Day 6 - CyberOps 200-201 Host-Based Analysis
Day 6 - CyberOps 200-201 Host-Based Analysis
Syllabus
Good Resources
▪ Cisco CyberOps Prep
❖ CyberOps Associate self-study plan
❖ FREE!!!!
https://mkto.cisco.com/cyberops-prep.html
▪ DetectionLab
❖ Repository of labs to secure Active Directory
❖ https://detectionlab.network
MyComputerCareer.com 4
Host-Based Analysis
• Certificate Components Overview
• Host Based Analysis Intrusion Detection
• Operating System Components (Windows and Linux)
• Attribution Role in Investigation
• Evidence Types Used in Logs
Certificate Components Overview
▪ Cipher-Suite
❖ The cipher-suite defines what encryption algorithms are used.
❖ A cipher is a set of rules, which can also be called an algorithm, about
how to perform encryption or decryption.
❖ Common methods that ciphers use include the following:
single alphabet, it can use multiple alphabets and switch between them
by some trigger character in the encoded message.
❑ Transposition: This method uses many different options, including the
MyComputerCareer.com 6
Certificate Components Overview
▪ Cipher-Suite
❖ Block and Stream Ciphers
❑ Blowfish
MyComputerCareer.com 7
Certificate Components Overview
▪ Cipher-Suite (cont.)
▪ Stream Ciphers
❖ A stream cipher is a symmetric key cipher
the bits of the key stream, also called a cipher digit stream .
❑ The resulting output is a ciphertext stream.
MyComputerCareer.com 8
Certificate Components Overview
▪ X.500 and X.509v3 Certificates
❖ Popular Formats for digital certificates issued by the CA
❖ X.500 is a series of standards focused on directory services and how
those directories are organized.
❖ Many popular network operating systems have been based on X.500,
including Microsoft Active Directory.
❖ X.509 Version 3 is a standard for digital certificates that is widely accepted
and incorporates many of the same directory and naming standards.
❖ A common protocol used to perform lookups from a directory is the
Lightweight Directory Access Protocol (LDAP).
❖ A common use for this protocol is having a digital certificate that’s used for
authentication, and then based on the details of that certificate.
MyComputerCareer.com 9
Certificate Components Overview
▪ X.509 Certificates (cont.)
❖ As a review, most digital certificates contain the following information:
❖ Serial number: Assigned by the CA and used to uniquely identify the
certificate
❖ Subject: The person or entity that is being identified.
❖ Signature algorithm: Specific algorithm used for signing the digital certificate.
❖ Signature: The digital signature from the certificate authority, which is used by
devices that want to verify the authenticity of the certificate issued by CA.
❖ Issuer: The entity or CA that created and issued the digital certificate.
MyComputerCareer.com 10
Certificate Components Overview
▪ X.509 Certificates (cont.)
❖ Valid from: The date the certificate became valid.
❖ Valid to: The expiration date of the certificate.
❖ Key usage: The functions for which the public key in the certificate used.
❖ Public key: The public portion of the public and private key pair generated by
the host whose certificate is being looked at.
❖ Thumbprint algorithm: The hash algorithm used for data integrity.
❖ Thumbprint: The actual hash
❖ Certificate revocation list location: The URL that can be checked to see
whether the serial number of any certificates issued by the CA was revoked.
MyComputerCareer.com 11
Certificate Components Overview
▪ X.509 Certificates Sample
MyComputerCareer.com 12
Certificate Components Overview
▪ Key Exchange
❖ Key exchange: is the process of exchanging the keys needed for
encryption.
❖ The key refers to the instructions for how to reassemble the characters.
inward.
❖ A One-Time Pad (OTP) is a good example of a key that is only used once.
❖ to encrypt a 32-bit message, we use a 32-bit key, also called the pad,
which is used one time only.
❖ Each bit from the pad is mathematically computed with a corresponding
bit from our message, and the results are our cipher text, or encrypted
content.
MyComputerCareer.com 13
Certificate Components Overview
▪ Key Exchange
Public and Private Key Pairs
❖ A key pair is a set of two keys that work in combination with
each other as a team. In a typical key pair, you have one public
key and one private key.
❖ The public key may be shared with everyone, and the private
key is not shared with anyone.
❖ Another name for this asymmetric encryption is public key
cryptography, or asymmetric key cryptography.
❖ The uses for asymmetric algorithms are not just limited to
authentication.
MyComputerCareer.com 14
Certificate Components Overview
▪ Protocol Version
❖ Many Internet protocols are used in digital certificates, including TLS/SSL,
which is the basis for HTTPS, the secure protocol for browsing the web.
SSL versions are all deprecated along with TLS 1.0 and 1.1. 1.2 and soon
1.3 are secure.
▪ PKCS
❖ Public Key Cryptography Standards (PKCS)
❖ Many standards are in use for the PKI.
❖ Many of them have Public Key Cryptography Standards (PKCS) numbers.
❖ These standards control the format and use of certificates for:
❑ The format for a file that is going to be the new identity certificate,
MyComputerCareer.com 15
Certificate Components Overview
PKCS (cont.)
▪ Here are a few standards you should become familiar with; these include
protocols by themselves and protocols used for working with digital
certificates:
❖ PKCS #1: The RSA cryptography standard.
❖ PKCS #3: Diffie-Hellman key exchange.
❖ PKCS #7: This is a format that can be used by a CA as a response to a
PKCS #10 request. The response itself will very likely be the identity
certificate (or certificates) that had been previously requested.
❖ PKCS #10: This is a format of a certificate request sent to a CA that wants
to receive its identity certificate. This type of request would include the
public key for the entity desiring a certificate.
❖ PKCS #12: A format for storing both public and private keys using a
symmetric password-based key to “unlock” the data whenever the key
needs to be used or accessed.
MyComputerCareer.com 16
Among MD5, SHA-1, and SHA-2, which is the
most secure?
A. SHA-1
B. SHA-2
C. MD5
D. They are all equally secure
A. SHA-1
B. SHA-2
C. MD5
D. They are all equally secure
A. PKCS #12
B. PKCS #10
C. PKCS #7
D. PKCS #2
A. PKCS #12
B. PKCS #10
C. PKCS #7
D. PKCS #2
A. SHA
B. AES
C. MD5
D. RC4
A. SHA
B. AES
C. MD5
D. RC4
A. AES
B. SHA
C. Diffie-Hellman
D. RSA
A. AES
B. SHA
C. Diffie-Hellman
D. RSA
A. AES
B. IDEA
C. Diffie-Hellman
D. MD5
A. AES
B. IDEA
C. Diffie-Hellman
D. MD5
A. PKCS #1
B. PKCS #7
C. PKCS #10
D. PKCS #12
A. PKCS #1
B. PKCS #7
C. PKCS #10
D. PKCS #12
A. Remote access
B. To provide a client-based VPN solution for remote users
C. Managing network equipment remotely
D. Preventing man-in-the-middle attacks by securing traffic
between the client and server
A. Remote access
B. To provide a client-based VPN solution for remote users
C. Managing network equipment remotely
D. Preventing man-in-the-middle attacks by securing traffic
between the client and server
A. Encrypting traffic
B. TCP segmentation and reordering attack
C. Overlapping fragments
D. Sending traffic in very slow method
A. Encrypting traffic
B. TCP segmentation and reordering attack
C. Overlapping fragments
D. Sending traffic in very slow method
❖ HID system
❖ Antimalware and antivirus
❖ Host-based firewalls
❖ Application-level whitelisting/blacklisting
❖ Systems-based sandboxing
https://cyber-
defense.sans.org/resources/papers/gsec/host-vs-
network-based-intrusion-detection-systems-102574
MyComputerCareer.com 49
Host-Based Analysis
▪ Host-Based Intrusion Detection
MyComputerCareer.com 50
Host-Based Analysis
▪ Host-Based Intrusion Detection (cont.)
❖ A disadvantage of a host-based system - has visibility only on traffic or
attacks hitting the host and ignores anything else.
❖ Many commercial products offer management control facilities and
integration to network-based intrusion systems to overcome limitation.
❖ Most security architecture will adopt both network-based and host-
based solutions.
▪ The Cisco Security Agent (CSA) resides between the applications and
the kernel, enabling maximum application visibility with minimal effect on
the stability and performance of the underlying operating system. The
agent can intercept all system calls to:
▪ File, network and registry sources
▪ Dynamic runtime resources—such as memory pages, shared library
modules and Component Object Model (COM) objects
MyComputerCareer.com 51
Host-Based Analysis
Network-Based vs. Host-Based Detection/Prevention Systems
MyComputerCareer.com 52
Cisco CSA Host Implementation
MyComputerCareer.com 53
Cisco Security Agent Network Implementation
MyComputerCareer.com 54
Host-Based Analysis
▪ Anti-Malware and Antivirus
❖ The terms antivirus and antimalware are generally used
interchangeably
❖ Software that can be used to detect and prevent the installation of
computer malware and in some cases, quarantine affected
computers.
