Digital Forensics Midterm

5.0(1)
studied byStudied by 7 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/142

flashcard set

Earn XP

Description and Tags

Digital Forensics (CIS4203.01)

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

143 Terms

1
New cards

Audio Steganography

The approach of hiding information within an audio signal

2
New cards

indistinguishable

As data is embedded in the signal, it gets changed. This modification should be ____ to the human ear.

3
New cards

digital description and transmission media

An audio environment is decided by two considerations:

4
New cards

Sample Quantization Rate

How many bits per unit time?

5
New cards

Temporal Sampling Rate

The range of the frequency.

6
New cards

LSB (least significant bit)

replacing the least significant bits of the cover media with secret data to embed information.

7
New cards

frames

A video is a collection of ___ which are jpeg images

8
New cards

Steganography

the practice of concealing information within another message or physical object to avoid detection

9
New cards

Encryption

Hides the content of the message

10
New cards

Steganography traits

Hides the existence of the message,
needs a common knowledge,
doesn’t alter overall structure of data,
visibility 0, decipherability 100

11
New cards

types of steganography

text, image, audio, video, network

12
New cards

Text in text

Hiding information inside Text files

13
New cards

Types of text in text

Format Based Method • Random and Statistical Generation • Linguistic Methods, invisible inks

14
New cards

format based

include altering physically the format of text to conceal the data.

15
New cards

format based flaws

If the stego file is opened with a word processor, misspellings and additional white spaces will get identified. • Changed fonts sizes can excite suspicion to a human reader. • if the initial plaintext is accessible, comparing this plaintext with the suspected steganographic text can create manipulated element of the text quite visible.

16
New cards

Random character sequences

Conceal information in a sequence of characters that looks random

17
New cards

Statistical properties

Use the statistical properties of letter frequencies and word length to create words that appear to have the same statistical properties as actual words in a language

18
New cards

Linguistic Approach

Synonym substitution • To embed messages, a cover text must provide information carriers that can be modified to represent the secret.

19
New cards

Most existing stegosystems consist of three independent modules

linguistic transformation, encoder generation, and text selection.

20
New cards

image

a collection of numbers that defines color intensities in different areas of the image.

21
New cards

pixel

defined by a fixed number of bits and this is its color scheme.

22
New cards

red, green and blue

All color variations for the pixels of a 24-bit image are derived from three primary colors:

23
New cards

8 bits

each primary color is represented by

24
New cards

24-bit pixel

Digital color images are typically stored in ____ depth and uses the RGB color model.

25
New cards

Lossy compression

removes redundancies that are too small for the human eye to differentiate which makes the compressed files a close approximate, but not an exact duplicate of the original one.

26
New cards

JPEG

example of lossy compression

27
New cards

PNG, GIF, BMP

example of lossless compression

28
New cards

Lossless compression

never removes any information from the original image, but instead represents data in mathematical formulas maintaining the integrity of the original image and when uncompressed, the file is a bit-by-bit copy of the original.

29
New cards

Spatial Domain

techniques embed the secret message/payload in the intensity of the pixels directly.

30
New cards

LSB Supstitution

Most popular spatial domain

31
New cards

Lossless images

best suited for these techniques as compression would not alter the embedded data

32
New cards

Frequency-domain techniques

first transform the image and then embed the data.

33
New cards

transformation step

ensures that the message is hidden in less sensitive areas of the image, making the hiding more robust and makes the entire process independent of the image format.

34
New cards

JPEG Compression

transforms the image from RGB color to YCbCr representation - separating brightness from color.

35
New cards

DCT

expresses a finite sequence of data points in terms of a sum of cosine functions oscillating at different frequencies

36
New cards

quantization step

the one that removes redundant information from the image by rounding 64 values into 1 by taking average

37
New cards

Line Shift

secret message is hidden by vertically shifting the text lines to some degree

38
New cards

Word Shift

secret message is hidden by shifting the words horizontally

39
New cards

Feature coding

some of the features of the text are altered.

40
New cards

Word Mapping

encrypts a secret message using genetic operator crossover and then embeds the resulting cipher text, taking two bits at a time, in a cover file by inserting blank spaces between words of even or odd length using a certain mapping technique

41
New cards

MS Word Document

In this technique, text segments in a document are degenerated, mimicking to be the work of an author with inferior writing skills, with secret message being embedded in the choice of degenerations which are then revised with changes being tracked

42
New cards

Syntactic Method

This technique uses punctuation marks such as full stop (.), comma (,), etc. to hide bits 0 and 1.

43
New cards

Semantic method

uses the synonym of certain words thereby hiding information in the text.

44
New cards

Where to find evidence

Forensic, Imaging, Physical and Logical Disk Structures, Main Memory, File System, System Storage

45
New cards

Raw Image

A raw image file contains only the data from the imaged volume.

46
New cards

EnCase (E01) file

contains metadata about the image. The metadata that is contained in both the header and footer captures and stores information about the drive type, operating system, and timestamps.

47
New cards

Cyclical Redundancy Check (CRC)

ensures the integrity of the preceding block of data over the entire image file.

48
New cards

File system

a method and data structure that the operating system uses to control how data is stored and retrieved.

49
New cards

Types of File System

Disk FS, Flash FS, Tape FS

50
New cards

Logical Disk Structures

partitions, mounts, formatting, hidden partitions

51
New cards

Types of Computer Files

Test, image, audio, video, log, exe, dii, others

52
New cards

File signatures

a unique identification number seen at the beginning of a file. It tells you the file’s type and provides information about the data it contains.

