Other Flashcards

1
Q

Payload

A

the information to be covertly communicated. In other words, the message you want to hide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Carrier

A

The signal, stream, or file in which a payload is hidden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Channel

A

The type of medium used. This may be a passive channel, such as photos, video, sound files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Steganalysis

A

the process of analyzing a file or files for hidden content. FTK and Encase both check for steganography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cryptographic Hashes

A

How many systems, including Microsoft Windows, store passwords. “password” > 8BS09394820IKSKDF909DF99230 then it is stored in the SAM (Security Accounts Manager) file in the Windows System directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rainbow Tables

A

Every letter combination “under the rainbow” files used to crack hashes. OPHCRACK took depends on rainbow tables. Ophcrack is very successful at cracking windows local machine passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security log

A

the most important log from a forensics point of view. It has both successful and unsuccessful login events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Application log

A

contains various events logged by applications or programs. Many applications record their errors here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

System log

A

contains events logged by Windows system components. This includes events like driver failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Registry

A

contains information that Windows continually references during operation, such as profiles for each use, the applications installed on the computer and the types of documents that each can create.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Registry Hive

A

HKEY_LOCAL_MACHINE\SAM Sam, Sam.log, Sam.sav
HKEY_LOCAL_MACHINE_\Security Security, Security.log, Security.sav
HKEY_LOCAL_MACHINE\Software Software, Software.log, Software.sav
HKEY_LOCAL_MACHINE\System System, System.alt, System.log, System.sav

HKEY_CURRENT_CONFIG System System.alt, System.log, System.sav, Ntuser.dat,
Ntuser.dat.log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mac OS command prompt

A

BASH shell so you can execute Linux commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HFS+

A

preferred file system for quite some time for Mac OS, one you will likely encounter when doing forensic examinations of Apple computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

APFS Apple File System

A

created for MacOS 10.13 and later versions. Larger storage than HFS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

GUID Partition Table

A

is used primarily with computers that have an Intel-based processor. Requires OS X v10.4 or later

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MBR Master Boot Record

A

contained in the boot sector, is used when DOS- or Windows-based computers start up. Contains important info such as partition table, bootstrap code, and other information.

17
Q

MacOS Logs

A

Check the logs- very important when examining any computers.

18
Q

The/Users/<user>/.bash_history Log</user>

A

Shows a variety of commands.

19
Q

The /etc Directory

A

Where configuration files are located. Configuration files can be quite interesting in forensic investigation.

20
Q

Deleted Files on an iPhone, iPad, or iPod

A

.Trashes\501 folder

21
Q

iPhone passcode breaking

A

XRY

22
Q

Pwnage

A

Allows you to unlock a locked iPod Touch

23
Q

.pst

A

Outlook

24
Q

.ost

A

Offline Outlook Storage

25
Q

.mbx or .dbx

A

Outlook Express

26
Q

.mbx

A

Eudora