Live Forensics Investigations Computer Forensics 2013.

Slides:



Advertisements
Similar presentations
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Advertisements

COEN 250 Computer Forensics Unix System Life Response.
Thank you to IT Training at Indiana University Computer Malware.
Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
Trojan Horse Program Presented by : Lori Agrawal.
COEN 250 Computer Forensics Windows Life Analysis.
COEN 250 Computer Forensics Windows Life Analysis.
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Jai, 2004 Incident Response & Computer Forensics Chapter 5 Live Data Collection from Windows System Information Networking Security and Assurance Lab National.
Jai, 2004 Incident Response & Computer Forensics Chapter 6 Live Data Collection from Unix Systems Information Networking Security and Assurance Lab National.
Information Networking Security and Assurance Lab National Chung Cheng University Live Data Collection from Windows System.
Information Networking Security and Assurance Lab National Chung Cheng University Live Data Collection from Unix Systems.
COEN 252: Computer Forensics Router Investigation.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Capturing Computer Evidence Extracting Information.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Chapter Three OPERATING SYSTEMS.
Your Interactive Guide to the Digital World Discovering Computers 2012.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Disclaimer The Content, Demonstration, Source Code and Programs presented here is "AS IS" without any warranty or conditions.
Administering Windows 7 Lesson 11. Objectives Troubleshoot Windows 7 Use remote access technologies Troubleshoot installation and startup issues Understand.
Safe Computing Outreach Joseph Howard Undergraduate Research Assistant 05/01/2015 Disclaimer: This research was supported by the National Science Foundation.
Viruses.
Hacker Zombie Computer Reflectors Target.
Teaching Digital Forensics w/Virtuals By Amelia Phillips.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
Rootkits. EC-Council The Problem  Microsoft Corp. security researchers are warning about a new generation of powerful system-monitoring programs, or.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
University of Management & Technology 1 Operating Systems & Utility Programs.
Software.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
Your Interactive Guide to the Digital World Discovering Computers 2012.
COEN 250 Computer Forensics Windows Life Analysis.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
COEN 250 Computer Forensics Windows Life Analysis.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Backdoors and Rootkits.
Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.
Homework tar file Download your course tarball from web page – Named using your PSU ID – Chapter labeled for each binary.
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
COEN 250 Computer Forensics Unix System Life Response.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
CSC190 Introduction to Computing Operating Systems and Utility Programs.
Role Of Network IDS in Network Perimeter Defense.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Mastering Windows Network Forensics and Investigation Chapter 6: Live Analysis Techniques.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Troubleshooting Windows Vista Lesson 11. Skills Matrix Technology SkillObjective DomainObjective # Troubleshooting Installation and Startup Issues Troubleshoot.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
BY: SALMAN 1.
BY: SALMAN.
Footprinting and Scanning
Malware Reverse Engineering Process
Backdoor Attacks.
Chapter 3. Basic Dynamic Analysis
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

Live Forensics Investigations Computer Forensics 2013

Live Investigations  Necessary because  computer cannot be shut down  E.g.: important server  nature of evidence is too volatile  E.g.: Malware investigations  cost consideration  remote forensics

Live Investigations  Special challenges:  Interaction with life system changes the status of the life system  Consequence:  Need to document carefully what is being done  Use scripts  Use automated gathering tools  System can be root-kitted  Interaction with system is not usually at the lowest level possible

Live Investigations  Became normal only recently  Always seemed better to work directly with hard drive  If necessary construct a clone of the life system  Tools for capturing volatile evidence have increases

Live Investigation  Need to be preplanned  Bring all the tools, do not interrupt evidence gathering, document every step

Remote gathering of data  Possible to install forensics module  Allows routine investigations via network connection  Installs a trusted agent on each potential target machine  Agent communicates via a secure connection  Once triggered, agent collects data and sends them through a one- way connection to a collector

Remote gathering of data  Forensics Agent  Forensically sound data collection  Fully configurable  Best practice  Cross-platform  Can be used stand-alone or remotely

Remote gathering of data TestWindowsLinux Users logged onpsloggedon.exew System uptimepsinfo.exeuptime File timestampsdir, attribls Network connectionsnetstat, fport.exenetstat Running processespslists.exeps Loaded DLLslistdlls.exe- Network configurationnetstat.exe, arp.exe, ipconfig.exenetstat, ifconfig Installed servicespsservice.exe- Log dataauditpol.exe, ntlast.exe, psloglist.exelast Kernel modules-lsmod Mounted filesystems-df Registryregdmp.exe- Password hashespwdump3.execat Open fileshandle.exelsof

Remote gathering of data  Application specific data  Browser history, skype chat logs,...  Memory capture

Remote gathering of data  Various providers  Encase, Access data, F-response,...

