Tech Terms Flashcards
Active File vs. File Fragment
- Active - file currently being accessed or is available for use.
- See, open access- Fragment - Data (files) stored in non-contiguous segments or clusters. Usually occurs when a file is deleted. Think deleted file fragment - the stuff left over by previously deleted files.
App vs. Program
- Application - program or group of programs
- designed for the end user; calls for user interface
- directly helps the end user perform a task
- dependent on system software to execute
- term Apps began with mobile devices
- Examples: Windows Media Player and Firefox
- have a graphical user interface- Program - set of instructions telling a computer what to do.
- All applications are programs, but a program is not necessarily an application
- Can run silently in the background (think System Functions)
- Program - set of instructions telling a computer what to do.
Forensic Importance: Since applications are designed for the user to perform a specific task. An application will not just run in the background without being told to do so. program, on the other hand, does not always require user interaction.
ASCII vs. UNICODE
- ASCII - American Standard Code for Information Interchange assigns binary digits to specific symbols
- 128 characters, 7 bit encoding
- Extended allows for 256 values- Unicode - Universal Coded Character Set provides a unique binary or hexadecimal sequence for every character or symbol
- Variable encoding length
- Adopted as the standard character encoding and can address all language characters across the globe.
- Unicode - Universal Coded Character Set provides a unique binary or hexadecimal sequence for every character or symbol
Backup Software vs. Volume Shadow Copy
- Backup - full copy of files and folders
a. Computer programs or applications that are used to perform a backup of files, folders, or entire computers
b. Exact duplication to restore original content
c. Time Machine, Carbonite
d. Some software supports differential back ups (also referred to as incremental) by backing up the changes to the original file. Can help increase speed efficiency by updating only the changes.
e. Back up software can also compress data- VSC - Windows service capturing snapshots called shadow copies
- Read-only point in time copy of the volume.
- User data and not programs
- Shadow copy is read only access
- Stored in System Volume Information
- NTFS
- Created using two methods - Complete Copy and Differential Copy (updating changes live).
Each method results in two data images: Original Volume – full read/write access, Shadow Copy Volume – read only access. - To restore a Shadow Copy, the original volume must also be present
- Read-only point in time copy of the volume.
- VSC - Windows service capturing snapshots called shadow copies
Carved File vs. Recovered Deleted File
- Carved File - file is that not recorded in the file system records, but data is on the physical disk.
- no names, metadata, or attributes associated with it
- no reference data in the file table
- “carving” locates data by file signature and extracts that data into a new file
- Process of recovering and extracting intact files from memory / pagefile and unallocated space
- Scan for known file headers and carve out a file out based on normal length
(A file header is a sequence of bytes at the beginning of the file that is unique to a file type -
Who am I and how do you treat me?)
- Carve for predictable length or until a known footer is found - Recovered Deleted File - User has deleted the file, but the MFT entry has not been overwritten.
- Could be in the recycle bin
- When deleted, a file stays in the same place; pointer is deleted
Forensic Importance: You can carve for files by extracting data from the disk. With a deleted file, you can conduct keyword searches or signature identification
Cloud Storage v. Network Drive
- Cloud Storage - online storage space
- Data is uploaded and stored in a cloud
- Examples iCloud, Google Drive, DropBox
- Pay as you go
- Third party is managing the infrastructure
- Efficient way to share data- Network Drive is a storage device on a local area network.
- Usually located on a server or a NAS
- Network Drive is a storage device on a local area network.
Cluster vs. Sector
- Sectors - tracks on a hard drive platter are broken into sectors
a. smallest unit that can be accessed on a storage device (HDD or SSD)
b. usually 512 bytes of accessible data, 59 bytes for ECC
c. smallest addressable unit - Cluster - group of sectors that make up the smaller unit of disk allocation for a file within a file system
a. file system’s cluster size is the smallest amount of space a file can take up on a computer
b. specified in Volume Boot Record
c. smallest allocation unit - a set of contiguous sectors which will be used for file space allocation.Forensic Importance: Understand how a computer stores files.
Analogy: Filing cabinets in records storage. The cabinet is the cluster. The drawer is the sector.
Container Email vs. Web Email
- Container Email
a. Accessed thru an email client
b. Data is stored local computer/device or server
c. Example: Outlook (?) - Webmail
a. Accessed thru a web browser
b. Data is stored on the internet
c. Examples - Gmail or Yahoo
Forensic Importance: Know to advise the case agent that in order to access webmail, they would need an additional search warrant if it’s not stored on the device.
Getting news in a physical paper vs online
DCO vs HPA
- DCO - Device Configuration Overlay
- Tells the drive how to behave
- Allows vendors to purchase HDDs from different manufacturers with potentially different sizes and then configure them to have the same number of sectors
- Can hold hidden data
- May cause drive to appear smaller than it actually is- HPA - Host Protected Area
- Reserved area on a hard disk for booting and diagnostic code
- Not usually visible to the computer’s operating system
- Stores information in a way that cannot be easily modified or accessed by the user BIOS, or OS.
- HPA - Host Protected Area
two areas at the end of SATA and IDE hard disk drives that are only accessible via special utilities but not the operating system, BIOS or general user. Both the HPA and DCO can reside on the same drive, and both areas offer potential storage for hiding small to large amounts of secret data
Forensic Importance: Data could potentially be hidden in these areas. Additionally, imaging the HPA or DCO is beyond limitations of some tools. If someone is storing data in these spaces, it indicates a high level of computer knowledge.
