Information Networking Security and Assurance Lab National Chung Cheng University F.I.R.E. Forensics & Incident Response Environment.

Slides:



Advertisements
Similar presentations
Presentation Heading – font Arial
Advertisements

LINUX-WINDOWS INTERACTION. One software allowing interaction between Linux and Windows is WINE. Wine allows Linux users to load Windows programs while.
Chapter One The Essence of UNIX.
Information Networking Security and Assurance Lab National Chung Cheng University Investigating Hacker Tools.
2004, Jei Nessus A Vulnerability Assessment tool A Security Scanner Information Networking Security and Assurance Lab National Chung Cheng University
Introduction to Applied Network Security By Prof. Herzberg Man in the Middle lab #1 Aharon Brodie.
2004, Jei Tripwire An Intrusion Detection Tool Information Networking Security and Assurance Lab National Chung Cheng University.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
Jai, 2004 Incident Response & Computer Forensics Chapter 6 Live Data Collection from Unix Systems Information Networking Security and Assurance Lab National.
Guide To UNIX Using Linux Third Edition
Information Networking Security and Assurance Lab National Chung Cheng University Backdoors and Remote Access Tools INSA Laboratory.
2004, Jei F.I.R.E. Forensics & Incident Response Environment Information Networking Security and Assurance Lab National Chung Cheng University.
Information Networking Security and Assurance Lab National Chung Cheng University Live Data Collection from Unix Systems.
Overview Basic functions Features Installation: Windows host and Linux host.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
Engineering H192 - Computer Programming The Ohio State University Gateway Engineering Education Coalition Lect 4P. 1Winter Quarter Introduction to UNIX.
Project Implementation for COSC 5050 Distributed Database Applications Lab1.
Capturing Computer Evidence Extracting Information.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Sleuthkit/Autopsy Kevin Krause.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
1 SAMBA. 2 Module - SAMBA ♦ Overview The presence of diverse machines in the network environment is natural. So their interoperability is critical. This.
Linux Operations and Administration
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
Session 5: Working with MySQL iNET Academy Open Source Web Development.
Tutorial 11 Installing, Updating, and Configuring Software
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
N ETWORKED & D ISTRIBUTED COMPUTING S YSTEMS L AB Programming Assignments EE323 Computer Networks.
Hands-On Virtual Computing
Lab How to Use WANem Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
File Recovery and Forensics
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
Introduction to Linux ( I ) Sidney Fong 4 th Feb 2006.
1 Working with MS SQL Server Textbook Chapter 14.
O.S.C.A.R. Cluster Installation. O.S.C.A.R O.S.C.A.R. Open Source Cluster Application Resource Latest Version: 2.2 ( March, 2003 )
Guide to Linux Installation and Administration1 Chapter 4 Running a Linux System.
Linux Operations and Administration Chapter Two Installing OpenSUSE.
COEN 250 Computer Forensics Windows Life Analysis.
Linux Operations and Administration
FTP COMMANDS OBJECTIVES. General overview. Introduction to FTP server. Types of FTP users. FTP commands examples. FTP commands in action (example of use).
Sem 2v2 Chapter 5 Router Startup and Setup. A router initializes by loading the bootstrap, the operating system, and a configuration file. If the router.
Lecture 02 File and File system. Topics Describe the layout of a Linux file system Display and set paths Describe the most important files, including.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
Install CB 1.8 on Ubuntu. Steps Followed Install Ubuntu (Ubuntu LTS) on Virtual machine – (VMware Workstation) (
2: Operating Systems Networking for Home & Small Business.
Virtual Machines Module 2. Objectives Define virtual machine Define common terminology Identify advantages and disadvantages Determine what software is.
“Build that Virtual Lab you always wanted” Information Assurance Group 2011.
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
INTERNET APPLICATIONS CPIT405 Install a web server and analyze packets.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
11 DEPLOYING AN UPDATE MANAGEMENT INFRASTRUCTURE Chapter 6.
BY: SALMAN 1.
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
bitcurator-access-webtools Quick Start Guide
VMware ESX and ESXi Module 3.
Chapter Objectives In this chapter, you will learn:
BY: SALMAN.
Router Startup and Setup
Managing Software.
9 Linux on the Desktop.
INSTALLING AND SETTING UP APACHE2 IN A LINUX ENVIRONMENT
SUSE Linux Enterprise Desktop Administration
Router Startup and Setup
Computer Forensics Lab 1 INFORMATION TECHNOLOGY DEPARTMENT LEBANESE FRENCH UNIVERSITY (LFU) COURSE CODE: IT402CF 1.
Linux Operations and Administration
bitcurator-access-webtools Quick Start Guide
Presentation transcript:

