Anti Anti-Forensics: Correlation Tony Rodrigues, CISSP, CFCP inv.forense (at) gmail (dot) com.

Slides:



Advertisements
Similar presentations
Malware Artifacts.
Advertisements

Computer Forensics.
The Modern Control Boot Disk. 2 What do we mean by a Modern control boot disk? In your previous lectures you learned about the original DOS control boot.
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Collaboration Model for Law Enforcement X-Ways Investigator (investigator version of X-Ways Forensics)
Computer Forensics.
This presentation will take a look at to prevent your information from being discovered by and investigator.
Effective Discovery Techniques In Computer Crime Cases.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
File System Analysis.
Memory Forensics During Incident Response
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
Lecture 10: The FAT, VFAT, and NTFS Filesystems 6/17/2003 CSCE 590 Summer 2003.
Guide to Computer Forensics and Investigations Third Edition
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
Information Networking Security and Assurance Lab National Chung Cheng University F.I.R.E. Forensics & Incident Response Environment.
Guide to Computer Forensics and Investigations Third Edition Chapter 11 Network Forensics.
COS/PSA 413 Day 15. Agenda Assignment 3 corrected –5 A’s, 4 B’s and 1 C Lab 5 corrected –4 A’s and 1 B Lab 6 corrected –A, 2 B’s, 1 C and 1 D Lab 7 write-up.
2004, Jei F.I.R.E. Forensics & Incident Response Environment Information Networking Security and Assurance Lab National Chung Cheng University.
Chapter 14: Computer and Network Forensics
Advance evidence collection and analysis of web browser activity by Junhoon Oh David Rivera 11/7/2013 Digital Forensics.
Capturing Computer Evidence Extracting Information.
Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, Organization of Bar Investigators Conference.
Incident Response: The First 10 Minutes Matt Bing Incident Response Coordinator The University of Michigan
Hands-on: Capturing an Image with AccessData FTK Imager
Sleuthkit/Autopsy Kevin Krause.
How to discover ephemeral evidence with Live RAM analysis.
WINDOWS SYSTEMS AND ARTIFACTS John P. Abraham Professor UTPA.
13Computer Intrusions Dr. John P. Abraham Professor UTPA.
Damien Leake. Definition To examine digital media to identify and analyze information so that it can be used as evidence in court cases Involves many.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Teaching Digital Forensics w/Virtuals By Amelia Phillips.
What is FORENSICS? Why do we need Network Forensics?
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
Computer Forensics Iram Qureshi, Prajakta Lokhande.
Dr Richard Overill Department of Informatics King’s College London Cyber Sleuthing or the Art of the Digital Detective.
Disclaimer The Content, Demonstration, Source Code and Programs presented here is "AS IS" without any warranty or conditions.
Introduction to Digital Forensics Florian Buchholz.
Bits, Bytes, Files, Hard Drives. Bits, Bytes, Letters and Words ● Bit – single piece of information ● Either a 0 or a 1 ● Byte – 8 bits of information.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
Monnappa KA  Info Security Cisco  Member of SecurityXploded  Reverse Engineering, Malware Analysis, Memory Forensics 
Timeline Analysis Geoff Black, EnCE, SnortCP Senior Forensic Consultant Professional Services Division Guidance Software, Inc.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Chapter 9 Computer Forensics Analysis and Validation Guide to Computer Forensics and Investigations Fourth Edition.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
VIRUS.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
Final Project: Advanced Security Blade IPS and DLP blades.
Digital Forensics Anthony Lawrence. Overview Digital forensics is a branch of forensics focusing on investigating electronic devises. Important in for.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Creighton Barrett Dalhousie University Archives
Ilija Jovičić Sophos Consultant.
Tools for identifying duplicate files and known software files
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
Forensic Analysis : using TSK and Volatility
introducing the... metasploit antiforensics project
Backtracking Intrusions
Part 1: Basic Analysis Chapter 1: Basic Static Techniques
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
Exam Information CSI5107 Network Security.
Computer Forensics Lab 1 INFORMATION TECHNOLOGY DEPARTMENT LEBANESE FRENCH UNIVERSITY (LFU) COURSE CODE: IT402CF 1.
“The game is afoot.” - Sherlock Holmes
Presentation transcript:

