Lesson 18 Digital Forensics Flashcards
dd
linux command to make an exact copy of a disk
use with if= to identify the input file
use with of= to identify the output file/img
example: dd if=/dev/sda of=/mnt/usbstick/backup.img
OoV
Order of Volatility - more volatile to less volatile
How to capture information from an incident of compromise or attack
Order is:
1. CPU registers and cache memory including cache on disk controllers, GPUs, etc
- non-persistent sys mem - RAM, routing table, ARP cache, process table, kernel statistics, etc
- Data on persistent mass storage devices - HDDs, SSDs, flash memory devices, etc
- Remote logging and monitoring data
- Physical configuration and network topology
- Archival media and print documents
pagefile
pagefile/swap file/swap partition stores pages of memory in use that exceed the capacity of the host’s RAM modules
Analysis tools can’t interpret but it is possible to search for strings
NetFlow or IPFIX
NetFlow
A Cisco-developed means of reporting network flow to a structured database
has a variety of monitoring tools to capture data for point-in-time analysis and to diagnose security and operational issues on the network
IPFIX - IP Flow Information Export
a standard from a redevelopment of NetFlow
admissibility of data forensics
Capture of latent evidence (cannot be seen with the naked eye) requires physical evidence as well as documentation.
Documentation must prove the evidence was collected without tampering or bias and as to what the procedure was to collect the data
admissibility requires both
Due process
to have a set of safeguards to ensure fairness
a central principle to digital forensics investigation
technicians and managers must be aware of the processes used in investigation as to not compromise the investigation
Legal hold
Information which may be relevant to a court case must be preserved
can mean computer systems can be taken by law enforcement and lawyers which can be disrupt to a network
Chain of Custody
Chain of custody documentation reinforces the integrity and proper handling of evidence from collection, to analysis, to storage, and finally to presentation.
When security breaches go to trial, the chain of custody protects an organization against accusations that evidence has either been tampered with or is different than it was when it was collected.
Every person in the chain who handles evidence must log the methods and tools they used.
RAM Dump
A system memory dump creates an image file which can be analyzed to identify the running processes, contents of temporary file systems, registry data, network connections, cryptographic keys, and more
write blocker
a device attached to a system to make an image of the system while preventing any writes from happening on the system being copied/imaged
used in digital forensics to follow the chain of custody
FTK
Forensic Tool Kit
tool kit for Windows for digital forensic investigation
The Sleuth Kit
an open-source collection of cmd line tools and programming libraries disk imaging and file analysis
Autopsy is a graphical front-end for these tools acting as a case management/workflow tool
available for Windows and Linux
eDiscovery
A means of filtering the relevant evidence produced from all the data gathered by a forensic examination and storing it in a database such that it can be used at trial
SW has been developed to assist in this process:
- Identify and de-duplicate files and metadata to reduce the volume of data
- Search on keywords and semantic context
- Tags to help organize the data by adding keywords or labels to files and metadata
- Security to prevent tampering
- Disclosure of the same evidence to both parties
timelines
need to tie events to specific times to establish a consistent and verifiable narrative
Note the local time offset, due to daylight saving time, or use of UTC vs local time
NTFS uses UTC while FAT uses local time
RNA
Retrospective Network Analysis (RNA) a solution which provides the means to record network events either at the packet header or payload level