❖ Eradicate the malware and restore the operation of the system.
❖ Antivirus was signature-based software that scanned a system or a
downloaded file looking for a match on the signature database.
❖ The signature usually resided on the host itself
❖ User was required to download new signatures to keep up the
protection.
❖ Antimalware integrates the initial functionality of antivirus and
expands it to cope with most modern malware attack techniques.
MyComputerCareer.com 55
Host-Based Analysis
▪ Anti-Malware and Antivirus (cont.)
❖ Similar to IDS and IPS, anti-malware technologies can be implemented in
two modes: Host-Based and Network Based
❑ Network-Based antimalware:
MyComputerCareer.com 56
Host-Based Analysis
Network-Based vs. Host-Based Antivirus/Antimalware Systems
MyComputerCareer.com 57
Host-Based Analysis
▪ Host-Based Firewall
❖ Host-based firewalls are often referred to as “personal firewalls.”
❖ Personal firewalls and Host Intrusion Prevention Systems (HIPSs)
are software applications installed on end-user machines or servers.
❖ The term personal firewall typically applies to basic software that
can control Layer 3 and Layer 4 access to client machines.
❖ HIPS provide several features offering more robust security than a
traditional personal firewall, such as host intrusion prevention and
protection against spyware, viruses, worms, Trojans.
❖ More sophisticated software is available on the market that makes
basic personal firewalls and HIPS obsolete.
❖ Cisco Advanced Malware Protection (AMP) for Endpoints provides
more granular visibility and controls to stop advanced threats
missed by other security layers.
MyComputerCareer.com 58
Host-Based Analysis
▪ Host-Based Firewall (cont.)
❖ Cisco AMP for Endpoints
MyComputerCareer.com 59
Cisco AMP ( Cisco Secure Endpoint)
MyComputerCareer.com 60
Host-Based Analysis
▪ Application-Level Whitelisting and Blacklisting
Three different concepts are defined:
Whitelisting, Blacklisting, and Graylisting:
Whitelist:
❖ A list of separate things that are authorized to be installed or active
on a system in accordance with a predetermined baseline.
❖ Application whitelisting can be used to stop threats on managed
hosts where users are not able to install or run applications without
authorization.
❖ You may want to whitelist that application and prohibit running any
additional applications in the system.
❖ Different application file and folder attributes can help with
application whitelisting. The following are a few examples:
MyComputerCareer.com 61
Host-Based Analysis
▪ Application-Level (cont.)
Whitelist (cont.)
❖ File path:
directory/folder.
❑ This is a very weak attribute if used by itself because it allows any malicious
simply change the name of the file to be the same as a common benign file.
❑ It is recommended to combine path and filename attributes with strict access
MyComputerCareer.com 62
Host-Based Analysis
▪ Application-Level (cont.)
Blacklist:
❖ A list of different entities that have been determined to be malicious.
❖ Application blacklisting works by keeping a list of applications that will
be blocked on a system, preventing such applications from installing.
❖ Major drawbacks of application blacklisting is that the number,
diversity, and complexity of threats are constantly increasing.
❖ The Cisco Firepower solutions include:
MyComputerCareer.com 63
Host-Based Analysis
▪ Systems-Based Sandboxing
❖ Sandboxing limits the impact of security vulnerabilities and bugs
in code to only run inside the “sandbox.”
❖ Goal of sandboxing is to ensure software bugs and exploits of
vulnerabilities cannot affect the rest of the system and cannot
install persistent malware in the system.
❖ Prevents exploits or malware from reading and stealing arbitrary
files from the user’s machine.
❖ The application has complete access to user data and other
system resources.
❖ Several system-based sandboxing implementations available.
❖ Examples:
MyComputerCareer.com 64
Host-Based Analysis
▪ Systems-Based Sandboxing - Example
MyComputerCareer.com 65
Operating System Components (Windows)
▪ Process and Threads – Key Concepts
❖ A process is a program that the system is running.
❑ Is made up of one or more threads, which are the basic unit an operating
❑ Each process starts with a single thread, known as the primary thread, but
MyComputerCareer.com 66
Operating System Components (Windows)
MyComputerCareer.com 67
Operating System Components (Windows)
▪ Services
❖ Windows services are long running executable applications that run in
their own Windows session.
❖ Services run in the background.
❖ Services can automatically kick on when a computer boots up.
❖ Services are ideal for running things within a user security context,
starting applications that should always be run for a specific user,
❖ Windows administrators can manage services using services snap-in,
Sc.exe, or Windows PowerShell.
❖ The services snap-in - built in with the services management console
connecting to a local or remote computer on a network enabling the
administrator to perform actions.
MyComputerCareer.com 68
Operating System Components (Windows)
▪ Services (cont.)
❖ Services are targeted by attackers.
❖ Windows has improved securing services in later versions of the
operating system after finding various attack methods.
❖ Best practice dictates securing services such as disabling the following
services unless they are needed:
❑ TCP 53: DNS Zone Transfer
MyComputerCareer.com 69
Operating System Components (Windows)
MyComputerCareer.com 70
Operating System Components (Windows)
▪ Memory Allocation
❖ Memory can be managed different ways, - referred to as memory
allocation or memory management.
❖ Static memory allocation is when a program allocates memory at
compile time.
❖ Dynamic memory allocation
MyComputerCareer.com 71
Operating System Components (Windows)
▪ Memory Allocation (cont.)
❖ VirtualAlloc is a specialized allocation of the OS virtual memory
system, meaning it is allocated straight into virtual memory via
reserved blocks of memory.
❑ VirtualAlloc manages pages in the Windows virtual memory system.
tables, lists, and other data structures are built to maintain operation
of heap.
MyComputerCareer.com 72
Operating System Components (Windows)
MyComputerCareer.com 73
Operating System Components (Windows)
▪ Windows Registration
❖ Anything performed in Windows is recorded into the registry
❖ the Windows registry is a hierarchical database - stores information
necessary to configure the system for users, applications, and hardware
Registry functions:
❑ Load device drivers,
MyComputerCareer.com 74
Operating System Components (Windows)
▪ Windows Registration (cont.)
❖ The following list defines the functions of the five hives within Windows
registry:
❑ HKEY_CLASSES_ROOT (HKCR)
❑ HKEY_CURRENT_USER (HKCU)
❑ HKEY_CURRENT_CONFIG (HKCC)
❑ HKEY_LOCAL_MACHINE (HKLM)
❑ HKEY_USERS (HKU)
▪ A hive is a logical group of keys, subkeys, and values in the registry that has a
set of supporting files loaded into memory when the operating system is
started or a user logs in.
MyComputerCareer.com 75
Operating System Components (Windows)
▪ Windows Management Instrumentation
❖ Administrators can use Windows Management Instrumentation (WMI) to
track, monitor, and control computers, networking devices, and applications
belonging to an enterprise network over the Internet by using a
standard Web browser such as Microsoft Internet Explorer.
❖ Providing information about the status of local or remote computer systems
❖ Configuring security settings
❖ Modifying system properties
❖ Changing permissions for authorized users and user groups
❖ Assigning and changing drive labels
❖ Scheduling times for processes to run
❖ Backing up the object repository
❖ Enabling or disabling error logging
MyComputerCareer.com 76
Operating System Components (Windows)
▪ Handles
❖ A process handle is an integer value that identifies a process to Windows
❖ Hide the real memory address from the API user while permitting system to
reorganize physical memory that’s transparent to the program.
❖ A handle associate access rights to an API memory value.
❖ A handle leak can occur if a handle is not released after being used.
MyComputerCareer.com 77
Operating System Components (Windows)
▪ Windows Event Logs
Key concepts:
❖ Logs are records of events that happen on a computer.
❖ The most common place for Windows logs is the Windows event log.
❖ Windows Event Viewer is a common tool to view Windows event logs.
❖ You can generally find the Windows event logs in the
C:\Windowsystem3config directory.
❖ Event logs typically maintain three event log types: Application, System,
and Security log files.
❖ Within the log types are generally five event types:
MyComputerCareer.com 78
Operating System Components (Windows)
▪ The Windows File System
You need to understand the different parts in a partitioned hard drive.
❖ Master Boot Record (MBR)
❑ The MBR is the first sector (512 bytes) of the hard drive.
❑ It contains the boot code and information about the hard drive itself.
partition.
❑ While performing forensics analysis, you can verify the existing
partition with the information in the MBR and the printed size of the
hard drive for a match.
