Old exam questions 1. Discuss and reason about the similarities and differences between the following: A) Digital Forensics and Security? - Security wants to preserve the digital system the way it is by observing the policy that has been defined, meanwhile forensics attempt to explain how the policy came to be violated, which may lead to finding flaws, making improvements in the future. Similarities could be recovery of information. B) Digital Forensics and Auditing? - Similarities could be that both implies methodical and systematic examination or review of the work, results, process and/or behaviour 2. With respect to content of this course; What is the definition of evidence on an overarching level? - Overarching is some principles that should be followed. Not change the evidence, only access original evidence to a forensically competent person, seizure, access, storage, transfer of DE should be documented, preserved and available for review. 3. With respect to the definition of evidence, what is the definition of the following: A) e-Evidence or Digital evidence? - Is evidence that is stored or transmitted in a digital form. It could be photos on a computer that is showing something illegal, there could be any IM that are send to a perpetrator that could contains valuable information or illegal act. There could be log files that contains digital evidence. Digital evidence is a very broad word and can be almost everything in these days. But one fundamental is that is evidence either transmitted or stored in digital form. B) The seven major types of evidence that has been presented during this course? Please list and briefly explain the various types of evidence. - Real - Hersey - Document - Testimony - Direct - Circumstantial - Original 4. What is the major goal or purpose of a forensic examination process? - To know what, when, how something happened and who did the crime. And also, to preserve, analyse and present evidence in a structure way called chain-of-custody and could be used in some sort of proceedings such as legal, institutional, organizational A) Which are the important attributes of the gathered evidence in order to maintain the forensic soundness of the evidence? Based on primarily two BIG factors, trustworthiness and completeness of the digital evidence. And could be divided to the four smaller attributes shown below: - Documentation is key to forensic soundness - Chain-of-custody and integrity - Authentication - Handling digital evidence B) Why are these attributes so important? - When the presentation of the evidence is strong, no one had altered the evidence, all evidence was analysed in an independent way. If the forensic soundness is not maintained some people could get an wrong sentence and could be very devastating. 5. Explain the processes of collection and examination of digital evidence in detail. Provide an example for each phase from your lab work - Collection of evidence should be done according to the set of predefined policies: Sensitivity to humidity, temperature, pressure, static electricity. - Examination is when a forensic examiner are doing a duplicate also called a image, and should also follow the principle order of volatility, do the most volatile examinations first 6. Explain Locard’s principle. Give two examples of how Locard’s principle could be applied in the context of a digital crime investigation – Locard’s principle states that with contact between two items, there will be an exchange of microscopic material. In a digital forensic context, it could mean that the preparator takes something away from the criminal scene but also leave some traces. In one example the preparator have done a hack, and took valuable information from the organization but he also leaves traces in form of log files, the system could have captured some valuable data such as IPaddress, remote access trojan software (RATS) and so on. In another context there could be child abusing material, where the preparator leaves digital evidence in form of GPS-coordinates, camera model in the metadata of the pictures. Lochard’s principle is a good way of thinking that the preparator will almost leave some digital track when he committing a crime. 7. Please provide an overarching description of the concept of data recovery. Also describe the following in more detail: - The first step would include to identify any potential data that has either been deleted, manipulated, hidden. Some tools can be used or a forensic examiner could look in to MFT/link files/prefetch files for any traces of data that had been deleted, moved. Next step is to do some type of file carving either manually or with some tools. With the tools you get an automated way of doing this and would save time, and also the tools in used are often more granular, when doing it manually you could miss important evidence. In other hand if you only relay on tools you need to have some understanding of what the tools are doing and how it’s work A) What various actions or processes can cause the need of data recovery? - Files/folders are deleted - Files/folders are damaged or corrupted - Files/folder are hidden B) Is the process of data recovery always the same? Explain and elaborate - No it’s not always the same, because the preparator could use different types of process to either hide, delete or corrupt evidence. There could also depends on the different nature of the incident, it could involve network, computer etc. 8. What is residual data? - Information/data that has been deleted from a computer but which persists and can be recovered using different types of file carving tools. The information is in unallocated storage or in file slack space, and the information came from files that have been deleted but not erased. Example if you delete a picture, you are only deleting the file pointer to where the file is located on disk, so the picture is still there until it’s overwritten with new data. 9. Is it possible to make digital evidence equivalent to scientific evidence? How? Explain in detail and provide some examples. Illustrate the difficulties! 