Forensics Flashcards

1
Q

What is another name for a forensic drive controller?

A

write blocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What tool in Linux can be used to create a forensic copy of a hard drive that will be used in an investigation?

A
  • dd
  • dd creates a bit-by-bit copy of the target drive that is well suited to forensic use, and special forensic versions of dd exist that can provide even more forensic features
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 4 functions of forensic disk controller?

A
  • write blocking
    • intercepts write commands sent to the device and prevents them from modifying data on the device
  • returning data requested by a read operation
  • returning access-significant information from the device
  • reporting errors from the device back to the forensic host
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does forensics deal with?

A

investigation, preservation, analysis, and presentation of digital evidence that will be used in an investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the goal of forensics?

A

establish the authenticity and integrity of the evidence, enabling it to be admissible in court, and ultimately, to assist in solving cyber crimes, intellectual property theft, fraud, and other digital-related offences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 4 types of forensics?

A
  1. Computer Forensics
  2. Network Forensics
  3. Memory Forensics
  4. Mobile Forensics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the different security roles that deal with forensics?

A
  • Tier 1 SOC Analyst
  • Tier 2/3 SOC Analyst
  • Malware Analyst
  • Digital Forensics Analyst
  • Insider Threat Analyst
  • Threat Hunter
  • Incident Responder
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the role of a Tier 1 SOC Analyst in terms of forensics?

A
  • collect evidence that will be added to an investigation case
  • the evidence is then used as justification for taking defensive measures, such as blocking an IP, domain, or email sender
  • understand that these artefacts (IPs, emails, domains) are considered evidence for the investigation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the role of a Tier 2/3 SOC Analyst in terms of forensics?

A
  • typically handle escalated/more critical investigations that require more technical expertise, or access to additional tools or sensors
  • related evidence is likely to be collected and handled under more strict conditions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is the process of malware analysis considered forensics?

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of the KAPE (Kroll Artifact Parser and Extractor) tool and what is it used for?

A
  • automate the collection and parsing of forensic artefacts from a computer’s file system and memory
  • can be deployed locally or on remote systems to quickly gather key dat
  • can retrieve artefacts relating to browser usage, program execution, the filesystem, logs, and much more
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of the FTK Imager tool and what is it used for?

A
  • create hard drive images, but also memory images, which can be analyzed in other programs for analysis
  • possible to import disk images into FTKi, allowing us to navigate through the file system as if we were on a live device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of the EnCase tool and what is it used for?

A

take forensic images of computers, mobile phones, and internet-of-things devices, which can then be analyzed to collect digital evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of the Cellebrite tool and what is it used for?

A

suite of tools designed primarily for mobile forensics, which allows easy acquisition of data from a mobile device so it can be processed in other tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the forensic tools used for evidence collection?

A
  • KAPE
  • FTK Imager
  • EnCase
  • Cellebrite
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of the Autopsy tool and what is it used for?

A
  • helps investigators analyze and extract evidence from various data sources, such as hard drives and mobile devices
  • works by creating a forensic image of the target storage media and then running in-depth searches to quickly retrieve key information, such as recently used programs, deleted files, emails, visited websites
17
Q

What is the purpose of the Volatility tool and what is it used for?

A
  • memory forensics framework that enables the analysis of memory dumps or memory images
  • captures a snapshot of a computer’s memory, allowing users to search for valuable information
  • aids in understanding the computer’s past activities and uncovering potential evidence of malicious actions
18
Q

What are the forensic tools used for evidence analysis?

A
  • Autopsy
  • Volatility
19
Q

What OSs’ are supported by Volatility?

A

Windows, Linux, and Mac OS

20
Q

What are the two common ways of hiding data?

A
  1. using disk’s slack space
  2. using steganography
21
Q

What basic information should be tracked to preserve the chain of custody?

A
  • Received From
  • Received By
  • Date
  • Time
22
Q

What should be done with the original disk image when doing forensics?

A
  • the disk needs to be hashed and then a full-bit copy should be taken, ensuring that absolutely everything is included in the copied image
  • new file should then be hashed, and if it is an exact copy, the file hashes will be the same - analyst then work on the copy, so the original evidence is not modified, making it inadmissible in court
23
Q

Who’s the guy who crearted many tools for Windows forensics?

A

Eric Zimmerman

24
Q

What is the Redline tool?

A
  • incident response tool developed and freely distributed by FireEye
  • gather forensic data from a system and help with collected forensic information
25
Q

What is the Velociraptor tool?

A
  • advanced endpoint-monitoring, forensics, and response platform
  • open-source and powerful