Question

In: Computer Science

Digital Forensics, Please describe in detail in your own language Describe Linux their artifacts and their...

Digital Forensics, Please describe in detail in your own language

Describe Linux their artifacts and their functionalities.

How they might be used by forensic examiners?

Solutions

Expert Solution

Introduction

A computer’s Operating System (OS) is the collection of software that interfaces with computer hardware and controls the functioning of its pieces, such as the hard disk, processor, memory, and many other components.

Forensic investigation on an OS can be performed because it is responsible for file management, memory management, logging, user management, and many other relevant details.

The forensic examiner must understand OSs, file systems, and numerous tools required to perform a thorough forensic examination of the suspected machine. Modern OSs track a good deal of information that could become artifacts of evidentiary value on the eve of forensic examination.

Describe Linux their artifacts and their functionalities.

Linux is an open source, Unix-like, and elegantly designed operating system that is compatible with personal computers, supercomputers, servers, mobile devices, netbooks, and laptops. Unlike other OSs, Linux holds many file systems of the ext family, including ext2, ext3, and ext4.

/etc    [%SystemRoot%/System32/config]

This contains system configurations directory that holds separate configuration files for each application.

/var/log

This directory contains application logs and security logs. They are kept for 4-5 weeks.

/home/$USER

This directory holds user data and configuration information.

/etc/passwd

Linux forensics is often IR driven, but sometimes one comes up in a File Use & Knowledge investigation. It is a given that an examiner will more likely be dealing with a PC or Mac system but when a Linux box eventually rolls in it is good to know some basic triage artifacts so the investigation does not stall completely.

Artifacts:

Below are the Linux artifacts, Consider these entry level artifacts that may be easily interpreted, with a little validation testing, by a “non-linux” examiner.

Computer System Profile Information

ID Suspicious Accounts

Profile User account activity


Profile User Login History

Web Browsing Evidence

What are the Examination Steps in Forensics?

There are five basic steps necessary for the study of Operating System forensics. These five steps are listed below:

    1. Policies and Procedure Development
    2. Evidence Assessment
    3. Evidence Acquisition
    4. Evidence Examination
    5. Documenting and Reporting

Data Analysis for Forensics

Forensic examiners perform data analysis to examine artifacts left by perpetrators, hackers, viruses, and spyware. They scan deleted entries, swap or page files, spool files, and RAM during this process. These collected artifacts can provide a wealth of information with regard to how malicious actors tried to cover their tracks and what they were doing to a system.

What Tools Are Most Useful When Conducting Operating System Forensics?

Forensic Toolkit for Linux

Forensic specialists use a forensic toolkit to collect evidence from a Linux Operating System. The toolkit comprises many tools such as Dmesg, Insmod, NetstatArproute, Hunter.O, DateCat, P-cat, and NC.

X-Ways Forensics

X-Ways Forensics offers a forensics work environment with some remarkable features, such as:

  • Disk imaging and cloning, including under Disk Operating System (DOS)
  • Compatible with UDF, CDFS, ext2, ext3, NTFS, and FAT
  • Views and dumps the virtual memory of running processes and physical RAM
  • Gathers inter-partition space, free space, and slack space
  • Mass hash calculations for files
  • Ensures data authenticity with write protection feature
  • Automated files, signature check, and much more

Figure 3 shows the interface of an X-Ways Forensics.


Related Solutions

Please describe in detail your knowledge of electrical engineering? Please describe in detail your knowledge of...
Please describe in detail your knowledge of electrical engineering? Please describe in detail your knowledge of mechanical engineering? Please describe in detail your knowledge of computer software? What does customer service mean to you? What interests you most about this position? What are your career goals? Why are you looking for another job? What is your business travel tolerance? What has been your business travel levels in your past opportunities?
Please describe in detail your knowledge of electrical engineering? Please describe in detail your knowledge of...
Please describe in detail your knowledge of electrical engineering? Please describe in detail your knowledge of mechanical engineering? Please describe in detail your knowledge of computer software? What does customer service mean to you? What interests you most about this position? What are your career goals? Why are you looking for another job? What is your business travel tolerance? What has been your business travel levels in your past opportunities?
Describe in detail, the AISC Code in your own words.
Describe in detail, the AISC Code in your own words.
Digital Forensics, at least 250 words Chapter 5 goes into great detail about Windows systems, however,...
Digital Forensics, at least 250 words Chapter 5 goes into great detail about Windows systems, however, other systems, such as Mac, Linux exist. Search for one other system not mentioned in your book and describe their artifacts and their functionalities. How they might be used by forensic examiners? Be sure to list your sources.
In your own words, can you write a detail description of the language activation theory of...
In your own words, can you write a detail description of the language activation theory of 1. Jean Piaget 2. B.F Skinner 3. Noam Chomsky 4. Lev Vygotsky Can someone please help
In your own words, describe digital curation. Research online what impact digital curation is having on...
In your own words, describe digital curation. Research online what impact digital curation is having on content marketing and explain this. What techniques could you use to capitalize on this trend?
An insurance company has asked your digital forensics firm to review a case for an arson...
An insurance company has asked your digital forensics firm to review a case for an arson investigation. The suspected arsonist has already been arrested, but the insurance company wants to determine whether there’s any contributory negligence on the part of the victims. Two files were extracted to your work folder for this project: a).The first, Letter 1.doc, is a memo about the case from the police department. b).The second, Letter 2.doc, is a letter from the insurance company explaining what...
My language is Chinese. Question: Describe how tone is used in your own language. Is tone...
My language is Chinese. Question: Describe how tone is used in your own language. Is tone grammatical? Vocabulary? The way you speak? Or is it something else?
In your own words and in detail list and describe the benefits of budgeting in a...
In your own words and in detail list and describe the benefits of budgeting in a business. Also list and describe in detail the components of a Master Budget.
Linux is open source software. Using your own words describe the essence of open-source software and...
Linux is open source software. Using your own words describe the essence of open-source software and how it differs from proprietary software, and explain in detail why one kind of software offers its users a more consistent experience.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT