16

Digital Forensics and Incident Response

Embed Size (px)

DESCRIPTION

null Delhi Chapter Meet - January 2014

Citation preview

Page 1: Digital Forensics and Incident Response
Page 2: Digital Forensics and Incident Response

Preparation

Identification

and Analysis

Containment

Eradication

Recovery

Lessons

learnt

Page 3: Digital Forensics and Incident Response

Elevated cmd and WMIC

tasklist /v /fo csv

tasklist /svc /fo csv

netstat -ab

dir /a/s /tc c:\

wmic startup list full /format:csv

wmic process list full /format:csv

Page 4: Digital Forensics and Incident Response

Memory image

Hibernation file

Page file

Registry Hives

Event Logs

$MFT

Contents of Prefetch folder

File listing with MD5 hashes

Page 5: Digital Forensics and Incident Response

Download SANS SIFT Workstation 2.14 from http://computer-forensics.sans.org/community/downloads

(SANS SIFT Workstation 3 to be released soon)

Page 6: Digital Forensics and Incident Response

VMware Appliance

Cross compatibility between Linux and Windows

A portable lab workstation you can use for your investigations

Forensic tools preconfigured

Option to install stand-alone via (.iso) or use via VMware Player/Workstation

Page 7: Digital Forensics and Incident Response

You have to learn it like you do any tool

Powerful command line capability

It is a tool to accomplish deep forensic analysis

Memory Analysis

File System Analysis

Timeline Analysis

And many more…..

Page 8: Digital Forensics and Incident Response

Login "sansforensics"

Password "forensics"

$ sudo su

Use to elevate privileges to root while mounting disk images.

Page 9: Digital Forensics and Incident Response
Page 10: Digital Forensics and Incident Response

File System Support

• Windows (MSDOS, FAT, VFAT, NTFS)

• MAC (HFS)

• Solaris (UFS)

• Linux (EXT2/3)

Evidence Image Support

• Expert Witness (E01)

• RAW (dd)

• Advanced Forensic Format (AFF)

Page 11: Digital Forensics and Incident Response

• Source files for Autopsy, The Sleuth kit

and other tools /usr/local/src

• Location of the forensic pre-compiled

binaries /usr/local/bin

• Location of the images that were seized

from your compromised system /cases

• Location of the mount points for the file

system images /mnt

Page 12: Digital Forensics and Incident Response

•Automated Registry Analysis RegRipper

•Registry Analyzer YARU

•Recover deleted registry keys deleted.pl

•Parser for metadata exiftool

• .pst mail examination tool Libpff

Page 13: Digital Forensics and Incident Response

Elevate your privileges

Change directories to /cases/<case directory>

Mount .E01 image files in the /mnt/ewf directory

$ Mount_ewf.py <****.E01> /mnt/ewf/

Mount the raw image found in the /mnt/ewf directory on the mnt/windows_mount/ directory

$ Mount –o ro,loop,show_sys_files,streams_interface=windows <image evidence directory> /mnt/windows_mount

Page 14: Digital Forensics and Incident Response

1. Identify Rouge processes

2. Analyze process DLLs and handles

3. Review Network Artifacts

4. Look for evidence of code injection

5. Check for signs of rootkit

6. Dump suspicious processes and drivers

Page 15: Digital Forensics and Incident Response

Vol.py –f <image> <plugin> --profile=<profile>

Export VOLATILITY_LOCATION=file://<filepath>

Export VOLATILITY_PROFILE=<profile>

Vol.py –f <image format 1> imagecopy –o <imageformat1.img>

cmdscan, consoles, connections, connscan, netscan,