Anti Anti-Forensics: Correlation Tony Rodrigues, CISSP, CFCP inv.forense (at) gmail (dot) com

Anti-Anti-Forense: Correlação Who am I? CISSP, CFCP, Security+Tony Rodrigues, CISSP, CFCP, Security+ IT Manager and Information Security Consultant Computer Forensics Practitioner Blog:

Anti-Anti-Forense: Correlação Agenda Introduction Aligning Perspectives Acquisition and Analysis Strategies Anti Forensics: Definitions Techniques, Counter-Techniques and Counter-Counter Techniques References

Anti-Anti-Forense: Correlação CF Practitioners and Anti Forensics Hackers They make us work harder They support criminals They teach subversive techniques

Anti-Anti-Forense: Correlação Anti Forensics Hackers and CF Practitioners Just Script kiddies and Lammers Anti-Hacker guys They are our enemies

Anti-Anti-Forense: Correlação First thing: Aligning Perspectives Both are important for the process Anti Forensics is the power that leads our techniques to evolve Improvement is the natural result –Process –Techniques –Tools

Anti-Anti-Forense: Correlação Acquisition and Analysis Strategies -Live Acquisition -Live Analysis -Dead Acquisition -Dead Analysis

Anti-Anti-Forense: Correlação Anti Forensics, What is it ? Exploitation of vulnerabilities in computer forensics tools or techniques, in order to decrease quantity and quality of artifacts Techniques –Destroy artifacts –Hide artifacts –Subvert artifacts In a nutshell, information artifacts must be ruined, so investigation will be ruined too

Anti-Anti-Forense: Correlação Correlation Artifact Action

Anti-Anti-Forense: Correlação Correlation Operation Action

Anti-Anti-Forense: Correlação Correlation Incident/Case Operation

Anti-Anti-Forense: Correlação The Suggestion: Correlation (II) Correlate artifacts: –To recover destroyed, hidden or subverted data; –In order to get conclusions in spite of destroyed, hidden or subverted data; –To alert that data destruction, data hiding or data subversion has occurred; Locard Principle: There is always exchange when there is contact Anti Forensics has its own footprints

Anti-Anti-Forense: Correlação Techniques, Counter-Techniques and “Counter-Counter-Techniques”

Anti-Anti-Forense: Correlação Timeline MAC Times –Creation –Last Accessed –Last Modified Hard Disk file’s timeline creation Technique Subvert MAC timestamps –Inserting false timestamps –Destroying timestamps Ex: Timestomp Counter Technique

Anti-Anti-Forense: Correlação Timestomp Change Last Modified Timestamp: timestomp arquivo.exe –m “Monday 07/28/ :40 AM” “Reset” MAC timestamps timestomp arquivo.exe –b Date Created 01/01/ :00:00:000 10/18/ :59:37:203 Last Written 01/01/ :00:00:000 10/18/ :59:37:203 Last Accessed 01/01/ :00:00:000 10/18/ :59:37:203 Entry Modified 01/01/ :00:00:000 10/18/ :59:37:203

Anti-Anti-Forense: Correlação Timestomp: Counter-Counter-Technique Same to Live and Dead Analysis Detection: –Compare timestamps of SIA attributes with FN attributes (NTFS) FN attributes timestamps must be older than SIA timestamps –Zero milliseconds in timestamps is suspect –Check creation timestamps earlier than file system format date We can get FS format date in $MFT timestamps –Check Shadow Copy (WinVista) and Restore Point

Anti-Anti-Forense: Correlação Timestomp: Counter-Counter-Technique (II) Create a complete timeline –Include system events, logs, registry, prefetch, recent shortcuts –It can help to find out the true file or event timestamp Tools –TSK based scripts –Timehound (attention: it changes A-times !) –Append data to TSK bodyfile + mactime

Anti-Anti-Forense: Correlação File Type Filtering File Filtering/Sorting: –By extension, Header and/or Footer (magic numbers) Keeps the investigation focused on what really matters Technique Change extensions and subvert headers: –To deceive the file type –To forge a new file type Ex: Transmogrify Counter-Technique

