Topic 4 Flashcards

1
Q

Name 3 different types of storage formats for digital evidence

A

Raw Format
Propietary Formats
Advanced Forensic Format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define the Raw Format

A

Raw format is a bit by bit copy of the suspect drive. It uses a bit stream to write a series of of sequential flat files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name 2 advantages and 2 disadvantages of the Raw format

A

Advantages:
Readable by most tools
Fast data transfers
Ability to ignore minor data read errors on source drive
Disadvantages:
Takes up same storage as the original disk or data set
My not collect marginal sectors on source drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name 2 advantages and disadvantages of Proprietary Formats

A

Advantages
option to compress
option to split an image into smaller segments
option to integrate metadata into the image file
Disadvantages
cannot share between different tools
some have maximum file sizes per segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name 4 types of acquisitions

A

Static acquisitions, live acquisitions
logical acquisitions
sparse acquisitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name 4 acquisition methods

A

disk-to-image file
disk-to-disk copy
logical disk-to-disk or disk-to-data file
sparse copy of a folder or file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why would you use a disk-to-disk copy?

A

If you can’t make a disk to image file because of hardware or software errors or incompatibilities. More common in older drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why would you use a logical acquisition or sparse acquisition?

A

When you
are only interested in specific files
do not have time/space to copy the whole drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why would you use a hardware write blocker and not a software write blocker?

A

Software write blockers will change data on the target drive. They use an automatic mounting process that updates boot files by changing metadata such as the most recent access time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do you do if you cannot access the target drive (physically)?

A

Use a boot CD - such as
Mini-WinFE
Linux Live

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does RAID stand for?

A

Redundant Array of Independent Disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name 4 issues in acquiring a RAID?

A

How much storage is necessary?
What type of RAID is used? 0-5, 10, 15
Appropriate acquisition tool
Can acquisition tool combine images for 1 virtual RAID?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What 4 steps do you take in performing an acquisition?

A

Use a target drive that has been recently wiped and reformatted and inspected for virus
Inventory the hardware
For static acquisitions remove the hard-drive. Check date and time values in the system’s CMOS
Record how you aquired data from the suspect drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What steps do you take in performing an analysis?

A

If possible examine the contents of all data files in all folders, starting at the root folder, unless only certain files are of interest
Make best effort to recover password protected files
identify the function of every executable file that doesn’t match known hash values. Make a note of any files or folders that are out of place
Maintain control of all evidence and findings and document everything as you progress through your examination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can you use hash values of known files to speed up analysis?

A

1 By eliminating known innocuous files like system files and
2 By searching for known nefarious files such as child exploitation images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name 5 data hiding techniques

A
  • Hiding files by using the OS, eg changing file extensions, marking folders as “hidden”
  • Hiding Partitions - can unassign a partition drive letter
  • Marking bad clusters - using diskEdit, you can mark a good cluster as bad, and the OS will skip it
  • Bit-shifting - use a macro to change the order of bits
  • steganography
17
Q

How do you deal with hiding files by using the OS?

A

Some DF tools will highlight discrepancies between file headers and the file ectension
- select the option to view hidden files and folders -may be automatic in DF tools though.

18
Q

How do you deal with hiding partitions?

A

Account for all of the storage of the hard drive. Partition gaps are usually 128 bytes

19
Q

How do you deal with marking bad clusters?

A

DF tools, file carving from slack or free space

20
Q

How do you deal with steganography? (5 attacks)

A
  • Stego-only attack - only the file is known. difficult
  • known cover attack - cover media is known
  • known message attack - used to determine the method of hiding for future attacks
  • chosen stego attack - knows what tool was used, uses a passphrase to decrypt
  • Chosen message attack
21
Q

how do you deal with encrypted passwords?

A
  • Can use key escrow
  • various brute force tools
  • determine personal information + brute force = hybrid attack
  • rainbow tables