10. As an investigator you have found a Link File on a Windows system. This link file points to a missing file. What could be the significance of this link file in your investigation? Explain what information can be retrieved from it. 11. What is Hiberfil.sys and what information you can retrieve from it? - Hiberfil.sys is a repository for the contents of RAM (in a compressed format) when a system is told to hibernate (such as when the lid of a laptop is closed). You could retrieve valuable information that’s are stored in RAM, such as password, unencrypted files that are in use, what programs is running. I short it saves the current state from where the user last used the computer. So it could be anything but depends on what the user had do. 12. What is a Spool File in the context of printer files and what does it contain? – It is a file that save data for later processing or printing. An in short in holds data until it could be printed. printer spool files on Windows and UNIX systems can contain data from files that have been deleted or encrypted 13. What information can you find from the System logs in a Windows system? - A forensic examiner could find different types of events that occurred on a system. It shows informational, error and warning events related to the computer OS. It could be a violation when a user tried to log in with wrong password, it could be that a user changed 14. In the context of the Windows $MFT, please answer the following questions: A) What is the difference in the time stamps found in Standard Information Attribute and File Name Attribute? - Timestamps in FNA are only linked to the filename of that particular file and would often not change. FNA timestamps would change when a user moves a file to another location, e.g., to a USB-drive or to a different volume. Timestamps in SIA are linked to the file and the information in that file. If a user changes the content of the file then the modified time stamp would change, if the user reads the file then access timestamp would change. When a user created a file then creation/birth would be created. B) What is the importance of Data Attribute? - Data attribute shows if a file is resident or non-resident and could be valuable for a forensic. Data attribute either contains or refer to the actual content of a file. If the file size is small around 700K, the actual data is stored in $MFT (resident) 15. Please define what digital evidence is? – Digital evidence is evidence that are stored or transmitted in a digital form. That could be a picture that is of child abuse material and stored in a computer and then transmitted over internet to a different user. Digital evidence could also be logfiles that’s is only stored on a computer. 16. Explain briefly the Locard’s principle? Locard’s exchange principle state that with contact of two items, there will be exchange of microscopic materials. 17. Provide at least two way how Locard’s principle would affect a digital event scene? – With the principle in mind a forensic examiner could identify digital evidence that a preparator could had leave behind, data in log files, pictures, software that had been in use when hacking a system. The examiner should also identify what types of information that the preparator would have taken away from a crime scene, e.g. valuable data, identifies, photos. 18. What are hypothesis formation and evaluation in the context of digital forensics examination? – A forensic examiner forms a hypothesis based on the observation and the evidence. It’s a necessary start and it may be proved or disproved. The process of testing and validating (or invalidating) the hypothesis commonly improves the understanding and hence the interpretation of the digital evidence. Several hypothesis, vetting and integrating - A forensic examiner then do a exhaustive evaluation of the physical and logical properties of the retrieved data, the devices where data are stored • Controlled test base and the numbers that provide statistical significance Sometimes there is a need to amend or modify the existing methods and the ways tools are being used 19. What is the most significant legal issue in digital forensics? - Admissibility of Evidence 20. What is steganography? – Is a process of hide data or information in other types of information. It could be a picture with a message to another user that something would occur in a specific time, that is a crime. It could also be audio files, documents that contain data that’s is hidden for a regular user/forensic investigator. 21. Why do we need a chain of custody? - To be sure that the evidence has not been altered, and it will protect those people who had been working with the evidence. Without chain of custody a preparator could argue that the evidence is planted and altered. With chain of custody everything is documented and handle in a such way that if something is altered it would be written down. You have some kind of tracking so that you exactly would know what have been done with the evidence. A record of the chain of evidence must be maintained and established in the court whenever presenting evidence as an exhibit. Otherwise, the evidence may be inadmissible in the court leading to serious questions regarding its legitimacy, integrity, and the examination rendered upon it 22. What implications, from a forensic perspective, does the mount functionality present in Linux systems and its configuration files (e.g. /etc/fstab) brings? - What drives that had been automatic mounted on a linux system. 