Forensic Triage and Event Logs Flashcards

1
Q

Steps of strategy for Forensic Triage

A
  1. Grab a forensic triage
  2. Start a full image
  3. Analyze the triage while the full image is being collected.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Good things to grab quickly

A

Recently Accessed
Directories recently opened
Executables recently executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

LNK Files

A

Recently Accessed in the recents directory.
i.e. Desktop Shortcuts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Jump Lists

A

Recently Accessed + what application.
Right click on a Word Doc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Shell Bags

A

Recently Opened Directories
Specific information about each particular folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Prefetch

A

Recently Executed
\Windows\Prefetch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to collect triage items?

A

Custom content image with FTK Imager
Images using KAPE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Event Logs Characteristics

A

Type - Kind of log
Provider - What generated this?
Event ID - What happened?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Interesting log types

A

Security logs - Logon, logoff, program execution, security group membership.
Application Logs - Made by app developers
System logs - General info about the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What command to export logs?

A

wevtutil epl on evtx files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly