Forensics After Midterm
Forensics After Midterm
Authentication Processes:
o Single-Factor Authentication:
o Multi-Factor Authentication:
1. After username and password verification, a one-time
password (OTP) is generated.
7. IDS/IPS Logs
Definition:
o Intrusion Detection Systems (IDS) monitor network traffic
for signs of potential intrusions.
o Intrusion Prevention Systems (IPS) go a step further by
actively blocking detected threats, such as dropping packets
or terminating malicious sessions.
Key Evidence Provided:
o IP addresses of the source and destination.
o Port numbers for both source and destination.
o Matched signatures indicating known attack patterns.
o Details about ongoing attacks and malware presence.
o Information on Command and Control (C&C) servers,
which direct compromised devices.
Purpose in Network Forensics:
o Detect and block real-time malicious activities.
o Trace the origin of an attack.
o Analyze patterns to prevent future intrusions.
8. Firewall Logs
Definition:
Preparation Phase:
Focuses on deploying necessary tools like Intrusion
Detection/Prevention Systems (IDPS), firewalls, and packet
analyzers.
Ensures authorization and legal compliance to protect user
privacy before deployment.
Detection Phase:
Tools generate alerts or warnings indicating potential security
breaches or policy violations.
A quick validation process is carried out to confirm whether the
suspected activity is indeed an attack.
Preservation Phase:
Examination Phase:
Analysis Phase:
Evaluates collected evidence to identify specific indicators of
intrusion.
Utilizes statistical analysis and data mining to reconstruct
attacking patterns and understand the attack’s purpose and
methodology.
Investigation Phase:
Focuses on identifying the attacker based on the analysis results.
Addresses challenges like IP spoofing or other techniques attackers
use to hide their identity.
Investigation methods depend on the type of attack.
5. Presentation Phase
The final stage involves compiling the findings into a clear, concise,
and legally admissible format.
2. Content:
3. Storage:
4. Privacy:
5. Seizure:
Seizing network devices can disrupt individuals or organizations
significantly more than seizing hard drives. In extreme cases,
seizing network equipment can result in an entire network segment
being taken offline indefinitely.
6. Admissibility:
Sources of Attacks:
Network attacks can originate from external or internal sources within a network.
Monitoring such attacks is possible using tools like network analyzers (e.g.,
Wireshark).
Detection Process:
Definition:
Purpose:
Could indicate:
2.ICMP scan
ICMP Scan:
2. Ping of Death:
3. Smurf Attack:
4. Traffic Anomalies:
1. Sort by Destination:
3.TCP-SYN scan
Definition:
How it Works:
Attack Scenarios
1. Half-Open Connections:
2. Full Connections:
o Once connected, the attacker can exploit the open port for
malicious purposes.
Detecting TCP-SYN Scans
2. Packet Behavior:
1. Communication Lines:
o Attackers generate overwhelming traffic that floods and blocks
the communication lines.
2. Traffic Analysis:
1. Issue:
2. Investigation:
o Verify IP and MAC addresses to check for spoofing or worms
generating false source addresses.
1. Traffic Pattern:
3. Overwhelmed Services:
Definition:
Detection:
Mitigation:
o Monitor DNS and HTTP logs for early signs of brute force
activity.
Details to Obtain:
2. Check Traffic
Normal:
Suspicious:
Normal:
o Standard port numbers like 80 (HTTP), 137/8/9 (NetBIOS),
3389 (RDP), 20/21 (FTP), etc.
Suspicious:
4. TCP Patterns
Normal:
Suspicious:
5. Massive Traffic
Normal:
Suspicious:
6. Broadcasts
Normal:
Suspicious:
Suspicious:
File Analysis
File analysis is a critical process in digital forensics aimed at
understanding the nature of files to extract meaningful artifacts. It
involves two primary components:
1. Content Identification
2. Metadata Extraction
1. Content Identification
The goal of content identification is to confirm the file's type and purpose
by examining its content, structure, and associated data.
Purpose: To determine what the file is and who has access to its
data.
File Extensions:
File Signatures:
Types of Metadata:
o Image Metadata:
o Audio/Video Metadata:
o Document Metadata:
Email Analysis
- Importance of Emails:
- Forensic Importance:
Emails can contain incriminating evidence, including unintentional
documentation of people's activities.
o Evidence collection.
o Presentation of findings.
o Building a case.
Sending an Email:
Receiving an Email:
Protocols:
Storage: Since emails are stored locally, they are readily accessible
for forensic analysis when the computer is seized.
Webmail:
Limitations:
Advantages:
Usability: Ideal for users who need to access and manage their
emails across multiple devices simultaneously.
Email Headers
Email headers provide essential details about the sender, receiver, and
servers involved in an email's journey. These headers serve as a forensic
tool to trace the email's origins and verify its authenticity.
Key Details in Email Headers
1. Logical Address:
2. Visibility:
1. Basic Fields:
2. Metadata:
o Date: Timestamp of when the email was sent. Note that the
sending device's clock may affect accuracy.
3. Security Protocols:
o Received-SPF: Indicates whether the email passes Sender
Policy Framework (SPF) checks, a security measure to prevent
spam and phishing.
1. Optional Field:
2. Lack of Standardization:
3. Decoding Complexity:
Example:
Mechanism:
Forged Emails
Example of Forgery:
Indicators of Forgery:
How It Works:
Importance:
DKIM is widely used alongside SPF (Sender Policy
Framework) and DMARC (Domain-based Message
Authentication, Reporting, and Conformance) for a
comprehensive email authentication framework.