23. What is meant by the term “Order of Volatility”? Why is it an important principle to apply in a forensic acquisition? - Order of volatility means that you should analyse the most volatile evidence first, if a computer is on you would do a memory dump, that capture the data in the RAM, and then you would do a frozen image of the hard drives. If you would not capture any RAM data and shutdown the computer, some valuable information could be lost. And there for you should apply the process that comes with order of volatility, which again means capture the most volatile (non-persistent) data first that otherwise would be lost. 24. What are the most important files (and locations) where information about the user accounts and groups present in a Linux system can be found? Briefly describe their contents - I would say /etc/passwd, there are users, groups, which shell they uses, service accounts. 25. Where and what kind of information can a forensic investigator find in terms of the command (shell) history - All commands that a user have interpreted on that system. History is a very good command to analyse what a user had done in a system. 26. What is the syslog and why is it an interesting evidence source from a forensic perspective? 27. Hashing is an identification method commonly used to catalogue and identify files. Explain how hashing may be used in forensic investigations. - Hashing could be used to show that original data has not been tampered/altered with if a forensic examiner had done a copy of a hard drive/volume. With hashes you could see if the data has been changed if the hashes don’t match the original data hash. 28. Explain the concept of the ‘prefetch’ folder in a Windows operating system and how it can be used to infer user activity. – Prefetch folder would store exe files and other importance files that had been use earlier and is a process for make the operation system more efficient for loading files that had been used. It could be very valuable for a forensic examiner to check prefetch folder for any information that a user had been using. 29. Why there is a difference between Logical file size and Physical file size in the Windows operating system? What is the rationale behind it? 30. What is the “Shadow Copy” process and why it is used? 31. What is the difference between the time stamps found in the Standard Information Attribute and the File Name Attribute? - The difference is that FNA stores timestamp about the filename itself, and the SIA store timestamp about the information in the file. 32. What is a Reparse Point? – A redirection capability in the Windows NTFS file system. Containing up to 16KB of data and a tag indicating their purpose, reparse points are somewhat similar to Windows shortcuts and Unix symbolic links. For example, a reparse point would allow a folder such as C:\DVD to point to E:, the actual DVD drive. A reparse point may be used to point to a file that has been temporarily relocated on a different drive 33. Differentiate between FILETIME and DOSTIME format. - FILETIME is on NTFS, access time: up to 1hour, write time 100 nanoseconds, create time 100 nanoseconds (UTC) - DOSTIME is on FAT, access time 1day, write time 2seconds, create time 10milliseceonds (local time) 34. For an investigator what is the significance of the Last Modified time stamp of NTUSER.DAT and the time encoded in the “ShutdownTime” registry key? 35. Please enumerate the three main computer crime categories and explain their characteristics. Give an example for each one of the categories. - Computer as repositories: Store data related to different crimes, example pictures, valuable data - Computer as tool: for committing a crime, e.g. communicate crime related stuff, host a criminal site, hack - Computer as a target: some targets could be confidentially, authorization, availability of the information and the services provided. Database, DDOS hacks etc. 36. Discuss the concept of quality assurance in the context of digital evidence and digital forensic examination. What are the key components of QA. Quality Assurance – QA - DE and DF facilities should produce high-quality results and should be, Reliable, Accurate, Reproducible, Legally acceptable and defensible 37. Explain briefly the Locard’s principle? Provide at least two ways how Locard’s principle might affect a digital event scene? 38. What are hypothesis formation and evaluation in the context of DFI? 39. What are the essential characteristics of the CFSAP model? - CFSAP stands for Computer Forensic Secure Analyze Present, and is the model with least granularity and are abstract. CFSAP is a could framework to have and then develop some smaller process in that framework for the particular case. 40. Contrast live vs. frozen system processing with respect to digital forensic examination. Pros and cons. Provide examples. 41. What does the property of preimage resistance mean in a context of a hashing function? 42. What does it mean to forensically “wipe clean” an acquisition drive? Please explain the ramifications of a forensically clean drive. 43. State the digital evidence extraction/acquisition hierarchy! - Micro-read Chip-off Physical Logical Manual 44. What is meant by the term “Order of Volatility”? Why is it an important principle to apply in a forensic acquisition? 45. Explain the concept of a ‘file header’ and discuss to what extent it can be trusted as an indicator of a file’s contents. 46. Why in the Windows operating system there is a difference between Logical file size and Physical file size? What causes such a difference to appear? 