Podcast
Questions and Answers
Which of the following file systems can page to swap?
Which of the following file systems can page to swap?
The device file associated with hardware remains constant across all boots.
The device file associated with hardware remains constant across all boots.
False
What is the purpose of the /dev/ directory?
What is the purpose of the /dev/ directory?
/dev/ holds device 'files' for each device on the system.
The device naming pattern for storage devices is represented as xx[a,b,c,d..][1,2,3,4..], where xx identifies the ______ type.
The device naming pattern for storage devices is represented as xx[a,b,c,d..][1,2,3,4..], where xx identifies the ______ type.
Signup and view all the answers
Match the following device identifiers with their descriptions:
Match the following device identifiers with their descriptions:
Signup and view all the answers
What is the purpose of the $MFTMirr?
What is the purpose of the $MFTMirr?
Signup and view all the answers
$LogFile is important for recovery from inconsistencies in the NTFS file system.
$LogFile is important for recovery from inconsistencies in the NTFS file system.
Signup and view all the answers
What information does the $Volume record contain?
What information does the $Volume record contain?
Signup and view all the answers
The _______ tracks used and free clusters on the volume in bitmap format.
The _______ tracks used and free clusters on the volume in bitmap format.
Signup and view all the answers
Which record number corresponds to the $Boot file?
Which record number corresponds to the $Boot file?
Signup and view all the answers
The $AttrDef file is responsible for providing volume information such as the volume label.
The $AttrDef file is responsible for providing volume information such as the volume label.
Signup and view all the answers
What does the $Root Directory represent?
What does the $Root Directory represent?
Signup and view all the answers
Match the following MFT entries with their purposes:
Match the following MFT entries with their purposes:
Signup and view all the answers
What is the purpose of the Log Sequence Number (LSN) in the MFT Record Header?
What is the purpose of the Log Sequence Number (LSN) in the MFT Record Header?
Signup and view all the answers
The Update Sequence Number is used to identify the file's status as live or deleted.
The Update Sequence Number is used to identify the file's status as live or deleted.
Signup and view all the answers
What does the $STANDARD_INFORMATION attribute store?
What does the $STANDARD_INFORMATION attribute store?
Signup and view all the answers
The __________ contains a globally unique identifier for the file.
The __________ contains a globally unique identifier for the file.
Signup and view all the answers
What information does the Link Count maintain in an MFT record?
What information does the Link Count maintain in an MFT record?
Signup and view all the answers
What is the purpose of the $SECURITY_DESCRIPTOR attribute?
What is the purpose of the $SECURITY_DESCRIPTOR attribute?
Signup and view all the answers
Match the following attributes to their primary function:
Match the following attributes to their primary function:
Signup and view all the answers
The ________ Offset indicates where the attribute list starts in the MFT entry.
The ________ Offset indicates where the attribute list starts in the MFT entry.
Signup and view all the answers
Which of the following is NOT a common hive file in the Windows Registry?
Which of the following is NOT a common hive file in the Windows Registry?
Signup and view all the answers
HKEY_CURRENT_USER stores settings that are common to all users on the system.
HKEY_CURRENT_USER stores settings that are common to all users on the system.
Signup and view all the answers
What file extension represents a backup copy of the HKEY_LOCAL_MACHINE\System hive?
What file extension represents a backup copy of the HKEY_LOCAL_MACHINE\System hive?
Signup and view all the answers
Each hive file is stored in the directory [%SYSTEMROOT%]\System32\config and user-specific hives are found under each user's profile, typically at C:\Users______.
Each hive file is stored in the directory [%SYSTEMROOT%]\System32\config and user-specific hives are found under each user's profile, typically at C:\Users______.
Signup and view all the answers
Which root key contains information about file associations and OLE data?
Which root key contains information about file associations and OLE data?
Signup and view all the answers
The .regtrans-ms file extension is related to the transaction log tracking changes to keys.
The .regtrans-ms file extension is related to the transaction log tracking changes to keys.
Signup and view all the answers
Name one of the primary root keys that contains hardware and system settings.
Name one of the primary root keys that contains hardware and system settings.
