Hacker Profiling Guide

User Manual:

Open the PDF directly: View PDF PDF.
Page Count: 21

The4960’s Hacker Profiling Guide
Authors:
Christian Aaron Murga
Editors/Contributors:
Albert Morales
Jaime Acosta
Tables of contents:
Type of Attacks 2
Types of Malware 4
Motivations 6
Cybercriminal Profiles 7
Motivational Typologies 8
Digital Forensics Workflow 9
Skills/Areas of Knowledge 9
File Extensions 10
Network Protocols 10
Partition Formats 11
Windows Programs 14
Windows 7 Programs (Default) 15
Windows Registry Hives 16
Linux Programs 17
Glossary 19
References 21
1
Type of Attacks
Man in the Middle Attack -
gaining unauthorized access to
network traffic
such that the traffic
goes through the attacker before
reaching its end point. An attacker
can use this to simply listen in on
traffic, or can be used to modify
traffic with malicious intent.
Spoofing - falsifying or presenting
data in such a way that the attacker
appears to have a different identify
.
Phishing Attack - when an attacker,
masquerading as a trusted entity
,
dupes a victim into opening an
email, instant message, or text
message. The recipient is then
tricked into clicking a malicious link
,
which can lead to a variety of
attacks.
Denial of Service - maliciously
consuming a system’s resources
such that it is unable to serve clients.
2
XXS Cross-Site Scripting - injecting
a malicious script
to a vulnerable
website. When a normal client visits
the website, the client run the
malicious script
.
SQL Injection - submitting malicious
input to a vulnerable server’s form
such that the server treats the input
as a command rather than data
.
Brute Force/Dictionary Attack - a
form of password cracking
where an
attacker incrementally guess what
they password might be from a large
set of inputs.
3
Types of Malware
Virus - Attached to a program.
Spreads when a user launches an
infected program – keeps a low
profile and usually infects new
programs or disks.
Worm - Does not need to attach to
an existing program. Sends a copy
of itself to another computer and
then launches that copy.
Ransomware - encrypts files and
demands payment to decrypt them.
This is a subset of scamware.
4
Backdoor - allow the attacker to
execute commands usually with little
or no authentication
Rootkit - designed to conceal
existence of other malware
Adware - “Software typically installed
that displays advertisements
browser pop-ups).”
Keylogger - collects keystroke
information and gives to attacker.
5
Motivations
6
Cybercriminal Profiles
From “Computer Incident Response and Forensics Team Management : Conducting a Successful Incident Response”
Script kiddie
- not technologically sophisticated; uses existing scripts; ego driven; usually
have the intent to trespass or invade privacy.
Cyberpunks
- technologically proficient; usually young; ego driven. Tend to engage in
trespassing, invasion, theft, sabotage. Often viruses and DOS against established
companies.
Old timers
- most technologically proficient; motivation is ego driven and perfecting the
cyber-trespassing ‘art.’ Typically middle aged or older; have extensive technology
backgrounds. Sometimes deface websites; usually do not cause much harm due to skill.
Unhappy insider
- very dangerous since they are inside an organization's defenses, any
and and employment level, motivation is revenge and/or monetary gain. Intend to steal
from or harm company. Engage in extortion or exposure of company secrets. Depend
on direct access - Internet is secondary (also to obtain tools, transfer, etc).
Ex-insider
- separated from company unwillingly (e.g. layoff, bad performance/conduct);
motive is revenge and purpose to harm company; if termination is foreseen, they may
perform other destructive acts (e.g. logic bombs, delete data); benefit from private
company information
Cyber-thieves
- any age, does not require vast technological experience. Motivation is
profit (e.g. stealing data, monetary theft). Adept at social engineering, but use network
tools as well. Often try to gain employment at targeted company; some work from the
outside.
Cyberhucksters
- spammers and malware distributors. Focused on monetary gain.
Good at social engineering and spoofing. Use spyware. Sometimes infect systems so
they can sell the cure.
Con man
- Motivated by monetary gain. “Theft is their trademark.” Often run scams and
perform phishing attacks to commit identity and credit card theft. Very good at social
engineering and spoofing. Harder to catch because they are usually antonymous.
Typically no specific victim; some will target high value targets by spear phishing.
Cyberstalker
- driven by ego and deviance. Want to invade their victim’s privacy to
satisfy personal/psychological need (e.g. jealousy). Use keyloggers, Trojan horses,
sniffers; very resourceful and diverse.
Code warriors
- skilled with long histories with technology (often times with degrees).
Initially focused on ego and revenge. Now more capitalistic, performing theft or
sabotage. Not an ‘art’, more of a profession. Code exploitation and trojan horse
creators. Any age, but typically 30-50. Usually socially inept and social deviants.
Mafia soldier
- some characteristics from con-man and code warrior. Highly organized
with criminal purpose of making money. Typically engage in theft, extortion, and privacy
invasion with goal of blackmail.
Warfighter
- Any age; very bright and skilled. Motivation is infowar (e.g. after strategic
advantages for their country and their allies). All types of cyber weapons (e.g. trojan
horses, DOS attacks, and use of disinformation.
7
Motivational Typologies
From “Profiling and Serial Crime : Theoretical and Practical Issues”
Power Reassurance
“This offender is driven by a relational fantasy and feels that the victim is special
because of it.”
“There is no intent to punish or degrade, and they are the least likely to physically
harm their victim since this would shatter the illusion that the relationship was
somehow wanted”
“The attack is intended to restore diminishing feelings of masculinity, and power
is achieved by taking power away from the victim.”
Power Assertive
Offender “feel inadequate and both seek affirmation about their masculinity and
worth.”
“offender tries to establish a relationship with the victim, and in this way hopes to
shore up their low self-worth.”
“offenders try to make themselves feel better by making others feel bad.”
“is not concerned about the victim’s welfare in any form. Moderate to excessive
force may be used in controlling the victim, and the attacks will occur at any time
and location that is convenient and safe.”
Anger Retaliatory
“does not want to include the victim or want their input. They will use excessive
levels of force, even beyond that needed to gain control over a victim, or that
required to get compliance.”
“Offenders hate the target (individual or group) against whom the offense is
committed and will hold them accountable for real wrongs, or misplace their
aggression as would happen in the case of a perceived wrong.”
“focus is an individual or a group that has either done something wrong or that
the offender believes has done something wrong.”
Pervasively Angry
“The offense is the manifestation of anger not directed at a specific target, group,
or institution, but results from cumulative life stresses in any or all aspects of
being.”
Gang and Opportunistic
Reassurance Oriented - seeking emotional support due to low self-esteem
Pervasively Angry - group used as a platform to legitimize behavior
The gang espouses a philosophy that is concordant with their own
Joins gang for monetary gain
Profit
Struggling to make ends meet
Does not have to be actual cash
8
Digital Forensics Workflow
From “Computer Incident Response and Forensics Team Management : Conducting a Successful Incident Response”
1. Prepare —Specific forensics training, overarching corporate policies and procedures, as
well as practice investigations and examinations will prepare you for an “event.”
Specialized forensics or incident handling certifications are considered of great value for
forensics investigators. Identify —When approaching an incident scene— review what is
occurring on the computer screen. If data is being deleted, pull the power plug from the
wall; otherwise perform real-time capture of system “volatile” data first.
2. Preserve —Once the system-specific “volatile” data is retrieved, then turn off machine,
remove it from scene, and power it up in an isolated environment. Perform a full system
bit-stream image capture of the data on the machine, remembering to “hash” the image
with the original data for verification purposes.
3. Select —Once you have a verified copy of the available data, start investigation of data
by selecting potential evidence files, datasets, and locations data could be stored.
Isolate event-specific data from normal system data for further examination.
4. Examine —Look for potential hidden storage locations of data such as slack space,
unallocated space, and in front of File Allocation Table (FAT) space on hard drives.
Remember to look in registry entries or root directories for additional potential indicators
of data storage activity. Classify —Evaluate data in potential locations for relevance to
current investigation. Is the data directly related to case, or does it support events of the
case, or is it unrelated to the case?
5. Analyze —Review data from relevant locations. Ensure data is readable, legible, and
relevant to investigation. Evaluate it for type of evidence: Is it direct evidence of alleged
issue or is it related to issue?
6. Present —Correlate all data reviewed to investigation papers (warrants, corporate
documents, etc.). Prepare data report for presentation— either in a court of law or to
corporate officers.
Skills/Areas of Knowledge
Encryption
Web development
Malware writing
Programming
Computer vision
Data mining
Machine learning
Reverse engineering
Networking
Penetration testing
Social engineering
Wireless communications
9
File Extensions
elf - Linux executable
exe - Windows executable
lnk - Reference/link to another file
txt - Text file
php - Webpage
html - Webpage
bat - Windows shell script
dll - Windows dynamically link library
ps1 - Windows Powershell script
dat - General information file
py - Python script
java - Java source code
webm - Video file
Network Protocols
8 Layer model: Physical, Data, Network, Transport, Session, Presentation, Application
(Please Do Not Teach Stupid People Acronyms)
4 Layer model: Network access layer, Network layer, Transport layer, Application layer
Port
Name
Description
8
echo
Test connection between client and server
17
qotd
Quote of the day
18
msp
Message send protocol
21
ftp
File transfer
22
ssh
Remote shell
23
telnet
Old remote terminal connection
25
smtp
Mail transfer
53
domain/DNS
Domain name system - resolves domain names
66
sql-net
SQL database server
67
dhcps
Dynamic Host Configuration Protocol server - assigns
IP addresses
68
dhcpc
Dynamic Host Configuration Protocol client - assigned
IP addresses
69
tftp
Trivial File Transfer Protocol
79
finger
User information look up
10
80
http
Hypertext transfer protocol - websites
88
kerberos
Authentication protocol
110
pop3
Email service
111
rpcbind
Bind port to program
123
ntp
Network time protocol
137
netbios-ns
Network Basic Input/Output System
138
netbios-dgm
Network Basic Input/Output System
139
netbios-ssn
Network Basic Input/Output System
143
imap
Email service
162
snmp
Simple Network Management protocol
194
irc
Internet relay chat
443
https
Secure HTTP
445
microsoft-ds
SMB over IP
497
retrospect
Backup software
514
syslog
Logger for network devices
515
printer
...
520
rip
Controls routing tables
1434
ms-sql-m
Microsoft sql monitor
1723
pptp
Point-to-Point Tunneling Protocol
1900
upnp
Universal Plug and Play
8080
http-proxy
….
Partition Formats
NTFS - robust and effective. Windows install format. Somewhat low compatibility with
other systems. (1993)
11
FAT32 (File Allocation Table 32) - all operating systems (universal); Max volume:
depends, typically 2TB, but 32GB in Windows. Max file size 4GB. Not a journaling file
system (more prone to corruption). Does not support file permissions. (1977)
EXFAT - flash drive optimized. More compatible than NTFS, but less than FAT32.
(2006)
EXT4 - Max file size: 16TB. Max volume: 1EB (exabyte) = 1,024PB (petabyte) =
1,048,576 TB (terabyte). Linux install format. Optional journaling file system. (2008)
EXT3 - Max file size: 2TB. Max volume: 32TB. Journaling file system. (2001)
Linux-swap - used when RAM is full.
12
13
Windows Programs
Programming/Development
XAMPP - used to develop
and host websites. Website
files stored in
C:\xampp\htdocs\
Python - scripting programing
language
PHP - web-focused
programing language
Java JDK/JRE - object
oriented programing
language
Eclipse - Integrated
development environment for
programming
GitHub Desktop - version
control software; usually
used when programming
Blender - 3D modeling
program
Unity Game Engine -
cross-platform game engine
for game development
Matlab - Programming
language with mathematical
focus
Visual Studio - Integrated
development environment for
programming
Sublime Text Editor -
typically for programming
Cygwin - GNU Linux tools for
Windows
Pen-testing
Metasploit - penetration
testing software. Has a
folder at ~/.msf4
containing
logs, history, and other
settings.
Wireshark - network analysis
software
Nmap - network scanner
Tor Browser - proxy-based
browser built on Firefox
Burp Suite - web application
testing tool
Cain & Able - penetration
testing and password
recovery tool
Mimikatz - penetration testing
tool targeting Windows
IDA pro - reverse
engineering tool
Defensive
Snort - intrusion
detection/prevention system
AVG AntiVirus
Malwarebytes - antivirus
TrueCrypt - used to encrypt
harddrives
Autopsy - forensics analysis
software
FKTImager - forensics
software for data previews
and imaging
RegRipper - forensics
software for extracting
registry data
Utils
Putty - SSH and telnet client.
RegRipper has a plugin to
detect SSH keys
Icecream Screen Recorder -
used to record/takes pictures
of screen
Win32 Disk Imager - tool for
imaging USB flash drives
Rufus - tool for creating
bootable USB flash drives
CCleaner - a utility program
used to clean Windows
14
Registry entries from a
computer.
Filezilla - FTP client
7zip - archive utility
BitTorrent - Torrenting
software
Virtualization
Virtualbox
VMware
XenCenter - capable to
nested virtualization
Bluestacks - Android virtual
machines
Communication
Pidgin - universal chat client
(cross-platform)
Thunderbird - email client
(cross-platform)
Microsoft Outlook - email
client
Gaming
Minecraft - popular
cross-platform game
League of Legends - popular
competitive PC game
Steam - video game
distribution platform
DaedalusX64 R747 - game
emulation software
General
Chrome - best web browser
Firefox - decent web browser
Teamviewer - remote
desktop software
Skype - text and video
communication software
VLC Media Player
GIMP - raster graphics editor
Inkscape - vector graphics
editor
Microsoft Office - document
editor
Windows 7 Programs (Default)
In “C:\Program Files”
Common Files
DVD Maker
Internet Explorer
Microsoft Games
MSBuild
Reference Assemblies
Windows Defender
Windows Journal
Windows Mail
Windows Media Player
WIndows NT
Windows Photo Viewer
Windows Portable Devices
Windows Sidebar
In “C:\Program Files (x86)”
Common Files
Internet Explorer
MSBuild
Reference Assemblies
Windows Defender
Windows Journal
Windows Mail
Windows Media Player
WIndows NT
Windows Photo Viewer
Windows Portable Devices
Windows Sidebar
In “C:\Windows\System32”
AdapterTroubleshooter.exe,aitagent.exe,alg.exe,appidcertstorecheck.exe,appidpolicyconverter.exe,ARP.EXE,at.exe,AtBroker.exe,attrib.ex
e,audiodg.exe,auditpol.exe,autochk.exe,autoconv.exe,autofmt.exe,AxInstUI.exe,baaupdate.exe,bcdboot.exe,bcdedit.exe,BdeHdCfg.exe,Bd
eUISrv.exe,BdeUnlockWizard.exe,BitLockerWizard.exe,BitLockerWizardElev.exe,bitsadmin.exe,bootcfg.exe,bridgeunattend.exe,bthudtask.
exe,cacls.exe,calc.exe,CertEnrollCtrl.exe,certreq.exe,certutil.exe,change.exe,charmap.exe,chglogon.exe,chgport.exe,chgusr.exe,chkdsk.ex
15
e,chkntfs.exe,choice.exe,cipher.exe,cleanmgr.exe,cliconfg.exe,clip.exe,cmd.exe,cmdkey.exe,cmdl32.exe,cmmon32.exe,cmstp.exe,cofire.e
xe,colorcpl.exe,comp.exe,compact.exe,CompMgmtLauncher.exe,ComputerDefaults.exe,conhost.exe,consent.exe,control.exe,convert.exe,c
redwiz.exe,cscript.exe,csrss.exe,ctfmon.exe,cttune.exe,cttunesvr.exe,dccw.exe,dcomcnfg.exe,ddodiag.exe,Defrag.exe,DeviceDisplayObjec
tProvider.exe,DeviceEject.exe,DevicePairingWizard.exe,DeviceProperties.exe,DFDWiz.exe,dfrgui.exe,dialer.exe,diantz.exe,dinotify.exe,dis
kpart.exe,diskperf.exe,diskraid.exe,Dism.exe,dispdiag.exe,DisplaySwitch.exe,djoin.exe,dllhost.exe,dllhst3g.exe,dnscacheugc.exe,doskey.e
xe,dpapimig.exe,DpiScaling.exe,dpnsvr.exe,driverquery.exe,drvinst.exe,dvdplay.exe,dvdupgrd.exe,dwm.exe,DWWIN.EXE,dxdiag.exe,Dxp
server.exe,Eap3Host.exe,efsui.exe,EhStorAuthn.exe,esentutl.exe,eudcedit.exe,eventcreate.exe,eventvwr.exe,expand.exe,extrac32.exe,fc.
