Operating System Forensics

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is the file extension for ESE?

.EDB

Clipboard

A storage area that temporarily stores the items for a user to paste in another location of the document or office file

Print Spool

A temporary file created to hold print jobs in a Windoes OS so user can continue working while printer is printing

netstat

A universal command-line utility used to examine the TCP/IP connections open on a given host.

The system cannot modify the _____ data, thus retrieving ____ data can offer raw details of the file and execution of malware

ADS

allows the files to have more than one stream of data, which are invisible to the windows explorer and require special tools to view

ADS

offers ease in creating and accessing the additional streams, thus making it easy for the perpetrators to hide the data within the files and access them when required. Attackers can also store executable files in the ______ and execute them using the command line utility.

ADS

Features of X-ways forensics tool:

Access logical memory of running processes, Gather slack space, free space, inter-partition space, and generic text from drives and images, Ability to read partitioning and file system structures, Memory analysis for local RAM or memory dumps, Disk cloning and imaging

a NTFS file system feature, which helps users to find a file using alternate metadata information such as author title

Alternate data stream or ADS

Which of the following does the Remote Desktop Protocol not carry between a terminal server and a client?

Application Data

How to query diablelastaccess on a device

C:\>fsutil behavior query disablelastaccess

By default, in Windows operating system the '.SPL' and .SHD files are stored in the spool folder driver in what folder?

C:\Windows\System32\spool\PRINTERS

Reg.exe

CMD tools for accessing and managing the registry

small utility that reads the cache folder of Google Chrome Web browser, and displays the list of all the files that are currently stored in the cache. For each cache file, the following information is displayed: URL, Content type, File size, Last accessed time, Expiration time, Server name, Server response, etc.

ChromeCacheView

displays the list of all cookies stored by Google Chrome Web browser. It also allows deleting unwanted cookies and exporting the cookies into text/csv/html/xmlfile

ChromeCookiesView

small packages of data made to track, validate, and maintain specific user information. _________may have an expiration date, after which the browser deletes it. The system can also delete the ________ without the need of an expiration date at the end of a user session. The users may also delete data directly from the browser.

Cookies

can be used to enable, disable, install, configure, and remove devices

DevCon

Devcon Features

Display driver and device info, search for device, Change device settings, Restart the device or computer

netstat -e

Displays Ethernet statistics, such as the number of bytes and packets sent and received. This parameter can be combined with -s

netstat -n

Displays active TCP connections However, the addresses and port numbers are expressed numerically with no specified names

netstat -o

Displays active TCP connections and includes the process ID (PID) for each connection. You can find the application based on the PID on the Processes tab in Windows Task Manager

netstat -r

Displays the routing table and shows if any persistent routes are enabled

program that performs a quick analysis of a crash dump file. This enables you to see summary information about what the dump file contains. If the dump file is corrupt in such a way that it cannot be opened by a debugger, _________reveals the same to the investigator

DumpChk (the Microsoft Crash Dump File Checker tool)

data storage technology from Microsoft, made to store and retrieve data sequential access data storage technology from Microsoft, made to store and retrieve data sequential access

Extensible Storage Engine

HDFS is a highly fault-tolerant, with high throughput, suitable for applications with large data sets, streaming access to ____ ____ ____ and can be built out of commodity hardware.

File system data

allows you to save the clipboard data to a file and also load clipboard data from a file, so that you can transfer clipboard contents between computers

Free Clipboard Viewer

Registry Key for hibernate

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power

The system stores the information about shared files and folders in the following registry root key: an investigator also wants to acquire information regarding the resources that the system is making available to other users over the network where would you look?

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanServer\Shares

SPL and SHD files contain metadata in unicode format and require capable tools to explore such as:

Hex Editors and UCCHECK

Tools like find & mount help to collect the information from the

Hidden Partition

logical section of a disk which is not accessible to the operating system

Hidden Partition

may contain files, folders, confidential data, or backups of the system

Hidden Partition

AutoRuns

Lists all programs that will run on start up and where they are called from

Passware Search Index Examiner

Lists all the emails, documents, spreadsheets, and other items indexed by Windows Desktop Search, Retrieves item properties, such as creation and modification dates, author, recipients, and summary content, Requires only one file from the target PC, a Windows Desktop Search Database (.edb), Saves reports in common formats: XML, Comma Separated Values (.csv)

a storage space, where the system stores a memory backup, in case of a system failure

Memory Dump/Crash Dump

Microsoft Security ID

Microsoft Security ID refers to a unique identification number that Microsoft assigns to a Windows user account for granting the user access to a particular resource

What are the commands to determine logged on users?