❑ If there is some missing space, you can assume a potential
MyComputerCareer.com 79
Operating System Components (Windows)
▪ The Windows File System (cont.)
The Master File Table (MFT)
❖ The first sector (512 bytes) of each partition contains information,
❑ Sector size
❑ Some sectors at the beginning of the partition will be reserved for the
❖ Each entry is 1 KB in size, and when a user deletes a file, the file’s
entry in the MFT is marked as unallocated.
❖ The rest of the partition space after the file system’s area has been
reserved will be available for data.
❖ Each unit of the data area is called a cluster or block.
❖ Two types of clusters; Allocated cluster, and Unallocated cluster
MyComputerCareer.com 80
Operating System Components (Windows)
▪ The Windows File System (cont.)
The File Allocation Table (FAT)
❑ Was the default file system of the Microsoft DOS operating system.
❑ Each version overcame some of the limitations of the file system until the
❑ Boot sector, is the first sector of the partition that is loaded in memory.
• Jump code, which is the location of the bootstrap and the operating
system initialization code
• Sector size Cluster size
• The total number of sectors in the partition Number of root entries
(FAT12 and FAT16 only)
❖ The File Allocation Table (FAT),
❑ FAT12, FAT16, or FAT32, number represents number of bits that are
assigned to address clusters in the FAT table.
MyComputerCareer.com 81
Operating System Components (Windows)
▪ The Windows File System (cont.)
NTFS
❖ Default file system in Microsoft Windows since Windows NT - a more
secure, scalable, and advanced file system compared to FAT.
❖ NTFS has several components:
MyComputerCareer.com 82
Operating System Components (Windows)
▪ The Windows File System (cont.)
MFT
MBF MFT FILES
Copy
MyComputerCareer.com 83
Operating System Components (Windows)
▪ The Windows File System
EFI
❖ The EFI System Partition (ESP) is a partition on a hard disk drive or solid-
state drive whose main purpose is to interact with the Unified Extensible
Firmware Interface (UEFI).
❑ UEFI firmware loads files stored on the EFI system partition to
MyComputerCareer.com 84
Operating System Components (Windows)
▪ The Windows File System
EFI Partition
MyComputerCareer.com 85
Operating System Components (Linux)
▪ Linux
❖ Covered here are Cyber forensics fundamentals of Linux-based
systems.
❑ Most of these concepts also apply to the Mac OS X operating system.
❖ In Linux, there are two methods for starting a process—
starting in foreground and in the background.
❖ View all the processes in UNIX by using the command ps ()
in a terminal window, also known as shell.
❖ What follows ps are the details of what type of processes should be
displayed.
MyComputerCareer.com 86
Operating System Components (Linux)
▪ Linux Processes - the output of the ps command in a Linux system.
MyComputerCareer.com 87
Operating System Components (Linux)
▪ Linux Processes (cont.)
❖ Several other tools are great for displaying not only the processes running
in the system but also the resource consumption (CPU, memory, network)
❖ Two widely used tools are top and Htop.
❖ An example of top utility is shown below.
MyComputerCareer.com 88
Operating System Components (Linux)
▪ Linux Processes - Example shows the output of htop utility
MyComputerCareer.com 89
Operating System Components (Linux)
▪ Linux Processes (cont.)
❖ Looking for orphan, zombie, and suspicious processes is one of the
tasks in Linux forensics.
❖ There may be something suspicious on the system if you find a process
running with open network sockets that doesn’t show up on a similar
system,
❖ You may find network saturation originating from a single host
MyComputerCareer.com 90
Operating System Components (Linux)
▪ Linux Processes (cont.)
Ext4
❖ This process is one of the most used Linux file systems.
❖ It has several improvements over its predecessors Ext3 and Ext2.
❖ Ext4 not only supports journaling but also modifies important data structures
of the file system, such as the ones destined to store the file data.
❖ This is done for better performance, reliability, and additional features.
❖ Ext4 allows an unlimited number of sub directories.
❖ It uses a “multiblock allocator” (mballoc) to allocate many blocks in a single
call, instead of a single block per call.
❖ This feature avoids a lot of overhead and improves system performance.
❖ Becoming familiar with the Linux file system is recommended for any cyber
forensics practitioner.
