Forensics Flashcards

1
Q

EU evidence Gathering

A

Data integrity - Data must be valid & not corrupted

Audit Trail - like chain of command

Specialist Support- Utilize Specialists where required

Appropriate Training - get appropriate training

Legality - Evince collected and handled according to applicable laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Scientific Working Group on Digital Evidence standard

A

1- Visual Inspection - Get type of evidence, condition..It’s done during seizure

2-Forensic Duplication - Duplicate Media before examination

3- Media Examination - Actual forensic testing of the application

4- Evidence return - Exhibits are returned to the appropriate location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

US Secret service Guideline

A

1-Secure scene and make it safe

2-Take immediate steps to preserve evidence If you reasonably believe that the computer is involved in the crime you are investigating,

3-Determine if you have Legal basis to seize a computer

4- Avoid accessing computer files. If the computer is off, leave it off.

5-If the computer is on, do not start searching through it. Follow guide to properly shut it down.

6-If reason that evidence is been destroying, remove power cord from the back of computer

7 - Take photo of the screen if computer is on. If off, take pictures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Logs

A

1- Security log: most important log from a forensics point of view. It has both successful and unsuccessful login events.

2-Application Logs : Contains various events logs by applications or programs

3- System Logs : logs by windows system

4- Forwarded Events log : Store events from remote computers

5- Application and Services log ; Store events from single application or component rather than event that might have system wide impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

auditpol.exe.

A

wipe out log events on server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

/var/log/faillog

A

contains failed user logins– important when tracking attempts to crack into system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

/var/log/mail.*

A

mail server log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

/var/log/user.log

A

user activity logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Diskdigger

A

can be used to recover deleted windows files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

net sessions

A

list active sessions connected to the computer you run it on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

openfiles

A

useful command for finding live attacks - list any shared files currently opened

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

netstat

A

to detect ongoing attacks –lists all current network connections (inbound and outbound)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Window registry

A

hierarchical Window database containing system and user information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HKEY_LOCAL_MACHINE_SYSTEM_ControlSet\Enum\USBSTOR

A

Lists USB devices that have been connected to the machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2

A

Will indicate what user was logged onto the system when the USB what connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkLis t\Profiles\

A

gives you a list of all the Wi-Fi networks to which this network interface has connected.

17
Q

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall.

A

show software that have been uninstalled

18
Q

Logical Acquisition

A

Logical imaging refers to copying the active file system from the device into another file.

19
Q

Physical Acquisition

A

A physical acquisition creates a physical bit-by-bit copy of the file system, similar to the way a hard drive would be forensically imaged.

20
Q

Subscriber Identity Module (SIM)

A

The SIM is how you identify a phone.The SIM stores the International Mobile Subscriber Identity.SIM will also usually have network information, services the user has access to, and two passwords.

21
Q

Two passwords on SIM

A

PIN -Personal Identification Number

PUK - Personal Unblocking Code

22
Q

FTK

A

Analyze window registry and crack password

23
Q

Computer Hacking Forensic Investigator.

A

Test general forensics knowledge .