Gathering Forensic Data 5.5 Flashcards

1
Q

Forensic Procedures

A

Collect and protect info relating to an intrusion.

RFC 3227 - Guidelines for Evidence Collection and Archiving. A good set of best practices.

Take extensive, detail oriented notes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Order of Volatility

A

Most to Least

CPU, CPU Cache, CPU Register
Router Table, ARP Cache, Process Table, Kernel Stats
Live Network Connections, Data Flows
Temporary File Systems
Data on Disk
Remote Logged Data
Data stored on archival media/backups
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Chain of Custody

A

Control the evidence, and maintain integrity. Everyone who comes in contact with evidence must be documented. Label and catalog everything, seal it. This will prevent anyone tampering the evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Legal Hold

A

A legal technique to preserve relevant information to prepare for impending litigation, initiated by legal counsel. This is provided as a hold notification, which tells you what kind of data and how much should be preserved. If this is Electronically Stored Information (ESI), there will be a separate repository created just for this data. There will be many kinds of data, documents, emails, personal files, others. You will preserve old and newly created data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Capture System Image

A

Copy the contents of a disk. Bit-for-bit, byte-for-bite. There are software imaging tools that are specialized for this. You may even use a bootable drive, to copy the affected drive in order to avoid touching anything. It is common to remove the physical drive to make sure nothing is overwritten, and add that drive to a hardware write-blocker to prevent anything from being overwritten. In case everything gets deleted on the drive, there may already be backups of everything.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network Traffic and Logs

A

Many attacks occur across the network so capturing as much log information as possible from switches, firewalls, routers, anything across the network. Log usual traffic patterns on the IDS/IPS. Some orgs can store ALL of their raw data. It’s possible to rebuild images, emails, browser sessions, file transfers, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Capture Video

A

If a security event happens outside of a computer event. Video footage could come in handy. You can also take video of a compromised computer you are working on. The video content must also be archived, it could have some of the most important record of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Recording Time Offsets

A

Time zone determines how the time is displayed. Document the local device settings. Different file systems store timestamps differently.

FAT: Time is stored in local time.
NTFS: Time is stored in GMT.

Record the time offset from the OS. Windows keeps it in the Windows Registry. Make sure to keep track of day light savings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Take Hashes

A

You can ensure that there’s no tampering if you use a digital hash. An Message Digest 5 (MD5) is 128 bit hash. If someone tries to modify the hash, they have a 230 billion, billion, billion, billion, chance of doing it. A CRC hash is 32 bits, and has a over 4 billion chance to duplicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Screenshots

A

Screenshots are difficult to reproduce, even with a disk image. You can even take shots with a digital camera or your phone. Use print screen or a third party app.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Witnesses

A

You need to ask interview, and document asap. In the future, some of those witnesses may not be around. Not all witness statements are 100% accurate. Humans are fallible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly