File Systems
Volatile Data
Forensic Tools
Logs and networks
Mac Artifacts
Final Jeopardy
100

This file system type added journaling to ext2 to help with recovery.

What is ext3?

100

This command displays how long the system has been running since the last restart.

What is uptime?

100

A collection of command-line tools used to analyze disk images, including fsstat.

What is The Sleuth Kit (TSK)?

100

This log file, located at /var/log/auth.log, tracks user logins and sudo usage.

What is the Authentication Log?

100

This Apple file system uses an epoch timestamp that begins on January 1st, 1904

 What is HFS+?

100

This command is used in Linux to generate a report on the current status of disk quotas for a specific file system.

What is repquota?


200

This specific limit in disk quotas allows a user to temporarily exceed their space before a grace period expires.

What is a Soft Limit

200

These two types of "areas" and "partitions" contain volatile data lost when power is cut.

What are Swap areas and Disk partitions?

200

Use this TSK command to list files and directories, including recently deleted ones.

What is fls?

200

This command with the -tulpn flag shows which PID is associated with an open port.

What is netstat?

200

This macOS feature creates a .store.db file containing metadata for every file on a partition.

What is Spotlight?

300

In Linux, this specific partition is used by the OS as virtual memory.

What is a Swap file/partition

300

This mode allows a NIC to view all network packets; attackers use it to sniff traffic.

What is Promiscuous mode?

300

This command displays metadata for a specific file, such as MAC times, using its inode number.

What is istat?

300

This specific directory/file contains kernel initialization and error messages.

What is /var/log/kern.log?

300

This Apple epoch, used in Cocoa, begins on January 1st of this year.

What is 2001?

400

This command-line utility (ext2fsck) is used to find unallocated files and write data to lost+found.

What is e2fsck?

400

To view all Network Interface Controllers and their IP addresses, you use this "ip" command.

What is ip addr show?

400

This open-source framework is the industry standard for performing RAM dump/memory forensics.

What is Volatility?

400

To view the kernel IP routing table in numerical addresses, use netstat with these two flags.

What are -rn?

400

This Python-based tool is used to parse the Spotlight database into a CSV format.

500

This type of quota limits the number of files a user can create, rather than the size of those files.

What is an Inode usage quota?

500

Volatile data collection is essential for constructing this "chronological" map of an incident.

What is a Timeline Analysis?

500

This tool, mentioned alongside Volatility, is often used for recovering files from memory dumps.

What is PhotoRec?

500

To find specific "sudo" entries within the authentication log, you would pipe cat into this command.

What is grep?

500

This specific hidden folder path (beginning with a dot) is where the Spotlight V100 Store is kept.

What is /.Spotlight-V100?