53
New cards

Switches

core switches for a range of network segment and edge switches for individual segments.

54
New cards

Content Addressable Memory

Maps the physical ports on the switch to the Network Interface Card

55
New cards

Routers

The Routing Table. Logs traffic and data flow.

56
New cards

Firewalls

NIDS, NIPS, DLP, Logs.

57
New cards

Authentication Servers:

Successful or unsuccessful login, credential manipulation

58
New cards

SIEM

Security Information and Event Management, and is a security management system that combines security information management (SIM) and security event management (SEM)

59
New cards

Network tap

a system that monitors events on a local network.

60
New cards

tap

typically a dedicated

hardware device, which provides a way to

access the data flowing across a computer

network

61
New cards

Switch Port Analyzer (SPAN)

the switch closest to the compromised host will have port mirroring enabled. This then sends the traffic from the entire segment the switch is on to the system that is on the mirrored port

62
New cards

tcpdump

a command-line tool specifically designed for packet capture.

63
New cards

File Name

Each log file or packet capture should have its own unique name.

64
New cards

Description

A brief description of the file.

65
New cards

Location

The location is important. Eg: the packet capture was obtained on the switch located at 192.168.2.1

66
New cards

Date and time

Record the date and time the file was transferred to the medium

67
New cards

Collected by

Initials are sufficient for the log file.

68
New cards

Command and Control (C2)

A technique used by threat actors to communicate with compromised devices over a network

69
New cards

C2 Works by

The attacker starts by establishing a foothold to infect the target machine, which may sit behind a Next-Generation Firewall. This can be done in a variety of ways: • Via a phishing email that: Tricks the user into following a link to a malicious website or opening an attachment that executes malicious code. • Through security holes in browser plugins. • Via other infected software

70
New cards

Types of C2

Centralized, P2P, Random Architecture

71
New cards

Random Architecture Model

hardest to detect. This is by design. The objective is to prevent security personnel from tracing and shutting down the C&C server or identifying the botnet’s chain of command. This model functions by transmitting communications to the infected host (or botnet) from disparate sources: • IRC chat rooms • CDNs • Social media comments • Email

72
New cards

C2 Subtechniques

Application Layer Protocol • Removable Media • Data Encoding, Obfuscation • Encrypted Channels, Fallback Channels • Non-Standard Port • Remote Access Software • Protocol Tunneling

73
New cards

Malware delivery

With control of a compromised machine within a victim’s network, adversaries can trigger the download of additional malware

74
New cards

Data theft

Sensitive data, such as financial documents, can be copied or transferred to an attacker’s server.

75
New cards

Shutdown

An attacker can shut down one or several machines, or even bring down a company’s network.

76
New cards

Reboot

Infected computers may suddenly and repeatedly shutdown and reboot, which can disrupt normal business operations.

77
New cards

Defense evasion

Adversaries commonly attempt to mimic normal, expected traffic to avoid detection. Depending on the victim’s network, attackers establish command and control with varying levels of stealth to circumvent security tools.

78
New cards

Distributed denial of service

overwhelm server or networks by flooding them with internet traffic. Once a botnet is established, an attacker can instruct each bot to send a request to the targeted IP address. This creates a jam of requests for the targeted server.

79
New cards

Memory Acquisition

Hard disk drive from a shut down computer – primary source.

80
New cards

USB device or writable medium directly connected to the system.

Running memory can be acquired locally in two ways:

81
New cards

live systems

systems that are running and are at the time of identification potentially holding evidence that may be lost or hard to acquire if the system is shut down.

82
New cards

dead systems

systems not running. Any data in temporary storage areas such as cache, main memory, running processes, or active application dialogues on a computer will normally be lost when the system is powered down.

83
New cards

Post-mortem analysis

associated with analysis of a “dead” (not running) computer or electronic device.

84
New cards

Local

Direct Physical Access to the system

85
New cards

Remote

Not onsite. Portability issues etc

86
New cards

Online

Live systems

87
New cards

Offline

Dead systems

88
New cards

Network-based Evidence

• Switches • Routers • Firewalls • NIDS/NIPS • Web Proxy Servers • DHCP Servers • Authentication Servers • Application Servers

89
New cards

Preservation Tasks

• Isolate • Secure • Document

90
New cards

Collection

• Acquisition of physical devices • Digital copies of Digital devices.

91
New cards

Evidence Integrity

to ensure that evidence is neither accidentally nor intentionally changed when collecting digital data from an original source.

92
New cards

order of volatility

prioritization wrt the volatility of the data. Most volitile data should be acquired before less volatile data

93
New cards

volatiility

data lifetime.

94
New cards

Access Restrictions and Encryption

Restricted or encrypted information should be acquired early if we cannot ensure access later

95
New cards

Powered On

Keeping a device on can make the data vailable at a later time, but running processes might overwrite data

96
New cards

Shutdown

Powering off a device might overwrite data. Pulling the battery will delete data from RAM that is not written to nonvolatile memory

97
New cards

Physical Interface

Different data can often be acquired from different interfaces

98
New cards

Communication Protocol

Different data can often be acquired using different communication protocols

99
New cards

Lab Resources

Availability of lab resources will often be a limiting factor when selecting acquisition method. Time is also a resource.

100
New cards

Interpretation

The data can be just gibberish if we are not able to interpret it correctly