Topic 12C Flashcards

1
Q

In the context of an incident response case or digital forensics investigation, a data source is what?

A

something that can be subjected to analysis to discover indicators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Examples of datra sources:

A

System memory and media device file system data and metadata.

Log files generated by network appliances (switches, routers, and firewalls/UTMs).

Network traffic captured by sensors and/or any alertable or loggable conditions raised by intrusion detection systems.

Log files and alerts generated by network-based vulnerability scanners.

Log files generated by the OS components of client and server host computers.

Log files generated by applications and services running on hosts.

Log files and alerts generated by endpoint security software installed on hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What can be used to aggregate and correlate multiple data sources?

A

security information and event management (SIEM) tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A SIEM can be used for two types of reporting:

A

Alerts and alarms detect the presence of threat indicators in the data and can be used to start incident cases.

Status reports communicate data about the level of threat or number of incidents being raised and the effectiveness of security controls and response procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Event Viewer

A

A Windows console related to viewing and exporting events in the Windows logging file format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Syslog

A

Application protocol and event-logging format enabling different appliances and software applications to transmit logs or event records to a central server. Syslog works over UDP port 514 by default.

syslog messages can be generated by switches, routers, and firewalls, as well as UNIX or Linux servers and workstations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of windows logs

A

Application - generated by application processes like crashed or installs

Security - failed logins, etc.

System - events generated by operating systems kernel processes and services. A driver or service cannot start, startup type change, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Endpoint log

A

refer to events monitored by security software running on the host, rather than by the OS itself.

This can include host-based firewalls and intrusion detection, vulnerability scanners, and antivirus/antimalware protection suites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Endpoint protection platform (EPP), enhanced detection and response (EDR), or extended detection and response (XDR).

A

Suites that integrate functions into a single product.

These security tools can be directly integrated with a SIEM using agent-based software.

Summarizing events from endpoint protection logs can show overall threat levels, such as amount of malware detected, number of host intrusion detection events, and numbers of hosts with missing patches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network logs

A

generated by appliances such as routers, firewalls, switches, and access points.

Log files will record the operation and status of the appliance itself—the system log for the appliance—plus traffic and access logs recording network behavior.

For example, A switch log might reveal an endpoint trying to use multiple MAC addresses to perpetrate an on-path attack.

A firewall log might identify scanning activity on a blocked port.

An access point log could record disassocation events that indicate a threat actor trying to attack the wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

firewall rule

A

can be configured to generate an event whenever it is triggered.

As with most types of security data, this can quickly generate on overwhelming number of events. It is also possible to configure log-only rules

audit event will record a date/timestamp, the interface on which the rule was triggered, whether the rule matched incoming/ingress or outgoing/egress traffic, and whether the packet was accepted or dropped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IPS/IDS Logs

A

an event when a traffic pattern is matched to a rule. As this can generate a very high volume of events, it might be appropriate to only log high sensitivity/impact rules.

A single packet can trigger multiple rules.

An intrusion prevention system could additionally be configured to log shuns, resets, and redirects in the same way as a firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network traffic is typically analyzed in detail at the level of

A

individual frames or using summary statistics of traffic flows and protocol usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What layers does wireshark decode at?

A

data link/MAC, network/IP, and transport (TCP/UDP) layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can packet analysis identify?

A

Manipulation of packets through a standard port, for a botnet server for example.

Allows inspection of protocol payloads to identify data exfiltration attempts or attempts to contact suspicious domains and URLs.

Detailed analysis of the packet contents can help to reveal the tools used in an attack. It is also possible to extract binary files such as potential malware for analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Metadata for files

A

A file might be assigned a security attribute, such as marking it as read-only or as a hidden or system file.

The ACL attached to a file showing its permissions represents another type of attribute.

Finally, the file may have extended attributes recording an author, copyright information, or tags for indexing/searching.

17
Q

Metadata for web

A

the server returns the resource plus headers setting or describing its properties

One key use of headers is to transmit authorization information, in the form of cookies. Headers describing the type of data returned (text or binary, for instance) can also be of interest

Header info can be logged by web servers

18
Q

Email metadata

A

When an email is created, the mail user agent (MUA) creates an initial header and forwards the message to a mail delivery agent (MDA). The MDA should perform checks that the sender is authorized to issue messages from the domain.

the MDA adds or amends its own header and then transmits the message to a message transfer agent (MTA). The MTA routes the message to the recipient

Headers aren’t exposed to the user by most email applications. You can view and copy headers from a mail client

19
Q

Email Internet header

A

A record of the email servers involved in transferring an email message from a sender to a recpient.