Playing in the Devil's Playground

Slides:



Advertisements
Similar presentations
Collaboration Model for Law Enforcement X-Ways Investigator (investigator version of X-Ways Forensics)
Advertisements

Windows XP Operating Systems  COSC513 Operating Systems  Mr. Nut Prommongkonkun  Student ID #
Module 1: Installing Windows XP Professional
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Chapter Nine NetWare-Based Networking. Objectives Identify the advantages of using the NetWare network operating system Describe NetWare’s server hardware.
Memory Management 1 CS502 Spring 2006 Memory Management CS-502 Spring 2006.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
CS-3013 & CS-502, Summer 2006 Memory Management1 CS-3013 & CS-502 Summer 2006.
Hands-On Microsoft Windows Server 2003 Chapter 2 Installing Windows Server 2003, Standard Edition.
Chapter 12 File Management Systems
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
ROOT KITS. Overview History What is a rootkit? Rootkit capabilities Rootkits on windows OS Rootkit demo Detection methodologies Good tools for detection.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition Chapter 2: Operating-System Structures Modified from the text book.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
Capturing Computer Evidence Extracting Information.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Solaris Software Packaging and Installation Paul Foster 14/11/2000.
Installing Windows Vista Lesson 2. Skills Matrix Technology SkillObjective DomainObjective # Performing a Clean Installation Set up Windows Vista as the.
COEN 252 Computer Forensics Windows Evidence Acquisition Boot Disk.
MS systems use one of the following: LanManager Hash (LM) LanManager Hash (LM) NT LanManager (NTLM) NT LanManager (NTLM) Cached passwords Cached passwords.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Administering Windows 7 Lesson 11. Objectives Troubleshoot Windows 7 Use remote access technologies Troubleshoot installation and startup issues Understand.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
®® Microsoft Windows 7 for Power Users Tutorial 13 Using the Command-Line Environment.
Module 12: Managing Disaster Recovery. Overview Preparing for Disaster Recovery Backing Up Data Scheduling Backup Jobs Restoring Data Configuring Shadow.
Most modern operating systems incorporate these five components.
Module 1: Installing Microsoft Windows XP Professional.
Windows Vista Inside Out Chapter 22 - Monitoring System Activities with Event Viewer Last modified am.
Chapter Nine NetWare-Based Networking. Introduction to NetWare In 1983, Novell introduced its NetWare network operating system Versions 3.1 and 3.1—collectively.
MCTS Guide to Microsoft Windows Vista Chapter 4 Managing Disks.
Installation Overview Lab#2 1Hanin Abdulrahman. Installing Ubuntu Linux is the process of copying operating system files from a CD, DVD, or USB flash.
COEN 250 Computer Forensics Windows Life Analysis.
14 Step-by-Step Instructions for an Upgrade Installation n Prepare for the installation Verify that all devices and applications are Windows 2000 compatible.
11 DISASTER RECOVERY Chapter 13. Chapter 13: DISASTER RECOVERY2 OVERVIEW  Back up server data using the Backup utility and the Ntbackup command  Restore.
Module 1: Installing Microsoft Windows XP Professional.
© Janice Regan, CMPT 300, May CMPT 300 Introduction to Operating Systems Memory: Relocation.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Midterm Meeting Pete Bohman, Adam Kunk, Erik Shaw.
COEN 250 Computer Forensics Windows Life Analysis.
Disk & File System Management Disk Allocation Free Space Management Directory Structure Naming Disk Scheduling Protection CSE 331 Operating Systems Design.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Basic DOS How to get some work done. It’s all a file Everything is a file: OS files, Application files, Data files and Game files Files have 8.3 names:
Lecture 5 Rootkits Hoglund/Butler (Chapters 1-3).
2: Operating Systems Networking for Home & Small Business.
Chapter Nine NetWare-Based Networking. Objectives Identify the advantages of using the NetWare network operating system Describe NetWare’s server hardware.
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 2 Introducing Operating Systems.
CACI Proprietary Information | Date 1 Upgrading to webMethods Product Suite Name: Semarria Rosemond Title: Systems Analyst, Lead Date: December 8,
Tactical Meterpreter Scripting Carlos PerezDarkoperatorCarlos_perez[at]darkoperator.com DarkoperatorCarlos_perez[at]darkoperator.com.
Tech Level Cyber Security Lesson 7
Chapter Objectives In this chapter, you will learn:
Cybersecurity First Principles
Session 3 Memory Management
Chapter 2: System Structures
Linking & Loading.
CS-3013 Operating Systems C-term 2008
Main Memory Management
File Management.
CONFIGURING HARDWARE DEVICE & START UP PROCESS
IPC144 Introduction to Programming Using C Week 1 – Lesson 2
Page Replacement.
Loaders and Linkers: Features
Chapter 2: System Structures
Analysis models and design models
OPS235: Week 1 Installing Linux ( Lab1: Investigations 1-4)
SAP R/3 Installation on WIN NT-ORACLE
Linking & Loading CS-502 Operating Systems
Chapter 29: Program Security
Linking & Loading CS-502 Operating Systems
OPERATING SYSTEMS MEMORY MANAGEMENT BY DR.V.R.ELANGOVAN.
Presentation transcript:

Playing in the Devil's Playground Dominique Brezinski dbrez@cortland.com 11/21/2018

Operating in an untrustworthy environment Simple things can be technical challenges 11/21/2018

Forensic Analysis Requires Integrity Integrity of data Integrity of findings Accountability for all actions

Objective Don’t cause more damage than already has occurred Carry out necessary operations to gather first round of evidence Preserve evidence gathered from system state and on disk

Today’s Situation Systems are not tamper resistant Most utilities are dynamically linked Systems are very complex CD-ROM writers are cheap

Common Failures in Forensic Analysis Administrator or investigator executes various binaries that are on the compromised host while running as superuser Administrator or investigator modifies data inadvertently while trying to gather evidence Investigator fails to keep an evidentiary trail or record of actions

Available Options Statically link all your tools in your forensic toolkit and burn them to a CD Create an environment which forces your dynamically linked utilities to only use shared code on your CD Statically linked tools are better and easier to use, but not possible for most commercial operating systems

Example One - Windows NT Shared Code Search Path: The directory from which the application loaded. The current directory. SYSTEM32. SYSTEM. The Windows directory (WINNT). The directories that are listed in the PATH environment variable.

But Wait The system creates an in-memory cache of commonly used DLLs at system startup The system checks the \KnownDlls object directory first, and if the DLL is present it maps the memory cached version (section) into the processes’ memory space

Even More... Other mechanisms inject DLLs into every running application process (see JD Glaser’s presentation for the scoop on the problem he found) System functions can be hooked and their functionality modified

What Can We Do? Delete the sections (cached DLLs) in the \KnownDlls object directory Remove the DLLs from HKLM/Software/microsoft/windows nt/currentversion/windows/appinit_dlls Put known good versions of the required DLLs in the directory on the CD where you run your tools from Pray

What We Can Not Do Verify that system calls have not been hooked Verify that kernel components have not been modified (prior to doing disk analysis at least)

Recommendations for NT Create a CD with all your utilities, system commands, cmd.exe, and all the DLLs you will need Use dumpbin.exe /imports to identify the DLLs used by an application Run a program off the CD that deletes the sections in the \KnownDlls directory that correspond to the DLLs you need and clean the appropriate Registry keys

Recommendations Continued Run cmd.exe off of the CD to get a shell to work from Run as few commands as possible prior to making a binary copy of the hard drive (two copies is even better) Go to JD Glaser’s presentation for more specifics on NT forensic analysis

Example Two - Solaris Shared code search path: colon separated directory list specified by LD_LIBRARY_PATH environment variable runpath specified during application compilation and linking /usr/lib

But Wait Shared objects can be modified System calls can be hooked kernel can be modified

What Can We Do? Place known good copies of all the shared objects you need on a CD Create LD_LIBRARY_PATH in your environment that specifies the directory on your CD that contains the shared objects (/cdrom/so for example)

What We Can Not Do Verify that system calls have not been hooked Verify that the kernel has not been modified

Recommendations for Solaris Create a CD with all your forensic tools, system commands, shell, and shared objects Use ldd or truss to determine shared object dependencies (man ldd for security relevant info) Create or modify the LD_LIBRARY_PATH environment variable to only include your CD shared object directory Execute your shell on the CD Minimize the actions you take before making a binary image or two of the HD

Conclusions There are no truly safe solutions You can protect yourself from many user land threats, but not all Modified kernels are the devil’s work, and you don’t want to dance with the devil Take your time and think about the ramifications of your actions Test out your techniques before taking them live

Resources Http://www.rootkit.com/ Http://www.rootkit.com/papers/adding.doc Solaris man pages (ld.so.1, ldd, truss) Http://www.l0pht.com/ Thanks to Greg Hoglund, JD Glaser, LJH, Dil, and Jeremy Rauch No thanks to Mark Russinovic