Signup and view all the answers
Match the following root keys with their descriptions:
Match the following root keys with their descriptions:
Signup and view all the answers
Which type of device is represented by 'nvme0n1p1'?
Which type of device is represented by 'nvme0n1p1'?
Signup and view all the answers
EXT4 file systems do not support the creation of unlimited subdirectories.
EXT4 file systems do not support the creation of unlimited subdirectories.
Signup and view all the answers
What major improvement does EXT4 offer over its predecessors?
What major improvement does EXT4 offer over its predecessors?
Signup and view all the answers
The _____ allows pages to be moved from a separate partition in the event of page faults.
The _____ allows pages to be moved from a separate partition in the event of page faults.
Signup and view all the answers
Match the EXT versions with their features:
Match the EXT versions with their features:
Signup and view all the answers
What feature of EXT4 helps in reducing fragmentation?
What feature of EXT4 helps in reducing fragmentation?
Signup and view all the answers
Inodes store the filename associated with the files and directories.
Inodes store the filename associated with the files and directories.
Signup and view all the answers
What does 'fb' stand for in registered devices?
What does 'fb' stand for in registered devices?
Signup and view all the answers
What is slack space in the context of file storage?
What is slack space in the context of file storage?
Signup and view all the answers
Drive slack only occurs in SSDs.
Drive slack only occurs in SSDs.
Signup and view all the answers
What types of configuration information is stored in /Users//Library?
What types of configuration information is stored in /Users//Library?
Signup and view all the answers
/Applications folder contains all the installed __________.
/Applications folder contains all the installed __________.
Signup and view all the answers
Match the following folders with their descriptions:
Match the following folders with their descriptions:
Signup and view all the answers
Which type of slack refers to unused space at the end of a sector?
Which type of slack refers to unused space at the end of a sector?
Signup and view all the answers
CUPS print spool is stored in /private/var/log.
CUPS print spool is stored in /private/var/log.
Signup and view all the answers
Where are system-wide log files stored in macOS?
Where are system-wide log files stored in macOS?
Signup and view all the answers
Study Notes
Forensics Overview
- Digital forensics is the process of using scientifically proven methods to recover, analyze, and present data for legal use. It ensures evidence integrity and reliability.
- Primary Objectives:
- Preservation: Safeguarding data against tampering or loss.
- Collection: Acquiring data from various sources, maintaining chain of custody.
- Examination: Employing tools and techniques to analyze relevant data.
- Analysis: Interpreting findings to reconstruct events or answer questions.
- Reporting: Summarizing findings in a clear, organized, and legally acceptable format.
- Locard's Exchange Principle: Emphasizes that every interaction leaves a trace. Applied to digital forensics, this means evidence can be found in log files, metadata, or deleted files.
- Acquisitions methods:
- Traditional methods include removing the hard drive, imaging it elsewhere, or using the suspect machine. Other methods include live system analysis (RAM/network).
- Techniques for acquiring evidence include writing block, image acquisition tools, and analysis tools.
- Integrity:
- Robust findings are essential in legal proceedings
- ACPO Principles guide the collection and preservation of evidence.
- Key considerations include scientific approach, sound tools, chain of custody, and evidence tampering prevention.
- Hashing and fingerprinting methods are used to verify evidence integrity.
Hashing-Fingerprint
- Hashing creates a unique fingerprint of data.
- Different hash functions (SHA1, MD5, SHA256) produce unique values.
- Hash values are helpful for comparison and verification.
- Caveats and potential problems needing consideration.
ACPO Principles
- No actions should alter original evidence.
- Established policies and procedures should be followed.
Evidence-Based Arguments
- Scientific and technical endeavors rely on evidence.
- Evidence pieces are linked together to form larger assertions.
Types of Investigation
- Context, investigative questions, evidence types vary with investigation.
- May involve a single machine or multiple devices.
- Artefact analysis includes files, logs, network traces, and logical or physical data.
Investigative Approach
- Data reduction is crucial in forensics and involves narrowing the scope.
- General approaches used, but pivot based on specific needs of investigation.
- Data search and analysis methods include text search, hash lookups (known files/images), and recently/most used files.
FAT Overview
- FAT (File Allocation Table) was developed in 1970s.
