Sec+ Chapter 15: Digital Forensics Flashcards

1
Q

Legal hold

A

A notice that informs orgs that they must preserve data and records that might be otherwise destroyed or modified according to normal operating procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

EDRM

A

Electronic discovery reference model

A nine stage model that describes a legal e-discovery process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Order of volatility

A

A process that documents what data is most likely to be lost due to system operations or normal processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

7 Steps in Order of volatility

A

1) CPU cache and registrars

2) Routing table, ARP cache, process table, kernel stats

3) System memory and RAM

4) Temporary files and swap space

5) Data on the hard disk

6) Remote logs

7) Backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CPU cache and registers

A

Rarely captured as part of normal forensic effort

These are constantly changing as processing occurs, making them highly volatile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Process table, kernel stats, ARP cache

A

Ephemeral data

Can be captured through combo of memory and disk acquisition

Capture can only be of the moment in time when acquisition is done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RAM

A

Difficult to gather information because it changes constantly, and the process of capturing information can alter it

Some of this information is never written to a drive like browsing history, clipboard info, encryption keys, ephemeral app data, and command history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Swap and pagefile info

A

An area of your storage device that you can use to swap info out of your RAM to free up memory for other apps to execute

Stored temporarily on the drive, perform the execution in RAM, and then transfer back from swap file to RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Files and data on disk

A

Primary focus of many investigations

Create a bit by bit forensic clone of everything contained on that storage device

Need to capture the entire disk instead of a copy of files in order to see deleted files and other remaining artifacts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Operating system

A

The OS itself can contain useful info for an investigation

You can compare OS and libraries to a known good OS and library looks like for reference

Also capture other info like:

1) Number of logged in users and who they are

2) Open ports

3) Running processes

4) Attached device list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Firmware

A

Not a common artifact for forensics, but can be important if firmware was modified as part of an incident

Can help understand how a device was exploited, and once the firmware was installed what functionality the attacker had

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Snapshots

A

A way to image a VM where the original snapshot is considered the full backup

Subsequent snapshots are incremental updates from the last snapshot

To recreate the VM you need the original snapshot and all incremental snaps taken from original

Can see all the information for the VM like OS, apps, user data, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network traffic and logs

A

Detailed info or clues about what was sent or received, when, and over what port and protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Chain of custody

A

Documentation that details each time an artifact is accessed, transferred, or handled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Right to audit clause (cloud)

A

Provides either a direct ability to audit the cloud provider or an agreement to use a third party audit agency

Specifies how you can perform security audits of the data held in the cloud and make sure the it’s safe before a breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Regulatory and jurisdiction concerns (cloud)

A

The law that covers your data, infrastructure, or services might not be the laws in your region

17
Q

Data breach notification laws (cloud)

A

Contracts cover how long after breach until customers need to be legally notified

Regulation changes from state to state and country to country

18
Q

dd

A

Linux command that creates a bit by bit copy of all the information on a drive or in a directory

Useful if you need to capture the information to perform analysis later

19
Q

FTK Imager

A

Imaging tool that can mount drives, image drives, or perform file utilities in a Windows executable

Capture images from other drives and store them in a format that can be read by other third party utilities

Widely supported in other forensics tools to capture information in FTK, and then use the image files in other utilities on other OS

It can even read encrypted drives, and save read and write to dd, Ghost, or Expert Witness

20
Q

WinHex

A

Windows utility that allows you to view information in hexadecimal mode, so you can pull out info from files, memory, or disks and view or edit it

There’s also disk cloning capabilities, secure wipes, and many other forensics tools built in

21
Q

Provenance

A

The original source of the data and the chain of custody for how it’s been handled

22
Q

Slack space

A

Open space on a HD

EX: If a 100 mb file is deleted and overwritten with a 25mb file (75mb slack space, can obtain partial recovery)

23
Q

Autopsy

A

Tool that provides digital forensics of information stored on a storage device or image file

Allows us to view and recover data, like downloaded files, browser history and cache, email messages, databases, etc

24
Q

memdump

A

Use this utility to capture all the information in system memory and send it to a particular location on your system

Third party forensic tools can read this file and identify or locate information that’s stored in that memory file

You commonly store the memdump outside the system, you use this in conjunction with netcat, stunnel, openssl, etc

25
Q

Admissibility

A

Not all data can be used in a court of law because there are different rules in different jurisdictions

The key part is that you collect the data with a set of standards that could allow it to be used if necessary:

1) Have legal authorization to collect

2) Use the right procedures and tools

3) Use proper scientific principles used during analysis

4) Have the right professional qualifications

26
Q

Time offsets

A

Time zone information associated with the device you’re analyzing

It can be different based on OS, file system in place, or where the device is located

EX: FAT is stored in local time, but NTFS is stored in GMT

27
Q

Event logs

A

Documents important OS or app events

Export and store for future use

Linux: /var/log
Windows: Event Viewer

28
Q

Artifacts

A

Digital items left behind, can be stored in log, flash memory, prefect cache file