Guide to Computer Forensics and Investigations Fourth Edition Chapter 11 Virtual Machines, Network Forensics, and Live Acquisitions.

Slides:



Advertisements
Similar presentations
Guide to Computer Forensics and Investigations Third Edition
Advertisements

Guide to Computer Forensics and Investigations Fourth Edition Chapter 11 Virtual Machines, Network Forensics, and Live Acquisitions.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 11 Virtual Machines, Network Forensics, and Live Acquisitions.
F3 Collecting Network Based Evidence (NBE)
Snort & ACID. UTSA IS 6973 Computer Forensics SNORT.
Guide to Computer Forensics and Investigations1 Network Forensics Overview Network forensics –Systematic tracking of incoming and outgoing traffic To ascertain.
Guide to Computer Forensics and Investigations Fourth Edition
Intrusion Detection Systems and Practices
Security Awareness: Applying Practical Security in Your World
Honeynet/Honeypot Project - Leslie Cherian - Todd Deshane - Patty Jablonski - Creighton Long May 2, 2006.
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
Guide to Computer Forensics and Investigations Third Edition Chapter 11 Network Forensics.
COS 413 Day 20. Agenda Assignment 6 is posted –Due Nov 7 (Chap 11 & 12) LAB 7 write-up due tomorrow Lab 8 in OMS tomorrow –Hands-on project 11-1 through.
Recovering and Examining Computer Forensic Evidence Noblett, Pollit, & Presley Forensic Science Communications October 2000 (Cited by 13 according to Google.
Lecture 11 Intrusion Detection (cont)
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
Hands-on: Capturing an Image with AccessData FTK Imager
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
COEN 252 Computer Forensics Windows Evidence Acquisition Boot Disk.
13Computer Intrusions Dr. John P. Abraham Professor UTPA.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
COEN 252 Computer Forensics
Hands-On Virtual Computing
Teaching Digital Forensics w/Virtuals By Amelia Phillips.
What is FORENSICS? Why do we need Network Forensics?
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Guide to Computer Forensics and Investigations Fifth Edition
Honeypot and Intrusion Detection System
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Guide to Computer Forensics and Investigations Fifth Edition
Your Interactive Guide to the Digital World Discovering Computers 2012.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Guide to Computer Forensics and Investigations Fourth Edition
Linux Networking and Security
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Chapter 3 Installing and Learning Software. 2Practical PC 5 th Edition Chapter 3 Getting Started In this Chapter, you will learn: − What is in an application.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
COEN 250 Computer Forensics Windows Life Analysis.
Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.
1 HoneyNets, Intrusion Detection Systems, and Network Forensics.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Guide to Computer Forensics and Investigations, Second Edition Chapter 12 Network Forensics.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Role Of Network IDS in Network Perimeter Defense.
Lecture 15 Page 1 CS 236 Online Evaluating Running Systems Evaluating system security requires knowing what’s going on Many steps are necessary for a full.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Computer Security Keeping you and your computer safe in the digital world.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Firmware threat Dhaval Chauhan MIS 534.
The Linux Operating System
Lesson Objectives Aims You should be able to:
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
Chapter 4: Protecting the Organization
Network hardening Chapter 14.
G061 - Network Security.
Presentation transcript:

Guide to Computer Forensics and Investigations Fourth Edition Chapter 11 Virtual Machines, Network Forensics, and Live Acquisitions

Objectives Describe primary concerns in conducting forensic examinations of virtual machines Describe the importance of network forensics Explain standard procedures for performing a live acquisition Explain standard procedures for network forensics Describe the use of network tools

Virtual Machines Overview Virtual machines are important in today’s networks. Investigators must know how to detect a virtual machine installed on a host, acquire an image of a virtual machine, and use virtual machines to examine malware.

Virtual Machines Overview (cont.) Check whether virtual machines are loaded on a host computer. Clues that virtual machines have been installed or uninstalled: –Folders named "Virtual Machines" or "My Virtual Machines" –Registry HKEY_CLASSES_ROOT shows file extensions.VMX or.VMC registered –VMware network adapter

VMware License Registry Key Retained even if VMware is uninstalled

Imaging a Virtual Hard Disk We have already covered that in the projects, including using a virtual write-blocker

Network Forensics Overview

Network forensics –Systematic tracking of incoming and outgoing traffic To ascertain how an attack was carried out or how an event occurred on a network Intruders leave trail behind Determine the cause of the abnormal traffic –Internal bug –Attackers

Securing a Network Layered network defense strategy –Sets up layers of protection to hide the most valuable data at the innermost part of the network Defense in depth (DiD) –Similar approach developed by the NSA –Modes of protection People (hiring and treatment) Technology (firewalls, IDSs, etc.) Operations (patches, updates)

Securing a Network (continued) Testing networks is as important as testing servers You need to be up to date on the latest methods intruders use to infiltrate networks –As well as methods internal employees use to sabotage networks

Performing Live Acquisitions

Live acquisitions are especially useful when you’re dealing with active network intrusions or attacks Live acquisitions done before taking a system offline are also becoming a necessity –Because attacks might leave footprints only in running processes or RAM Live acquisitions don’t follow typical forensics procedures Order of volatility (OOV) –How long a piece of information lasts on a system