PSloggedon Logonsessions -p LogonSessions net session/ netsessions

implements a new concept of deleted or lost partition recovery. It locates and mounts partitions into the system, thus making those lost partitions available. It will also work in case any Boot Record (including the Master Boot Record) is missing, damaged or overwritten

Partition Find and Mount

can create, delete, erase, format, defragment, resize, copy, and move partitions and modify their attribute

Partition Logic

is a hard disk partitioning and data management tool. It can create, delete, erase, format, defragment, resize, copy, and move partitions and modify their attributes. It can copy entire hard disks from one to another

Partition Logic

Having a swap space allows your computer's operating system to pretend that you have more _____ than you actually do

RAM

NETSTAT [interval]

Refreshes and redisplays the statistics specified in the command at the stated number of seconds specified in place of [interval] in the code syntax.

tasklist /u domain\user

Runs the command with the account permissions of the user specified by User or Domain\User

netstat -a

Show active connections

netstat - p

Shows connections for the protocol specified. In this case, the Protocol can be tcp, udp, , icmp, ip, icmpv6, ipv6 tcpv6, or udpv6. Using this parameter with -s will display protocol based statistics

listdlls command

Shows modules and dlls in use. A tool & its parameters for seeing what DLLs are referenced by an EXE displays the full path of the loaded module as well as the version of the loaded DLL By using this information, the investigators can find the actual code. Spyware, Trojans, and even rootkits use a technique called DLL injection to load them into the memory space of a running process

doskey /history

Shows previously typed commands, is also capable of showing what drives or shares a target system has mapped to

tasklist /v

Specifies that verbose task information be displayed in the output. Also list all process id's for application and services.

tasklist /s comuter

Specifies the name or IP address of a remote computer

(TASKLIST) /P [password]

Specifies the password of the user account that is specified in the /u parameter

tasklist / fi filtername

Specifies the types of process (es) to include in or exclude from the query

(TASKLIST) /M [module]

Specifies to show module information for each process

is the tool used to discover Hidden Alternate Data Streams (ADS) and clean them completely from system. In this tool, auto analysis is coupled with Online Threat Verification mechanism. It consists of a multi-threaded ADS scanner and a built in File Type Detection system

StreamArmor

Linux operating system allocates certain amount of storage space on a hard disk called

Swap Space

What is considered volatile information in the OS?

System time/date time /t date /t

What tools/ commands are used to collect detailed information regarding process ?

Tasklist Pslist Listdlls Handle

Programs and processes create _________ when they cannot allocate enough memory for the tasks or when the program is working on a large set of data. In general, when a program terminates, the system deletes these temp files. However, some programs create temp files and leave them behind.

Temporary Files

Meta Data

The Meta data of the file system generally provides information about content locations, file size and MAC timestamps

Application data

The application data gives information about the File system journal Quota statistics

What parameters can an investigator use to retrieve full process information?

The full path to the executable image (.exe file) The command line used to launch the process, if any The amount of time that the process has been running The security/user context that the process is running in The modules the process has loaded The memory contents of the process

ipconfig

The utility used to display TCP/IP addressing and domain name information in the Windows client operating systems.

nbstat -r

This command displays the count of all NetBIOS names resolved by broadcast and by querying a WINS server

Fsutil

This command performs the tasks that are related to file allocation table (FAT) and NTFS file systems, such as managing reparse points, managing sparse files, or dismounting a volume

Content Data

This data has most of the information of the file system. It consists of the content of the file system

nbtstat -n

This displays the names that have been registered locally on the system by NetBIOS applications such as the server and redirector

nbtstat -S

This option is used to list the current NetBIOS sessions and their statuses

ClearPageFileAtShutdown

This particular registry value tells the operating system to clear the page file when the system is shut down

allows you to extract thumbnail images from the thumbcache_*.db and iconcache_*.db database files found on Windows Vista, Windows 7, Windows 8, Windows 8.1, and Windows 10. The program comes with both graphic user interface and command-line interface

Thumbcache Viewer

a disk image file format, which is having the functionalities similar to a typical hard drive. It stores contents including a file system, disk partitions, boot record, files, and folder.

VHD/ virtual hard disk

allows users to cache the contents of web pages locally, in order to speed future access to regularly visited sites. This can be done because, the downloaded content remains on the hard drive until deleted. However, the data remains in the unallocated space of the hard drive even after deleting the cache

Web Browser Chache

supports indexing for over 200 common file types by maintaining a record of all the documents. It also allows the users to quickly access any document such as messages, calendar events, contacts, and media files

Windows Search Index

DisableLastAccess

Windows has the ability to disable the updating of the last access times on files. This feature is actually meant for performance enhancement, particularly on high-volume file servers

What should be used to scan virtual memory?