Anti-Anti-Forense: Correlação File Type Filtering (II)

Anti-Anti-Forense: Correlação File Type Filtering (III)

Anti-Anti-Forense: Correlação File Filtering using Hash File sorting/filtering using a hashset: –To ignore known good files –To alert presence of known bad files Keeps the investigation focused on what really matters Technique Change a single byte in a string of an exe file –Known good turns into an unknown file, increasing the amount of files to investigate –Malware presence is not alerted Ex: Perl script modifying the DOS Mode disclaimer in.EXE Counter Technique

Anti-Anti-Forense: Correlação File Filtering using Hash (II)

Anti-Anti-Forense: Correlação Hash File Filtering: Counter-Counter-Technique It’s the same to Live or Dead Analysis Detection: –Sort using fuzzy hash, if too many unknown files Always use fuzzy hash to check against malware –Unknown.exe files never executed are suspect Check Prefetch files and Registry entries –Hidden files must show up in order to be executed Check Recent shortcuts, Prefetch and Registry, looking for references to non-existing files

Anti-Anti-Forense: Correlação Hash File Filtering: Counter-Counter-Technique (II) Pay attention to the timeline –Files accessed near to unrelated.exe are suspicious Some difficulties: –Fuzzy hashset for ssdeep not available NSRL is still preparing their hashset Tools: –ssdeep, md5deep, sha1deep

Anti-Anti-Forense: Correlação Hash File Filtering: Counter-Counter-Technique(III) MD5 is completely different fuzzy hash locates it

Anti-Anti-Forense: Correlação Content Analysis File Content Analysis: –Keyword Search –Relevancy Usually, after sorting/filtering out known good files Techniques Hide sensitive information: –In non allocated blocks –In fake bad blocks –In slack spaces Ex: Slacker Counter-Technique

Anti-Anti-Forense: Correlação Slack space 1 cluster Slacker writes here

Anti-Anti-Forense: Correlação Hiding Information: Counter-Counter-Technique It’s the same to Live or Dead Analysis Detection: –Hidden files must be exposed before use Check Recent shortcuts, Prefetch and Registry entries for broken references Parts of temp files in non-allocated blocks (~xxxx.doc) –Keyword search: Block based instead of file based TSK’s Blkls –Problem: Will miss a keyword located in borders of non- contiguous blocks –Malware hashset filtering/sorting Include slack space access tools (Bmap, Slacker) and Hex Editors

Anti-Anti-Forense: Correlação Slack space: Counter-Counter-Technique (II) Chances to recover contents: –Carving in Slack space/non allocated blocks Obfuscated content ? –There will be artifacts after file access –Frequent user -> negligence -> artifacts will show up ! Tools –TSK (Blk tools) –Foremost, Scalpel, Photorec for carving –Hashset filtering tools (md5deep, sorter)

Anti-Anti-Forense: Correlação Log Analysis Analyze log contents –Help determine who, where, when, what –Events can be used in timeline Technique Destroy log data: –Log wipe –Critical log records deletion –Fake log records insertion Ex: Wipe Counter-Technique

Anti-Anti-Forense: Correlação Log Analysis: Counter-Counter-Technique It’s the same to Live and Dead Analysis Detection: –Correlation/timeline between logs Analyze Registry, Events, service logs Parts of temp files in non-allocated blocks External logs correlation: proxy, firewall, web servers –If the information was locally wiped: Prefetch and Registry Artifacts Hashset filtering, alerting wipe tools –Memory dump artifacts: erased events or wiping tools Duplicated log server can trick intruders out !

