Detecting and Analyzing Repetitive Patterns in Malicious Network Files | Conducting Forensic Analysis and Incident Response | Cisco Exam 300-215-CBRFIR

Analyzing an Attack: Identifying the Utilization of Repetitive Patterns

Question

An investigator is analyzing an attack in which malicious files were loaded on the network and were undetected.

Several of the images received during the attack include repetitive patterns.

Which anti-forensic technique was used?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

D.

https://doi.org/10.5120/1398-1887 https://www.carbonblack.com/blog/steganography-in-the-modern-attack-landscape/

The anti-forensic technique used in this scenario is likely to be steganography, as it involves the embedding of information within a file or image in a way that is not easily detectable. The repetitive patterns in the images suggest that information has been concealed within them using steganography, as the patterns may have been used to encode hidden data.

Spoofing is a technique used to disguise the source of an attack or to make it appear as though it is coming from a legitimate source. This may involve the use of falsified IP addresses or other identifying information to conceal the true origin of the attack.

Obfuscation refers to the practice of making code or other information difficult to read or understand, often in an attempt to conceal its purpose or functionality. This may involve the use of encryption, compression, or other methods of hiding the true nature of the data.

Tunneling involves the use of an encrypted connection to send data between two points, making it difficult to intercept or detect. This technique is often used to bypass network security measures or to hide the transmission of sensitive data.

In summary, the presence of repetitive patterns in images received during an attack suggests that steganography was used to embed hidden information within the files. This is a common anti-forensic technique that can make it difficult for investigators to detect and analyze the attack.