’s MO reflects how he/she committed his/her crimes
Modus Operandi-
Oriented behaviors are behaviors that were necessary to commit the crime
motive- or signature-oriented
behavior are behaviors that were not necessary to commit the crime
Right of ownership in civil case
is when a permission is given by owner to access evidence if not, a subpoena is needed.
- Right of ownership in criminal
is dictated by a warrant
Where to find USB insert for MAC :
In the sidebar Plist
Taking Physical image of an encrypted disk while system is running.
It would lead to getting encrypted image.
Email protocol
is a method by which tow computers communicate and exchange an email.
Mail server :
Stores the mail and let the receiving device access it and download when needed
Mail Protocol:
POP 3, IMAP, SMTP for devices interconnected, HTTP for internet browser
When investigation event log:
Do not rely on dates, look for log entries
Windows Artifacts:
Windows file systems, registry, shortcut files, hibernation files, prefetch files, event logs, internet history Windows executable, metadata, recycle bin, drop box, print spooling, thumbnail images, and lists of recently used applications.
Greatest challenge to digital forensics:
Encryption, cloud storage nature of acquisition, Hacking, network interface.
SS7:
Signal that carrier use to pass voice from tower to tower. Can be used to eardrop communication.
Biggest challenge to phone:
It’s encryption
Fsventer:
Tracks the file system ‘s activities in Mac
- Mac artifacts :
History (Web, bookmarks, downloads and search terms)
Cookies
Web Logins
Archived History (Web History and search terms)
Bookmarks (This is in a non-SQLite format)
- Each apple device has unique UID
Each apple device has unique UID
spot light index
index everything that is on the computer
Where are metadata for files on FAT system stored
On Fat Directory entries and in the allocation table.