exe,find.exe,findstr.exe,finger.exe,fixmapi.exe,fltMC.exe,fontview.exe,forfiles.exe,fsutil.exe,ftp.exe,fvenotify.exe,fveprompt.exe,FXSCOVER
.exe,FXSSVC.exe,FXSUNATD.exe,getmac.exe,GettingStarted.exe,gpresult.exe,gpscript.exe,gpupdate.exe,grpconv.exe,hdwwiz.exe,help.e
xe,HOSTNAME.EXE,hwrcomp.exe,hwrreg.exe,icacls.exe,icardagt.exe,icsunattend.exe,ie4uinit.exe,ieUnatt.exe,iexpress.exe,InfDefaultInsta
ll.exe,ipconfig.exe,irftp.exe,iscsicli.exe,iscsicpl.exe,isoburn.exe,klist.exe,ksetup.exe,ktmutil.exe,label.exe,LocationNotifications.exe,Locator.
exe,lodctr.exe,logagent.exe,logman.exe,logoff.exe,LogonUI.exe,lpksetup.exe,lpremove.exe,lsass.exe,lsm.exe,Magnify.exe,makecab.exe,m
anage-bde.exe,mblctr.exe,mcbuilder.exe,mctadmin.exe,MdRes.exe,MdSched.exe,mfpmp.exe,MigAutoPlay.exe,mmc.exe,mobsync.exe,mo
untvol.exe,mpnotify.exe,MpSigStub.exe,MRINFO.EXE,msconfig.exe,msdt.exe,msdtc.exe,msfeedssync.exe,msg.exe,mshta.exe,msiexec.ex
e,msinfo32.exe,mspaint.exe,msra.exe,mstsc.exe,mtstocom.exe,MuiUnattend.exe,MultiDigiMon.exe,NAPSTAT.EXE,Narrator.exe,nbtstat.ex
e,ndadmin.exe,net.exe,net1.exe,netbtugc.exe,netcfg.exe,netiougc.exe,Netplwiz.exe,NetProj.exe,netsh.exe,NETSTAT.EXE,newdev.exe,nlt
est.exe,notepad.exe,nslookup.exe,ntoskrnl.exe,ntprint.exe,ocsetup.exe,odbcad32.exe,odbcconf.exe,openfiles.exe,OptionalFeatures.exe,os
k.exe,p2phost.exe,PATHPING.EXE,pcalua.exe,pcaui.exe,pcawrk.exe,pcwrun.exe,perfmon.exe,PING.EXE,PkgMgr.exe,plasrv.exe,PnPUna
ttend.exe,PnPutil.exe,poqexec.exe,powercfg.exe,PresentationHost.exe,PresentationSettings.exe,prevhost.exe,print.exe,PrintBrmUi.exe,pri
ntfilterpipelinesvc.exe,PrintIsolationHost.exe,printui.exe,proquota.exe,psr.exe,PushPrinterConnections.exe,qappsrv.exe,qprocess.exe,quer
y.exe,quser.exe,qwinsta.exe,rasautou.exe,rasdial.exe,raserver.exe,rasphone.exe,rdpclip.exe,rdpinit.exe,rdpshell.exe,rdpsign.exe,rdrleakdi
ag.exe,RDVGHelper.exe,ReAgentc.exe,recdisc.exe,recover.exe,reg.exe,regedt32.exe,regini.exe,RegisterIEPKEYs.exe,regsvr32.exe,rekey
wiz.exe,relog.exe,RelPost.exe,repair-bde.exe,replace.exe,reset.exe,resmon.exe,RMActivate.exe,RMActivate_isv.exe,RMActivate_ssp.exe,
RMActivate_ssp_isv.exe,RmClient.exe,Robocopy.exe,ROUTE.EXE,RpcPing.exe,rrinstaller.exe,rstrui.exe,runas.exe,rundll32.exe,RunLega
cyCPLElevated.exe,runonce.exe,rwinsta.exe,sbunattend.exe,sc.exe,schtasks.exe,sdbinst.exe,sdchange.exe,sdclt.exe,sdiagnhost.exe,Sear
chFilterHost.exe,SearchIndexer.exe,SearchProtocolHost.exe,SecEdit.exe,secinit.exe,services.exe,sethc.exe,SetIEInstalledDate.exe,setspn
.exe,setupcl.exe,setupugc.exe,setx.exe,sfc.exe,shadow.exe,shrpubw.exe,shutdown.exe,sigverif.exe,slui.exe,smss.exe,SndVol.exe,Snippin