Performing Live Acquisitions (continued) Steps –Create or download a live-acquisition forensic CD –Make sure you keep a log of all your actions –A network drive is ideal as a place to send the information you collect; an alternative is a USB disk –Copy the physical memory (RAM) –The next step varies: search for rootkits, check firmware, image the drive over the network, or shut down for later static acquisition –Be sure to get a forensic hash value of all files you recover during the live acquisition

Performing a Live Acquisition in Windows Several tools are available to capture the RAM. –Mantech Memory DD –Win32dd –winen.exe from Guidance Software –BackTrack

Developing Standard Procedures for Network Forensics

Long, tedious process Standard procedure –Always use a standard installation image for systems on a network –Close any way in after an attack –Attempt to retrieve all volatile data –Acquire all compromised drives –Compare files on the forensic image to the original installation image

Developing Standard Procedures for Network Forensics (continued) Computer forensics –Work from the image to find what has changed Network forensics –Restore drives to understand attack Work on an isolated system –Prevents malware from affecting other systems

Reviewing Network Logs Record ingoing and outgoing traffic –Network servers –Routers –Firewalls Tcpdump tool for examining network traffic –Can generate top 10 lists –Can identify patterns Attacks might include other companies –Do not reveal information discovered about other companies

iClicker Questions

Which of these require secure policies for people, technology, and operations? A.Defense in depth B.Order of volatility C.Live acquisition D.Static acquisition E.Network forensics

Which item contains the actual virtual hard disk data? A."My Virtual Machines" folder B..VMX file extension registered C.VMware network adapter D.VMware license registry key E..VMDK files

Which of these defines how long evidence on a network lasts? A.Defense in depth B.Order of volatility C.Live acquisition D.Static acquisition E.Network forensics

Which item is most likely to remain even after VMware is uninstalled? A."My Virtual Machines" folder B..VMX file extension registered C.VMware network adapter D.VMware license registry key E..VMDK files

Using Network Tools

Sysinternals –A collection of free tools for examining Windows products Examples of the Sysinternals tools: –RegMon shows Registry data in real time –Process Explorer shows what is loaded –Handle shows open files and processes using them –Filemon shows file system activity

SysInternals Link Ch 11b

Using Network Tools (continued) Tools from PsTools suite created by Sysinternals –PsExec runs processes remotely –PsGetSid displays security identifier (SID) –PsKill kills process by name or ID –PsList lists details about a process –PsLoggedOn shows who’s logged locally –PsPasswd changes account passwords –PsService controls and views services –PsShutdown shuts down and restarts PCs –PsSuspend suspends processes

Using UNIX/Linux Tools Knoppix Security Tools Distribution (STD) –Bootable Linux CD intended for computer and network forensics Knoppix-STD tools –Dcfldd, the U.S. DoD dd version –memfetch forces a memory dump –photorec grabs files from a digital camera –snort, an intrusion detection system –oinkmaster helps manage your snort rules

Using UNIX/Linux Tools (continued) Knoppix-STD tools (continued) –john –chntpw resets passwords on a Windows PC –tcpdump and ethereal are packet sniffers With the Knoppix STD tools on a portable CD –You can examine almost any network system

Using UNIX/Linux Tools (continued) BackTrack –Contains more than 300 tools for network scanning, brute-force attacks, Bluetooth and wireless networks, and more –Includes forensics tools, such as Autopsy and Sleuth Kit –Easy to use and frequently updated

Using Packet Sniffers Packet sniffers –Devices or software that monitor network traffic –Most work at layer 2 or 3 of the OSI model Most tools follow the PCAP format Some packets can be identified by examining the flags in their TCP headers

TCP Header From Wikipedia

Tools Tcpdump (command-line packet capture) Tethereal (command-line version of Ethereal) Wireshark (formerly Ethereal) –Graphical packet capture analysis Snort (intrusion detection) Tcpslice –Extracts information from one or more tcpdump files by time frame

Tools Tcpreplay (replays packets) Tcpdstat (near-realtime traffic statistics) Ngrep (pattern-matching for pcap captures) Etherape (views network traffic graphically) Netdude (GUI tool to analyze pcap files) Argus (analyzes packet flows)

Examining the Honeynet Project Attempt to thwart Internet and network hackers –Provides information about attacks methods Objectives are awareness, information, and tools Distributed denial-of-service (DDoS) attacks –A recent major threat –Hundreds or even thousands of machines (zombies) can be used

Examining the Honeynet Project (continued)

Zero day attacks –Another major threat –Attackers look for holes in networks and OSs and exploit these weaknesses before patches are available Honeypot –Normal looking computer that lures attackers to it Honeywalls –Monitor what’s happening to honeypots on your network and record what attackers are doing

Examining the Honeynet Project (continued) Its legality has been questioned –Cannot be used in court –Can be used to learn about attacks Manuka Project –Used the Honeynet Project’s principles To create a usable database for students to examine compromised honeypots Honeynet Challenges –You can try to ascertain what an attacker did and then post your results online

iClicker Questions

Which of these is not in the TCP header? A.Source port B.IP address C.SYN flag D.ACK flag E.Windows size

Which tool allows you to search network traffic for specific patterns of data? A.Process explorer B.memfetch C.tcpdsat D.ngrep E.etherape

Which of these helps manage your intrusion detection rules? A.etherape B.oinkmaster C.netdude D.argus E.tcpslice

Which of these is a password cracker? A.PsGetSid B.dcfldd C.john D.chntpw E.autopsy

Which tool came from the Dept. of Defense? A.PsExec B.Knoppix-STD C.dcfldd D.chntpw E.tcpdump