47. Briefly describe the usage of $LogFile. - All metadata changes to a file system are logged to ensure the consistent recovery of critical filesystem structures after a system crash. The logged metadata is stored in the $LogFile which are found in a root directory of an NTFS filesystem 48. What type of information can be retrieved from Standard Information Attribute? What type of information can be retrieved from File Name Attribute? - For SIA when a file or data in that particular file was change, created or modified. - For FNA when a filename was last modified, created or changed. FNA is usually not updated, only when a particular file is moved to another location, then FNA is updated according to the SIA. 49. Differentiate between Metadata and File System Metadata? - Metadata or application metadata is metadata about a particular file created in an application, like an office document. Metadata associated with that office document is stored, how many words, sentences, which user who created the document and MAC times for that file. Application metadata is part of the software file itself. - File system meta data is metadata about the file, when it was created, modified or accessed - The difference is that there are either an application that creates the metadata (application metadata) or the operating system that creates the metadata (file system metadata) 50. What is the importance of Thumbnail Cache in a Windows XP system for an investigator? - Importance of Thumbnail cache is that the operating system store thumbnails of pictures, movie files, PDF document etc in a database and if a user removes the picture, the thumbnail of that picture or file could still be in the thumbnail database. If a forensic examiner analyze the thumbnail database and find some interesting pictures or file that are not present on the computer, then the file can still be seen and some metadata like date-time stamp can be analysed. 51. In operating systems using NTFS, a term “slack space“ is very well know phenomenon. Explain what it is and how it can be used in the context of digital forensic investigations. 52. Name one important forensic artifact that is present in a Windows 10 system, and what evidentiary value it could hold. 53. If a Unix user tends to use a command line interface how might a systems administrator easily review what that user had been doing on the system recently - history is a good command for checking for what command a user had interpreted earlier. You could also check the bashrc-history file. There you have all the commands in a “text-file” 54. Briefly outline the first-tier and the second-tier phases of the Digital Forensics Investigation Processing Framework 55. Please enumerate the three main computer crime categories and explain their characteristics. Give an example for each one of the categories. - Computer as a tool: e.g. doing some illegal like a hack, ddos, communicate. - Computer as a target: Exploit the computer that is a target, gather valuable information/users. - Computer as a repository: store illegal data on the computer, pictures, movies, documents. 56. What is the highest level in the hierarchical model for the examination of digital evidence? - micro-read?! 57. Explain briefly the Locard’s principle? Provide at least two ways how Locard’s principle might affect a digital event scene? 58. Who is the plaintiff and the accused in the case of a criminal investigation? 59. Discuss the concept of mutability in the context of digital evidence. 60. What are the five concerns that should be addressed by a Digital Forensic investigation (DFI) according to the FBI handbook of Forensic services? 61. What is the property of second preimage resistance in the context of a hashing function? 62. What is the avalanche effect when it refers to a specific hashing function? 63. What is the principle of the “Order of Volatility? Please briefly outline its importance and application in the process of a forensic acquisition? 64. Explain the concept of a ‘file header’ and discuss to what extent it can be trusted as an indicator of a file’s contents. 65. What are the major differences between NTFS and FAT systems? – FAT is an old file system and have limited volume/file size and also uses DOS-time. Filesize in FAT is 4GB and in NTFS it’s 16tb, volume size in FAT is 2TB and in NTFS it’s 256TB. 66. What is time frame analysis and why it is important? 67. What is the significance of a Link file and what information can be retrieved for it in a digital forensic investigation? 68. As a digital forensic investigator how can you differentiate between a manual, user scheduled and Windows automatic defragmentation? 69. What is an Alternate Data Stream and how a malicious entity can use it? 70. While the file permissions of the files associated with the installed program can be misleading (in a digital forensic investigation)? 71. Name one important forensic artifact that is present in the Windows 10 system and the relevance of the evidentiary value it could hold. - LNK files is an very important artifact. When a user open a file, program, the OS is creating a LNK file to that particular usage of that file. If a user deletes the file there could be some evidence of that particular file left e.g. a LNK files that points to the deleted file. Metadata that is included could be when the file first was opened = when the LNK files was created. LNK files also points to where the file was on the disk. Accessed time when the file was last opened. 72. What is the purpose and the content of a file descriptor in a Unix-like operating system file systems? 73. In the context of Windows OS file systems, please answer the following questions: A) What is the file size potential of FAT? - 4GB B) What is the volume size potential of FAT? - FAT12 32MB - FAT16 2GB - FAT32 2TB C) What is the file size potential of NTFS? - 16TB D) What is the volume size potential of NTFS? - 256TB 74. What is the importance of Thumbnail Cache in a Windows system, for a forensic investigator? 75. The Windows setup log files are useful and important in order to identify the version or “flavor” of a Windows OS. In the context of Windows setup log files, please describe how the “setuplog.txt” log file is used with one sentence. 76. Please explain and describe the concept of Logical file size and Physical file size in the context of the Windows operating system. How can potential differences between the two types of file sizes be explained? 77. What is meant by the term “Order of Volatility”? Why is it an important principle to apply in a forensic acquisition? 78. What is spoliation?