gTool.exe,snmptrap.exe,sort.exe,SoundRecorder.exe,spinstall.exe,spoolsv.exe,sppsvc.exe,spreview.exe,srdelayed.exe,StikyNot.exe,subst
.exe,svchost.exe,sxstrace.exe,SyncHost.exe,syskey.exe,systeminfo.exe,SystemPropertiesAdvanced.exe,SystemPropertiesComputerName
.exe,SystemPropertiesDataExecutionPrevention.exe,SystemPropertiesHardware.exe,SystemPropertiesPerformance.exe,SystemProperties
Protection.exe,SystemPropertiesRemote.exe,systray.exe,tabcal.exe,takeown.exe,TapiUnattend.exe,taskeng.exe,taskhost.exe,taskkill.exe,t
asklist.exe,taskmgr.exe,tcmsetup.exe,TCPSVCS.EXE,timeout.exe,TpmInit.exe,tracerpt.exe,TRACERT.EXE,tscon.exe,tsdiscon.exe,tskill.ex
e,TSTheme.exe,TsUsbRedirectionGroupPolicyControl.exe,TSWbPrxy.exe,TsWpfWrp.exe,typeperf.exe,tzutil.exe,ucsvc.exe,UI0Detect.exe,
unlodctr.exe,unregmp2.exe,upnpcont.exe,UserAccountControlSettings.exe,userinit.exe,Utilman.exe,VaultCmd.exe,VaultSysUi.exe,vds.exe,
vdsldr.exe,verclsid.exe,verifier.exe,vmicsvc.exe,vssadmin.exe,VSSVC.exe,w32tm.exe,waitfor.exe,wbadmin.exe,wbengine.exe,wecutil.exe,
WerFault.exe,WerFaultSecure.exe,wermgr.exe,wevtutil.exe,wextract.exe,WFS.exe,where.exe,whoami.exe,wiaacmgr.exe,wiawow64.exe,wi
mserv.exe,WindowsAnytimeUpgradeResults.exe,wininit.exe,winload.exe,winlogon.exe,winresume.exe,winrs.exe,winrshost.exe,WinSAT.ex
e,winver.exe,wisptis.exe,wksprt.exe,wlanext.exe,wlrmdr.exe,wowreg32.exe,WPDShextAutoplay.exe,wpnpinst.exe,write.exe,wscript.exe,W
SManHTTPConfig.exe,wsmprovhost.exe,wsqmcons.exe,wuapp.exe,wuauclt.exe,WUDFHost.exe,wusa.exe,xcopy.exe,xpsrchvw.exe,xwizar
d.exe
Windows Registry Hives
C:\Windows\System32\config\
SAM - user account information
SYSTEM -
SOFTWARE -
SECURITY -
C:\Users\<username>\
NTUSER.DAT
C:\Users\<username>\AppData\Local\Microsoft\Windows\
USRCLASS.DAT
16
Linux Programs
Text Editors
Gedit - GUI based
Leafpad - GUI based
Nano/Pico - Command line based;
uses hidden folder : ~/.nano
Emacs - Command line based, but
has a GUI version; uses hidden folder:
~/.emacs.d
vi/vim - Command line based
Web Browsing
w3m - Interactive command line
based. uses hidden folder: ~/.w3s
curl - command line based. Prints
webpage to stdout
wget - command line based. Prints
webpage to file
Firefox/Iceweasel - GUI based; Firefox
uses hidden folder: ~/.mozilla
Chrome - GUI based
Tor Browser - Firefox based. Used to
increase anonymity
Pen-testing
Metasploit - used to create malware
and perform well know exploits; uses
hidden folder: ~/.ms4
Nmap - used to perform network
reconnaissance
Zenmap - GUI version of Nmap; uses
hidden folder: ~/.zenmap
Crunch - used to generate words
lists/dictionaries.