- Used in smaller storage systems (USB drives, SD cards).
- Various FAT versions (FAT12, FAT16, FAT32) exist to handle increasing volume sizes.
FAT Disk Structure
- Partition Boot Sector: Contains basic volume information.
- Reserved Sectors: Reserved sectors.
- FAT Table 1 and n: Hold cluster information; FAT1 is primary table, FAT2 (n) can be backups.
- Root Directory: Holds the root folder of the volume.
- Data Area: Contains all file data.
Calculations for Cluster Identification
- Calculations to find the location of specific data clusters (FAT table, boot sector, root directory).
File Allocation Table (FAT)
- Tracks cluster allocation statuses (free, in use, or with damage).
FAT 32 Overview
- Root directory: Holds metadata about files and folders in the disk.
- Data area: Contains actual file data and folders to the disk.
- FAT 32 disk structure: Partition Boot Sector, Reserved Sectors, FAT table(s), Root Directory, Data Area.
- Calculation cluster to locate specific data.
- FAT tables help to trace clusters to locate file data.
FAT32 and 12/16 Disk Structures
- Contain important information like bytes per sector, cluster size, and root directory space.
- Used by Windows for logical structures like the boot sector and FAT tables.
Key Components for FAT File System
- Key parameters for understanding FAT are needed for interpreting filesystem data, including bytes per sector, sectors per cluster, reserved sectors, and number of FAT tables.
FAT 12/16 Partition Boot Record
-Defines parameters essential in understanding the structure of the file system including bytes per sector, sectors per cluster.
Timestamps
- Timestamps stored in local time, and might fluctuate depending on how/where the files are accessed.
NTFS File System
- NTFS is the standard file system for Windows.
- Offers advanced features like large file support, security, and data recovery.
- Implements a journaling system to prevent errors.
- Uses 64-bit clusters for handling large files, compression, and encryption.
- Includes features like Alternative Data Streams for storing additional data, sparse files for empty space management, and more.
NTFS Boot Record
- Contains crucial parameters for interpreting the file system structure.
Master File Table (MFT)
- The central database for file records in NTFS. Contains metadata about files and directories on the volume, including filenames, timestamps, and permissions.
NTFS Filesystem
- Includes metadata files (e.g., $MFT, $MFTMirr) for file management.
###File and Folder Deletion in NTFS
- File deletion in NTFS involves marking MFT entries as unused, but the data remains in clusters until overwritten.
Windows Registry and Artefacts
- The Windows Registry is a hierarchical database containing settings and operating system options.
- Contains configuration settings, hardware configurations, software installations, user profiles, etc.
- Hive files (e.g., SYSTEM, SOFTWARE, NTUSER.DAT) are physically stored on the disk and essential to system operation
- Registry keys are similar to folders, organizing related settings.
- Registry values hold specific data.
Web Browser Forensics
- Web browsers save browsing history, cache (temporary files like images, HTML, and scripts), cookies (session data, login tokens, tracking data), downloads, and more.
- Examining artifacts like browser cache and history reveals user activity information.
- Browser artifacts provide valuable data including browsing history, cookies, and cached files.
Unix System Forensics
-
Unix systems store data differently than Windows systems, lacking a centralized registry and organizing data in files and folders instead.
-
Log files are stored in /var/log, and other important folders are /etc (config), /home (user profiles), and /proc (live system information).
-
Timestamping varies based on epoch time, whereas Windows often uses local time.
-
Common Unix filesystems (e.g., EXT2, EXT3, EXT4) include metadata like extent trees, inodes, and block groups are crucial for understanding and analyzing file structures and locations.
-
Unix file systems are decentralized with key locations typically in /proc, /etc, /var, /home, essential for forensic analysis.
-
Unix file system data is primarily stored in files, whereas Windows uses a centralized registry.
-
Understanding Unix file systems structure, key directories, logs, and permissions is crucial for the analysis.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Explore the fundamental principles of digital forensics, including data preservation, collection, examination, analysis, and reporting. Learn about Locard's Exchange Principle and various acquisition methods for evidence recovery. This overview serves as a foundation for understanding the importance of integrity and reliability in forensic data analysis.