❖ For example, in a compromised system, you may find a partition showing
100% utilization, but if you use the du command, the system may only show
30% utilization. Journaling: A journaling file system is a file system that
keeps track of changes not yet committed to the file
system's main part by recording the intentions of such
changes in a data structure known as a "journal", which is
usually a circular log. MyComputerCareer.com 91
Operating System Components (Linux)
▪ Linux Processes (cont.)
Linux MBR and Swap File System
❖ the MBR is a special type of boot sector that contains 512 or more bytes
located in the first sector of the drive.
❖ The MBR includes instructions about how the logical partitions that have
file systems are organized on the drive.
❖ It also has executable code to load the installed operating system.
❖ The most common boot loaders in Linux are Linux Loader (LILO), Load
Linux (LOADLIN), and the Grand Unified Bootloader (GRUB).
❖ This example illustrates the Linux boot process in detail.
MyComputerCareer.com 92
Operating System Components (Linux)
▪ Linux Processes (cont.)
❖ There are two main partitions on a Linux system:
❑ The data partition, which contains all Linux system data, including the root
partition
❑ The swap partition, which is extra memory on the hard disk drive or SSD
• The swap makes sure that the operating system keeps working.
• Windows, Mac OS X, and other operating systems also use swap
or virtual memory.
• Linux counts on having twice the amount of swap than physical
memory.
❑ Related to cyber forensics pretty much everything in RAM has the
potential of being stored in swap space at any given time.
❑ System data such as plaintext data, encryption keys, user credentials,
emails, and other sensitive information—especially due to the weaknesses
in some applications that allow unencrypted keys to reside in memory.
MyComputerCareer.com 93
Demo: Linux Processes
▪ Video
▪ Linux Sysadmin Basics: Process Overview
▪ https://www.youtube.com/watch?v=ls5cGi12kGw
MyComputerCareer.com 94
Attribution Role in an Investigation
▪ Key topics in cybersecurity forensics are:
Attribution of Assets and Threat Actors
❖ Undeniable motivation to support an evidence-led approach to
cybersecurity forensics to achieve good attribution.
❖ A suspect-led approach is pejorative and often biased to the
disadvantage of those being investigated.
❖ Due to technical complexities, often impractical for cybersecurity
forensics experts to determine fully the reliability of endpoints,
servers, or network infrastructure devices and provide assurances to
the court about the soundness of the processes involved and the
complete attribution to a threat actor.
❖ The forensics expert needs to ensure any part of the examination
process is overlooked or repetitive.
❖ Cybersecurity forensic experts are often confronted with the
inefficacy of traditional security processes in systems and networks
designed to preserve documents and network functionality,
**Especially because most systems are not designed to enhance
digital evidence recovery.
MyComputerCareer.com 95
Attribution Role in an Investigation
▪ Attribution of Assets
❖ There is a need for appropriate cybersecurity forensic tools, including
evidence.
❖ Cybersecurity forensics (or digital forensics) has been of growing interest
among many organizations due to large number of breaches recently.
❖ There are three broad categories of cybersecurity investigations
MyComputerCareer.com 96
Attribution Role in an Investigation
▪ Threat Actor
❖ Cybersecurity forensic practitioners are at a crossroads about changes
affecting evidence recovery and management.
❖ Forensic evidence is often used in a court of law.
attack and
❑ Gain a better understanding of the threat actor responsible for the attack.
MyComputerCareer.com 97
Attribution Role in an Investigation
▪ Indicators of Compromise
❖ Indicators of Compromise (IoC) applications presents a security operational
challenge. We are starting to experience these challenges nowadays.
❖ Example, embedded Programmable Logic Controllers (PLCs) that operate
manufacturing systems and robots can be a huge target for bad actors.
❖ Need to know:
MyComputerCareer.com 98
Attribution Role in an Investigation
▪ Indicators of Attack
❖ According to NIST, an Attack Vector is:
vulnerability.
❑ Each attack vector is a comprising of a source of malicious content, a
MyComputerCareer.com 99
Attribution Role in an Investigation
▪ Indicators of Attack (cont.)
❖ Examples of Attack Vectors (cont.):
10
MyComputerCareer.com 0
Evidence Types Used in Provided Logs
▪ There are three general types of evidence:
Best evidence, Corroborating evidence, Indirect or circumstantial evidence
❖ Best Evidence
used in court.
❖ Corroborative Evidence
❖ Indirect Evidence
conclusion of fact.
❑ Direct evidence supports the truth of a proclamation without need for any
10
MyComputerCareer.com 2
Have you planned your exam date yet????