Forensics Flashcards
EU evidence Gathering
Data integrity - Data must be valid & not corrupted
Audit Trail - like chain of command
Specialist Support- Utilize Specialists where required
Appropriate Training - get appropriate training
Legality - Evince collected and handled according to applicable laws.
Scientific Working Group on Digital Evidence standard
1- Visual Inspection - Get type of evidence, condition..It’s done during seizure
2-Forensic Duplication - Duplicate Media before examination
3- Media Examination - Actual forensic testing of the application
4- Evidence return - Exhibits are returned to the appropriate location
US Secret service Guideline
1-Secure scene and make it safe
2-Take immediate steps to preserve evidence If you reasonably believe that the computer is involved in the crime you are investigating,
3-Determine if you have Legal basis to seize a computer
4- Avoid accessing computer files. If the computer is off, leave it off.
5-If the computer is on, do not start searching through it. Follow guide to properly shut it down.
6-If reason that evidence is been destroying, remove power cord from the back of computer
7 - Take photo of the screen if computer is on. If off, take pictures
Logs
1- Security log: most important log from a forensics point of view. It has both successful and unsuccessful login events.
2-Application Logs : Contains various events logs by applications or programs
3- System Logs : logs by windows system
4- Forwarded Events log : Store events from remote computers
5- Application and Services log ; Store events from single application or component rather than event that might have system wide impact.
auditpol.exe.
wipe out log events on server.
/var/log/faillog
contains failed user logins– important when tracking attempts to crack into system
/var/log/mail.*
mail server log
/var/log/user.log
user activity logs
Diskdigger
can be used to recover deleted windows files.
net sessions
list active sessions connected to the computer you run it on.
openfiles
useful command for finding live attacks - list any shared files currently opened
netstat
to detect ongoing attacks –lists all current network connections (inbound and outbound)
Window registry
hierarchical Window database containing system and user information.
HKEY_LOCAL_MACHINE_SYSTEM_ControlSet\Enum\USBSTOR
Lists USB devices that have been connected to the machine
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2
Will indicate what user was logged onto the system when the USB what connected