X-ways forensics tool

Edge stores history records, Cookies, HTTP POST request header packets and downloads in:

\Users\user_name\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat

Edge Cached Files location

\Users\user_name\AppData\Local\Packages\Microsoft.MicrosoftEdge_xxxx\AC\#!001 \MicrosoftEdge\Cache\

Edge last browsing history location

\Users\user_name\AppData\Local\Packages\Microsoft.MicrosoftEdge_xxxx\AC\Micro softEdge\User\Default\Recovery\Active\

If the last browsing session open was in PrivacIE mode then the browser stores these records where?

\Users\user_name\AppData\Local\Packages\Microsoft.MicrosoftEdge_xxxx\AC\Micro softEdge\User\Default\Recovery\Active\{browsing-session-ID}.dat

ESE database

\Users\user_name\AppData\Local\Packages\Microsoft.MicrosoftEdge_xxxxx\AC\Micr osoftEdge\User\Default\DataStore\Data\nouser1\xxxxx\DBStore\spartan.eb

ProcDump

a command-line utility its primary purpose is to monitor applications for CPU spikes and generating crash dumps during a spike so that an administrator or developer can determine the cause of the spike

Free Clipboard Viewer

a program used to view the information that is stored in memory when you use copy and cut functions in Windows operating system. A clipboard viewer displays the current content of the clipboard.

PMdump

a tool that lets you dump the memory contents of a process to a file without stopping the process

Handle

a utility that displays information about the open handles for any process in the system. You can use it to see the programs that have an open file or to see the object types and names of all the handles of a program This information is useful to determine the resources accessed by a process while it is running Handle helps in searching open file references, and find out whether the user has specified any command-line parameters; it will then list the values of all the handles in the system`

Promqry

can determine if a Windows system has network interfaces in promiscuous mode. It has command line and GUI versions. Users can run the tool using any of the versions and dump its output to a text file. It cannot detect standalone sniffers or sniffers running on non-Windows operating systems

PromiscDetect

checks to see if NIC is in promiscuous mode, which may be a sign that there is a sniffer running on the computer

DevCon

command-line tool that displays detailed information about devices on computers running Windows operating system

The _______ can store data in encrypted form, mostly in an ________file, which includes the date and time information. The investigators can use this file to fetch any evidence regarding the incident

cookies, index.dat

Pslist

displays basic information about the already running processes on a system, including the amount of time each process has been running (in both kernel and user modes). show detailed information about the threads or memory used by a process. However, it does not provide information about a process in regard to the path to the executable image, the command line used to launch the process, or the user context in which the process runs

tasklist.exe

displays the list of applications and services along with the Process IDs (PID) for all tasks that running on either a local or a remotely connected computer

Five Sections of File Systems

file system data, content data, metadata, file name, and file system application data

PD

forensically dumps the memory of a running process, it is a command line interface tool that dumps the whole process space, uses meta-information to describe the different mappings, states and saves the process environment

File system data

gives details about the file system structure, like file system and file system block size, number of allocated blocks etc

nbtstat

helps to troubleshoot NetBIOS name resolution problems. When a network is functioning normally, NetBIOS over TCP/IP (NetBT) resolves NetBIOS names to IP addresses

What are the commands used to determine open files?

net file psfile openfiles

is a hidden file on the Windows operating system, which is used as virtual memory to expand the physical memory of a system

pagefile.sys

The OS splits physical RAM into bits/chunks of memory called

pages

__________ allows to login to remote systems in situations when current set of security credentials would not permit access to the Event Log. It retrieves message strings from the computer on which the event log resides. It shows the contents of the System Event Log on the local computer and allows formatting of Event Log records

psloglist

nbstat -c

shows the contents of the NetBIOS name cache, which contains NetBIOS name-to-IP address mappings

Process Explorer

shows the information about the handles and DLLs of the processes which have been opened or loaded

Slack space

space generated between the end of the file stored and the end of the disk cluster

Investigators can gather services information using the _________command line tool

tasklist


संबंधित स्टडी सेट्स

Growth and Development: OB & PEDS

View Set

NUS111: ELIMINATION/DIGESTION REVIEW

View Set

chapter 15: Health Promotion of the School-Age Child and Family

View Set

PHIL 186 - Quiz 10; Corporate Social Responsibility

View Set

Chapter 17: Government Budgets and Fiscal Policy

View Set