DD vs. E01 Image
- DD - a RAW image is a bit-for-image
- contains only the data from the source disk
- No header or metadata included in the image file, but some utilities may include a separate log file with metadata.- E01 Image (Encase Image File Format)
- Disk images that contain a header and footer with metadata about the image
- timestamp
- cryptographic hash (“fingerprint”)
- Drive type
- Version of software that created the image
- Source disk operating system
- Cyclical Redundancy Check (CRC) provides an integrity check over the previous block of data
- Compressed
- Disk images that contain a header and footer with metadata about the image
- E01 Image (Encase Image File Format)
Deleted Files vs. Recycle Bin Files
- Deleted File
- When file is deleted, OS writes 0xE5 in the first byte of the file’s directory entry.
- FAT changes to indicate cluster is now available for data
- Pointer ($I30) to file deleted
- Space is marked available for use (i.e. -unallocated)
- File and its contents remain
- Most (if not all) can be recovered- Recycle Bin
- Contents not actually deleted
- File moved in the directory structure
- $R
- $Recycle.Bin
- Each SID has a subfolder within
- Two files in $Recycle.Bin created
- $I is an Info file – contains metadata such as deletion date/time and the original name and path
- $R is the actual file
- Recycle Bin
DHCP vs. Static IP address:
- DHCP - Dynamic Host Configuration Protocol
- an IP address is series of numbers divided into four octets that uniquely identifies a computer on a network. numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number. With depletion of available IPv4 addresses, a new version of IP (IPv6), using 128 bits for the IP address
- A DCHP server assigns an IP address from a pool on a network
- Changes when a user logs off- Static - Permanently assigned to a computer
- Does not change when user logs off
- Often used on devices like printers
- Static - Permanently assigned to a computer
Digital Forensics vs. General Forensics
- Digital Forensics - Application of scientific and investigatory techniques to digital evidence
- Identification, preservation, examination, and analysis of data
- Digital devices - hard drives, removable drives, optical media
- Use scientifically accepted and validated processes for presentation of evidence in a court of law
- For purpose of reconstructing past events- General Forensics - Application of scientific methods and techniques in a legally sound manner to investigate a crime
- Process of collecting, examining, and analysis of physical evidence
- General Forensics - Application of scientific methods and techniques in a legally sound manner to investigate a crime
Encryption vs Password Protection
- Encryption - Encoding the data
- Need a key to decode- Password Protection - locks the data, but does not encode it. Like a safe. If you break into it, you can read it.
ESE vs. SQLite Database
- ESE - Extensible Storage Engine
- Microsoft database – “heart of active directory”
- Windows Search database (Windows.edb)
- Exchange
- Also stores WebCacheV*.dat for IE10+
- ESE database was designed for massive numbers of reads and writes. Uses a write-ahead model, new data is not immediately written. first is written into log files. Log files are cached in memory for subsequent use, and when convenient the database commits the changes from the memory cache into the database. expect massive amounts of data to be cached that does not yet exist in the ESE database.
- Physical and logical grouping of data
- Looks like a single file to Windows, but is a collection of 2, 4, 8, 16, and 32 KB pages
- May contain up to 16 TB of data
- Internet Explorer History- SQLite – Structured Query Language
- Open source, widely supported, cross-platform database
- Used in a lot of mobile phone apps
- Relational, transaction (transaction = change to database) based database
- Runs in RAM - small footprint, no installation
- A “database contained within a single file”
- Standalone – does not require a client/server relationship
- SQLite – Structured Query Language
Event Log vs. USN Journal
- Event Log - Primary source of evidence as the OS logs every system activity
- Three main components:
- Application - records application related events that are installed
- System
- Security - logon/logoff activity and others
- May find:
- Timeline based on logging information
- Incorrect login attempts
- Hack, breach, system setting modifications
- Application Failure
- System Failure- USN Journal – Update Sequence Number $J
- feature of Windows NTFS which, when enabled, maintains a record of changes made to the volume
- Enabled with Vista on- stored in $EXTEND
- one Journal for each NTFS volume
- Each record identified by a 64-bit Update sequence Number. Contains the USN, name of the file, and info about what the change was
- May find:
- File creations and deletions
- Peer to Peer services
- cloud services
- Email openings
- May find:
- USN Journal – Update Sequence Number $J
FAT vs. MFT
- FAT - File Allocation Table (FAT) family of file systems
- Used in flash drives, sd cards, USBs, and other external media
- Doesn’t hold as much metadata
-size limitations- MFT - Master File Table (Manager in a warehouse analogy)
- stores data for the NTFS
- Tracks all files and directories in the volume and is similar to a database
- Every file has a corresponding MFT record
- Each record is 1024 bytes in size by default and contains a header, attributes, and unused space
-Records all file:
Locations, folder create dates, entry modified dates, access dates, last written dates.
Physical and Logical file size
If a file is marked for deletion (unallocated)
- MFT - Master File Table (Manager in a warehouse analogy)
File Date vs. Metadata Date
- File Date: (file system)
a. If a file gets moved or copied, receives new date
b. File system metadata include the date and time a file or folder was created, accessed, or modified. - Metadata Date: (application)
a. File information that is not the actual data in the file - embedded into the file itself
b. Includes created, modified, and viewed information
c. Information about information (the file itself)
d. Metadata retains the original created date and time information
e. Information can be modified
f. They can also track a variety of application-specific attributes as well - the name of the author, the name of the company or organization, and the computer name.Forensic Importance: Even if a file get moved or copied, the metadata date will remain the same. However, it is possible to change the date in the metadata manually. Important for creating timelines.
File Extension vs. File Signature
- File Extension- three character string after the period in a file’s name (.jpg)
- provides a quick look at the type of file
- can be changed (label switching with salt and sugar metaphor)
- tells the system how to treat it (open it with a text reading program, for example)- File Signature - situated at the beginning of the content of some files.
- JPG pictures, MPG movies, and ZIP files all have identifiable signatures
- Cannot be changed
- Also referred to as headers
- File Signature - situated at the beginning of the content of some files.