Information Networking Security and Assurance Lab National Chung Cheng University F.I.R.E. Forensics & Incident Response Environment

Information Networking Security and Assurance Lab National Chung Cheng University 2 Outline Preface Analyze Unknown Binary F.I.R.E. Example Conclusion

Information Networking Security and Assurance Lab National Chung Cheng University 3 Outline Preface Analyze Unknown Binary F.I.R.E. Example Conclusion

Information Networking Security and Assurance Lab National Chung Cheng University 4 What and The Purpose Examine an Unknown malware binary (Open Source tools)  The Sleuth Kit  autopsy  strings  hexedit  … F.I.R.E.  Package all tools together in a bootable CD

Information Networking Security and Assurance Lab National Chung Cheng University 5 Outline Preface Analyze Unknown Binary F.I.R.E. Example Conclusion

Information Networking Security and Assurance Lab National Chung Cheng University 6 Under an Unknown Condition Possibly where it came from What the binary’s purpose is It may be possible to identify when the system was compromised & the binary installed May be also discover which user id facilitated the compromise of the system

Information Networking Security and Assurance Lab National Chung Cheng University 7 Binary Details From  The file size when extracted The file size within the archive The last modified time CRC number Userid, md5sum, …

Information Networking Security and Assurance Lab National Chung Cheng University 8 The strings command Parse an input file and output readable strings Sequentially program the code May deal with creating & starting services May be an ICMP back-door to a cmd.exe shell

Information Networking Security and Assurance Lab National Chung Cheng University 9 The hexedit command The purposes  Confirm the function of the application  Confirm who was involved in it’s creation or distribution (possibly) The command line Some information you interested!!

Information Networking Security and Assurance Lab National Chung Cheng University 10 The person may compile, write or created the zip file May be a ICMP back- door to a cmd.exe shell

Information Networking Security and Assurance Lab National Chung Cheng University 11 May be the hacker’s message smesses.exe and reg.exe: querying amd modifying registry entries The ip address

Information Networking Security and Assurance Lab National Chung Cheng University 12 Some DLL files KERNEL32.dll ADVAPI32.dll WS2_32.dll MSVCRT.dll MSVP60.dll

Information Networking Security and Assurance Lab National Chung Cheng University 13 The objdump command View library information about a binary executable -p option  Print the object header information command The time and date

Information Networking Security and Assurance Lab National Chung Cheng University 14 The kernel interface was dealing with pipes and handles so the application was talking to interface, processes or other applications!!

Information Networking Security and Assurance Lab National Chung Cheng University 15 The application was doing something to the systems services

Information Networking Security and Assurance Lab National Chung Cheng University 16 May be Socket & IOCTL calls, so the application is definitely communicating with external applications through a socket

Information Networking Security and Assurance Lab National Chung Cheng University 17 Shows the basic Terminal I/O communications through the standard MSVCRT library

Information Networking Security and Assurance Lab National Chung Cheng University 18 The f-prot command It’s a virus scanner Can Live-Update (/usr/local/f-prot/update-defs.sh) The command Nothing you can find

Information Networking Security and Assurance Lab National Chung Cheng University 19 All evidence leads me to decide An ICMP back-door to cmd.exe Default password may be loki Coded by Spoof Hacker group  MFC May be installed by local user Rich

Information Networking Security and Assurance Lab National Chung Cheng University 20 From Google 2.tar.gz 2.tar.gz Coded for windows version based on loki2 for Unix-Like OS