John - used to crack passwords,
usually given a wordlist. uses hidden
folder: ~/.john
Tshark and tcpdump - captures
network traffic
Wireshark - GUI version tshark
Apktool and Dex2jar - used to reverse
engineer Android applications
OllyDbg - used for reverse engineering
Windows 32-bit applications
Angr - binary analysis framework
utilizing symbolic execution
CORE - used to simulate computer
networks
Shells
Bash - Bourne Again Shell - very
popular and usually the default shell;
uses hidden files: ~./bash_profile,
~/.bashrc, ~/.bash_history
Sh - The original shell.
Ssh - Secure shell - a
protocol/program used to run a remote
shell on an unsecure network.
Replaced rlogin, telnet, and rsh
protocols; uses hidden folder: ~/.ssh
Fish - friendly interactive shell
Zsh - has features from bash, tcsh,
and ksh
Ksh - Korn shell
Tcsh/Csh - Uses C-like syntax
Utility
Networking
Nc - arbitrary TCP and UDP
connections and listens
Scp - transfer file over the
network. Uses ssh
Ifconfig - view and configure
network interfaces
Route - view and configure IP
routing table
File related
Mkdir - make folder/directory
Cd - change working directory
of shell
Cp - copy file (e.g. cp
source.file new_dst.file)
Mv - move/rename file
17
Touch - update timestamp of
file. If the file does not exist, it
is create empty.
Ln - create a link to a file
Find - search for files
more/less - view scrollable file
zip/tar/bzip/gzip - used to
compress a file/files
Dd - read from hardware
devices and output to file
format
Text related
Yes - print text repeatedly
Grep/egrep/fgrep/rgrep - print
lines matching a pattern
Cat - print the content of a
file/files
Echo - print text
Wc - word count - prints the
lines, words, and character
count of the input
Diff - print the difference
between two inputs
Task management
cron - a utility to schedule
tasks
Watch - execute a command
repeatedly
Bg - run a task in the
background
Fg - run a task in the
foreground
Kill - stop running a task
Ps/jobs - print current
processes
Exec - Replace the current
process with a new process
Exit - quit shell
Misc.
Systemd, Init - control system’s
and programs’ state
Apt, dpkg - package manager
for Debian based Linux
distribution (install/uninstall
programs).
Yum - deprecated package
manager for Redhat based
Linux distributions
Pacman - package manager
for Arch based linux
distributions
Docker - use to manage
program sandbox
Man - used to view the manual
for programs
Passwd - change the password
of a user
Fdisk - used to manage disk
partitions
Mount - mount a drive (e.g. usb
or hard drive usually found in
the /dev folder) onto a folder.
md5sum - compute the md5
checksum of an input
shasum - compute the sha1
checksum of an input
18
Glossary
From “Computer Incident Response and Forensics Team Management : Conducting a Successful Incident Response”
Attacker : “Person or entity performing any kind of malicious activity that attempts to
collect, disrupt, deny, degrade, or destroy information system resources or the
information itself.”
Botnet : Shorted term for Robot Network, this is a network of compromised computers
and servers that are remotely controlled by unauthorized personnel where the
compromised devices are performing activities not under the
Computer Forensics : “The practice of gathering, retaining, and analyzing
computer-related data for investigative purposes in a manner that maintains the integrity
of the data.”
Digital Signature : “A digital signature is a mathematical encryption mechanism for
proving the authenticity of a digital message or document. A valid digital signature gives
a recipient reason to believe that the message was created by a known sender, such
that the sender cannot deny having sent the message (authentication and
nonrepudiation) and that the message was not altered in transit (integrity). Digital
signatures are commonly used for software distribution, financial transactions, and in
other cases where it is important to detect forgery or tampering.”
Cybercrime profiling : “the investigation, analysis, assessment and reconstruction of data
from a behavioral/psychological perspective extracted from computer systems, networks
and the humans committing the crimes”
“The inductive approach assumes that individuals who committed the same
crimes in the past share characteristics with individuals who are committing the
same crime now. Examples of such profiles are those created for serial killers
and rapists. The deductive approach uses evidence collected at the crime scene
to develop a specific profile that can be used for offender identification.