Anti-Anti-Forense: Correlação Media artifacts search Media analysis (HDs, thumb drives, etc) –Dead or live analysis –In a recent past, it was the only place where investigators used to look for artifacts Technique Avoid “touch” HD: –Often used by attackers –Code injected to the memory never touches HD Ex: meterpreter, samjuicer Counter-Technique

Anti-Anti-Forense: Correlação Meterpreter x pwdump

Anti-Anti-Forense: Correlação Meterpreter x pwdump (II)

Anti-Anti-Forense: Correlação Meterpreter: Counter-Counter-Techniques Detection: Correlation/timeline between logs External logs correlation: proxy, firewall, web servers Memory acquisition is mandatory Artifacts are in memory dump Create a timeline with memory dump artifacts Mandiant tool to search for meterpreter artifacts in memory dumps

Anti-Anti-Forense: Correlação Meterpreter: Counter-Counter-Techniques (II) Tools –Mdd, win32dd, memoryze for RAM acquisition –Volatility, Memoryze and MSFF (Mandiant Metasploit Forensic Framework) for analysis –Perl scripts for bodyfile/timeline creation

Anti-Anti-Forense: Correlação Meterpreter: Artifacts

Anti-Anti-Forense: Correlação Search for Volatile Data Volatile data acquisition and analysis –Using tools and commands –Memory dump analysis Technique Rootkits: –Attackers or users –They can hide itself from commands and tools They can hide itself from memory or disk acquisition Counter-Technique

Anti-Anti-Forense: Correlação Forensics Image– Live Acquisition Rootkits Same for memory

Anti-Anti-Forense: Correlação Practical Live-Operations Risk Yes !! What are you seeing? Is it safe ? Piece of cake, there’s just a tiny poodle. We can go, you first !

Anti-Anti-Forense: Correlação Rootkits: Counter-Counter-Techniques Detection: Dead Acquisition - Always Even more important if external machine behavior cannot be explained by what have been found: In memory dumps; or In disk image, acquired by Live acquisition Malware hashset filtering Correlation/timeline between logs External logs correlation: proxy, firewall, web servers

Anti-Anti-Forense: Correlação Rootkits: Counter-Counter-Techniques (II) Combined techniques can hide the rootkit even from a dead analysis The investigator can boot the acquired image using a virtual machine, pause it and analyze the memory file, finding the rootkit Tools: DD, DCFLDD, DC3DD for image acquisition Tools for memory acquisition and analysis Tools for rootkit search and a rootkit hashset VMWare Server or other virtualization + LiveView

Anti-Anti-Forense: Correlação Malware – Dynamic Analysis Booting a virtual machine using the acquired image –Malware behavior analysis –Virtualization tools provide features to protect image integrity (aka snapshot) Technique Virtual machine blocking: –Code detects virtual machine environment –It cancels booting process Ex: VMDetectLibrary.dll e AntiVM.exe Counter-Technique

Anti-Anti-Forense: Correlação AntiVM: Counter-Counter-Technique Detection: –Registry entries and Prefetch –Process leaves artifacts in the memory dump, hiberfil.sys and pagefile.sys –Malware hashset filtering –Include AntiVM tools in the hashset Tools: Memory acquisition and analysis Hashset filtering tools and a malware hashset WFA for Prefetch analysis RegRipper for Registry analysis

Anti-Anti-Forense: Correlação SysAdmin: Number One Anti Forensics Technique - Logs ? Oh, we have no logs ! I’ve disabled them. We were wasting too much disk space...

Anti-Anti-Forense: Correlação References Anti-Forensics Website – Low Down and Dirty – Anti Forensics Rootkits – Bilby-up.pdf Anti Forensics The Rootkit Connection – 09/BLUNDEN/BHUSA09-Blunden-AntiForensics-SLIDES.pdf Metasploit Autopsy – Reconstructing the Crime Scene – 09/SILBERMAN/BHUSA09-Silberman-MetasploitAutopsy- SLIDES.pdf Forensics FTW ! – csWinsDecember2008.pdf Kernel Hacking and Anti Forensics – Evading Memory Analysis –Hakin9 maio/2008

Anti-Anti-Forense: Correlação References II Catch me if you can – Metasploit_AntiForensics.ppt Defeating Forensic Analysis – The Metasploit Project – Defeating_Forensic_Analysis.pdf

Anti-Anti-Forense: Correlação Further Readings

Anti-Anti-Forense: Correlação Obrigado ! inv.forense (at) gmail (dot) com (Tony Rodrigues)