Information Networking Security and Assurance Lab National Chung Cheng University 21 Outline Preface Analyze Unknown Binary F.I.R.E. Example Conclusion

Information Networking Security and Assurance Lab National Chung Cheng University 22 What A bootable Linux CD that turns any machine into a forensics workstation Boot the entire system without touching the local system Open Source

Information Networking Security and Assurance Lab National Chung Cheng University 23 How F.I.R.E. runs within a RAM disk that it does not touch the system or images Log the information you need to the /data/ directory

Information Networking Security and Assurance Lab National Chung Cheng University 24 Two quick ways of using F.I.R.E Burnt the ISO to a CD & boot from it The ISO can be booted from within VMWare

Information Networking Security and Assurance Lab National Chung Cheng University 25 Autopsy Graphic interface Some features Case Management File Analysis File Content Analysis File Type Hash Database Timeline of File Activity Keyword Search Meta Data Analysis Image Details Image integrity Notes Reports Logging Open Design Client Server Model

Information Networking Security and Assurance Lab National Chung Cheng University 26 Outline Preface Analyze Unknown Binary F.I.R.E. Example Conclusion

Information Networking Security and Assurance Lab National Chung Cheng University 27 The compromised image From the Digital Forensics Research Workshop Download site 

Information Networking Security and Assurance Lab National Chung Cheng University 28 The VMWare Select the ISO image The beginning!!

Information Networking Security and Assurance Lab National Chung Cheng University 29 Set-up your network(1/2) Prompt mode Start menu!! Many options

Information Networking Security and Assurance Lab National Chung Cheng University 30 Set-up your network(2/2) Command line Set up the IP Address, Netmask and default gateway!!

Information Networking Security and Assurance Lab National Chung Cheng University 31 Log you activity Like The script command! Right clicking->Shells/Consoles->logging->respawn all logging xterms The data was saved to /data/consolelogs/$user/$date-$tty.log

Information Networking Security and Assurance Lab National Chung Cheng University 32 consh and replay consh (shell script)  Do the logging replay (command)  #replay May tty_ttyp0.log.timing May tty_ttyp0.log

Information Networking Security and Assurance Lab National Chung Cheng University 33 Start Command You must start your browser to this URL for starting

Information Networking Security and Assurance Lab National Chung Cheng University 34 Set-up the Case select /data/

Information Networking Security and Assurance Lab National Chung Cheng University 35 Add Host

Information Networking Security and Assurance Lab National Chung Cheng University 36 Add Image

Information Networking Security and Assurance Lab National Chung Cheng University 37 Analysis type File analysis  Browse the various files available on the image, including deleted files Keyword search  Search the image for various keywords File type  Run the sorter that counts the various file types on the image Image details  Contain summary data about the image Meta Data  You can enter a meta data number for search Data Unit  Allow for the entry of a sector number

Information Networking Security and Assurance Lab National Chung Cheng University 38 Some test(1/6)

Information Networking Security and Assurance Lab National Chung Cheng University 39 Some test(2/6) Enter what you want to search Quick search

Information Networking Security and Assurance Lab National Chung Cheng University 40 Some test(3/6) summary

Information Networking Security and Assurance Lab National Chung Cheng University 41 Some test(4/6)

Information Networking Security and Assurance Lab National Chung Cheng University 42 Some test(5/6)

Information Networking Security and Assurance Lab National Chung Cheng University 43 Some test(6/6)

Information Networking Security and Assurance Lab National Chung Cheng University 44 The final step Create Data File Create Timeline tar & md5sum

Information Networking Security and Assurance Lab National Chung Cheng University 45

Information Networking Security and Assurance Lab National Chung Cheng University 46

Information Networking Security and Assurance Lab National Chung Cheng University 47 Outline Preface Analyze Unknown Binary F.I.R.E. Example Conclusion

Information Networking Security and Assurance Lab National Chung Cheng University 48 Do not touch the local system

Information Networking Security and Assurance Lab National Chung Cheng University 49 Additional Information(1/2) VNC Internet VNC connection

Information Networking Security and Assurance Lab National Chung Cheng University 50 Addition Information(2/2) Some legal issue  Go to the INSA Knowledge-Base