Understanding inductive profiles helps as the deductive approach frequently
looks to them for clues in developing a more specific offender profile”
Intent : The intent to commit a crime: malice, as evidenced by a criminal act; intent to
deprive or defraud the true owner of his property. A person intends a consequence they
foresee that it will happen if the given series of acts or omissions continue, and desires it
to happen.
Intrusion : The unauthorized act of bypassing the security mechanisms of a system for
the purposes of causing an incident.
Logic Bomb : A piece of code intentionally inserted into a software system that will set off
a malicious function when specified conditions are met.
Malware : Malicious software which is designed to damage or disable computers with the
intent to steal information or gain control of the device. Software or firmware intended to
perform an unauthorized process that will have adverse impact on the confidentiality,
integrity, or availability of an information system. Examples include virus, worm, Trojan
19
horse, or other code-based entity that infects a host. Spyware and some forms of
adware are also examples of malicious code.
Nonrepudiation : “Assurance that the sender of information is provided with proof of
delivery and the recipient is provided with proof of the sender’s identity, so neither can
later deny having processed the information. This protection against an individual falsely
denying having performed a particular action provides the capability to determine
whether a given individual took a particular action such as creating information, sending
a message, approving information, and receiving a message.”
Penetration Test : A test methodology in which assessors, typically working under
specific constraints, attempt to circumvent or defeat the security features of an
information system.
Piracy : Illegally reproducing copyrighted work. Music, photographs, movies, and
software are all potentially copyrighted and can be pirated.
Privacy : The act of guaranteeing that the interests of persons and organizations are
protected and secluded from outside disclosure.
Spam : Electronic junk mail or the abuse of electronic messaging systems to
indiscriminately send unsolicited bulk messages.
Spear phishing : A targeted phishing attack on a select group of victims, usually
executives.
Spoofing : There are two meanings to spoofing in our context:
Either faking the sending address of a transmission to gain illegal entry into a
secure system or
the deliberate inducement of a user or resource to take incorrect action.
Note: Impersonating, masquerading, piggybacking, and mimicking are forms of
spoofing.
Spyware : Software that is secretly or surreptitiously installed into an information system
to gather information on individuals or organizations without their knowledge; a type of
malicious code.
Zombie : An infected computer that floods another computer with packets in an attempt
to infect or crash it without the consent or knowledge of the infected computer’s owner.
20
References
https://www.diffen.com/difference/FAT32_vs_NTFS
https://www.howtogeek.com/235596/whats-the-difference-between-fat32-exfat-and-ntfs/
http://www.pointsoftware.ch/en/4-ext4-vs-ext3-filesystem-and-why-delayed-allocation-is-
bad/
http://www.ntfs.com/ntfs_vs_fat.htm
Petherick, Wayne. Profiling and Serial Crime : Theoretical and Practical Issues, Elsevier
Science & Technology, 2012. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/fbial-ebooks/detail.action?docID=1111846.
Created from fbial-ebooks on 2018-06-30 20:38:56.
Johnson, Leighton. Computer Incident Response and Forensics Team Management :
Conducting a Successful Incident Response, William Andrew, 2013. ProQuest Ebook
Central, http://ebookcentral.proquest.com/lib/fbial-ebooks/detail.action?docID=1115165.
Created from fbial-ebooks on 2018-06-30 20:03:59.
Shipley, Todd G., and Art Bowker. Investigating Internet Crimes : An Introduction to
Solving Crimes in Cyberspace, William Andrew, 2013. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/fbial-ebooks/detail.action?docID=1115158.
Created from fbial-ebooks on 2018-06-30 16:11:30.
Cyber Crime and Cyber Terrorism Investigator's Handbook, edited by Babak Akhgar, et
al., William Andrew, 2014. ProQuest Ebook Central,
http://ebookcentral.proquest.com/lib/fbial-ebooks/detail.action?docID=1744499.
Created from fbial-ebooks on 2018-06-30 15:40:55.
Johnson, Leighton. Computer Incident Response and Forensics Team Management :
Conducting a Successful Incident Response, William Andrew, 2013. ProQuest Ebook
Central, http://ebookcentral.proquest.com/lib/fbial-ebooks/detail.action?docID=1115165.
Created from fbial-ebooks on 2018-06-30 14:41:06.
21

Navigation menu