Email Forensics & Malware Forensics

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/57

flashcard set

Earn XP

Description and Tags

Flashcards on Email Forensics & Malware Forensics

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

58 Terms

1
New cards

Role of Email in Investigations

Scams and fraud attempts using phishing or spoofing necessitate investigators to examine and interpret unique email content.

2
New cards

Pharming

A technique where DNS poisoning redirects a user to a fake site.

3
New cards

Spam Act 2003

Prohibits sending unsolicited commercial electronic messages with an Australian link.

4
New cards

Roles of Client and Server in E-mail

Emails are sent and received through client/server architecture, differing in OS and software; protected accounts require usernames and passwords.

5
New cards

E-mail client

Email client programs like Microsoft Outlook and Evolution.

6
New cards

E-mail server

Email server programs such as Exchange Server and Sendmail.

7
New cards

Email Header

The envelope of the email with sender/receiver address, subject, time, delivery stamps, author, CC, and BCC.

8
New cards

Email Body

The main content of the email message.

9
New cards

Email Encoding

A protocol that translates emails, allowing different email programs to pass data.

10
New cards

Multipurpose Internet Mail Extensions (MIME)

A protocol that allows non-ASCII files (video, graphics, and audio) to be built in the email message

11
New cards

Email Attachment

Extra items that supplement the body of an email.

12
New cards

SMTP(Port 25)

Simple Mail Transfer Protocol is a core Internet protocol used to transfer email from client to server and server to server.

13
New cards

POP3 (Port 110)

Post Office Protocol allows clients to retrieve stored email.

14
New cards

IMAP (Port 143)

Internet Message Access Protocol provides a means of managing e-mail messages on a remote server and retrieve stored e-mail

15
New cards

Investigating E-mail Crimes and Violations

Investigators must find who is behind the crime, collect evidence, present findings, and build a case while knowing applicable privacy laws.

16
New cards

Tracing an Email

In email forensics, the process to find out where an email came from

17
New cards

Router Logs

Record all incoming and outgoing traffic and have rules to allow or disallow traffic, resolving the path an email has taken.

18
New cards

Firewall Logs

Filter email traffic and verify email passage using these logs.

19
New cards

Email Server

Loaded with software using email protocols, maintains logs for investigations, and can recover deleted emails.

20
New cards

Microsoft Exchange Server

Uses a database based on Microsoft Extensible Storage Engine (ESE) for email data

21
New cards

Magnet AXIOM

Tool with 'Process' and 'Examine' modules for email forensics.

22
New cards

Recovering Outlook Files

Necessary to reconstruct .pst files and messages, also recovers deleted files

23
New cards

Message Tracking Logs in Exchange

A setting in Exchange that records log files of e-mail traffic as messages travel between mailboxes within the organization.

24
New cards

Email Forensics Obstacles

Open relays, false 'received from' headers, open proxies, and SSH tunnels.

25
New cards

Malware

A type of software that cybercriminals use to harm computer systems or networks.

26
New cards

Malware Forensics

The objective is to identify collected malicious code and examine its behavior in a secure environment through static and run-time analysis.

27
New cards

Malware Forensic Artifacts

File system, email, cryptographic, registry, and log file anomalies.

28
New cards

System Baselining

A snapshot of the baseline state of the forensic workstation before conducting Malware execution

29
New cards

Static Analysis

Involves going through the executable binary codes without the actual execution, i.e., through IDA Pro.

30
New cards

Identifying file dependencies

Identifying file dependencies through Dependency Walker, Snyk.

31
New cards

Indicators window

A list of suspicious elements in a PE file's metadata examination (Pestudio).

32
New cards

DLLs used to run and load programs

kernel32.dll, Wininet.dll, Advapi32.dll, User32.dll, WSock32.dll, Ntdll.dll.

33
New cards

Run-Time Analysis

Behavioral analysis, executing malware code to simulate the environment.

34
New cards

Monitoring Network Activities

Scanning to check IP addresses, Open ports, DNS entries.

35
New cards

Registry Artifacts Analysis

Malware manipulates the registry to run automatically

36
New cards

System Behavior Analysis

Malware uses Pes (portable executables) to inject themselves into processes

37
New cards

Malware Initial Assessment

Examine malware's characteristics such as file name, hash value, file size, file type and strings.

38
New cards

Malware Concealment

The location where malicious code is placed. Can be in alternate data streams, binary padding, hidden files, memory or registry keys.

39
New cards

Sandboxing

A sandbox is isolated for safe malware execution, capturing interactions—file access, registry changes, network traffic—assisting in analysis and understanding of actions.

40
New cards

Malware Code Analysis

Use of hex editors, disassemblers, and debuggers to understand malware's functionality.

41
New cards

Malware Communication Analysis

Analyzing communication patterns of malware.

42
New cards

Incident Response

The process of identifying an incident, its cause, and the damage it has caused

43
New cards

Incident Response steps

Preparation, identification, containment, eradication, recovery, and lessons learned.

44
New cards

Preparation Phase

Creating and maintaining incident response plan, assembling an incident response team, establishing communication protocols, and investing in necessary tools and training.

45
New cards

Identification Phase

Detecting and analyzing security events to determine if they constitute an incident. Involves monitoring systems, reviewing logs, and using intrusion detection/prevention systems (IDS/IPS)

46
New cards

Containment Phase

Limiting the scope and impact of an incident to prevent further damage. Includes isolating affected systems, segmenting networks, and disabling compromised accounts.

47
New cards

Eradication Phase

Removing the root cause of the incident from the environment. This may involve patching vulnerabilities, removing malware, and reconfiguring systems.

48
New cards

Recovery Phase

Restoring systems and data to normal operation. This may involve restoring from backups, rebuilding systems, and verifying functionality.

49
New cards

Lessons Learned Phase

Reviewing the incident and the response to identify areas for improvement. Includes documenting the incident, analyzing the effectiveness of the response, and updating incident response plans and procedures.

50
New cards

SIEM Tools

Security Information and Event Management (SIEM) tools are used to collect and analyze security logs and events from various sources to identify and respond to incidents.

51
New cards

SOAR Platforms

Security Orchestration, Automation, and Response (SOAR) platforms automate incident response processes by integrating various security tools and technologies.

52
New cards

EDR Systems

Endpoint Detection and Response (EDR) systems monitor endpoint devices for suspicious activity and provide tools for incident investigation and response.

53
New cards

Network Forensics

Network Forensics is the process of capturing and analyzing network traffic to investigate security incidents and gather evidence.

54
New cards

Memory Forensics

Memory Forensics involves analyzing the contents of a computer's memory (RAM) to uncover malware, hidden processes, and other evidence of compromise.

55
New cards

Timeline Analysis

Timeline Analysis is the process of creating a chronological timeline of events to understand the sequence of actions that occurred during an incident.

56
New cards

Rootkit Analysis

Rootkit Analysis involves identifying and analyzing rootkits, which are malicious software tools designed to hide the presence of malware and provide unauthorized access to systems.

57
New cards

Data Loss Prevention (DLP)

Data Loss Prevention (DLP) tools monitor and prevent sensitive data from leaving the organization's control.

58
New cards

Vulnerability Scanning identifies