Live Forensics  Usually use a toolkit  User-level rootkits  No influence since you are using your own tools  System-level rootkits  Norm among rootkits  Do usually not lie consistently:  Use several ways / tools to ask the same question  Automatically look for inconsistencies  Anti-rootkit-defense  Run various antivirus tools

Preparing the Toolkit

 Label the toolkit.  Check for dependencies with Filemon or ListDLL.  Lots of dependencies  lots of MAC changes.  Lots of dependencies  easy to run into a trojaned utility  Create an MD5 of the toolkit.  Write protect any floppies.

Using the Toolkit

Storing Obtained Data  Save data on the hard drive of target.  (Modifies System.)  Record data by hand.   Save data on removable media.  Includes USB storage.  Save data on a remote system with netcat or cryptcat.

Storing Obtained Data with netcat  Quick on, quick off target system.  Allows offline review.  Establish a netcat listener on the forensic workstation. Redirect into a file.  Establish a netcat funneler on the target system to the forensic workstation.  Cryptcat does the same, but protects against sniffing.

Obtaining Volatile Data Store at least  System date and time.  List of current users.  List of current processes.  List of currently open sockets.  Applications listed on open socket.  List of systems with current or recent connections to the system.

Obtaining Volatile Data: Procedure  Execute a trusted cmd.exe  Record system time and date.  Determine who is logged on.  Record file MAC.  Determine open ports.  List all apps associated with open ports.

Obtaining Volatile Data: Procedure  List all running processes.  List current and recent connections.  Record the system time and date.  Document the commands used during initial response.

Recording System Time

Determining Logons

Cmdline from DiamondCS

Determining File MAC

Determining Open Ports

Listing Applications with Open Ports

Listing all running processes

List current connections

Documenting history

Scripting the response

Examples  Use Fport to look at open ports.  Use a list of ports to find suspicious ports, i.e. those used by known Trojans, sniffers or spyware.

Examples  If at your home system, fport shows a suspicious port use and netstat shows a current connection to this port, then kill the process.

Examples  Knowing what processes are running does not do you any good.  You need to know what they are doing.  At least, know the typical processes.

Examples  Access the registry with RegDump  Then study it with regedit on the forensic system.

Examples Assume generic monitoring of systems. Look for  Unusual resource utilization or process behavior.  Missing processes.  Added processes.  Processes with unusual user identification.

Examples  The windows task manager can be very helpful.

Examples: Detecting and Deleting Trojans  Use port scanning tools, either on host machine or remote machine.  Fport (Windows)  Superscan (Windows)  Nmap  netstat (for open connections)

Examples: Detecting and Deleting Trojans  Identify the Trojan on the disk.  Find out how it is being initiated and prevent the process.  Reboot the machine and delete the Trojan.

Example  Run superscan on local host to check for open ports.  What is happening at port 5000?

Example Port 5000?

Example  Run fport.  Connected to process 1260.

Example  Use pllist to find out what this is.  Connected to a process called svchost.

Example  Do an internet search on svchost.  Process checks the service portion of the registry to start services that need to run.  Use Tasklist /SVC in a command prompt

Example

 Nothing serious here.  At least not on the surface.

Malware investigations  Run malware in a virtual machine  Problem: Malware can detect it is running in a virtual machine  Run malware on a life system  Dangerous for the environment  Can limit network connectivity  Try to observe malware effects  Live system:  Need to run monitoring tools  E.g. regmon, filemon  Can be detected by malware  Use differential analysis  Do system analysis on images taken before and after infection

Malware investigations  Can simulate the internet with inetsim

Malware investigations  Physical targets  Malware runs in native habitat  Without hypervisors, emulators,...  Example: TRUMAN – The reusable unknown malware analysis net  Two physical computers  Windows machine for malware client  Linux machine for supervisor  Makes dd-images after executing samples,...  Simulates internet services such as SMTP, FTP, IRC  Provides  Memory analysis with volatility  Registry analysis with regdiff.pl, dumphive, RegRipper  Packer identification  Network traffic analysis  NTFS ADS streams  Hashes of system files

Malware investigations  Physical target  Deep Freeze:  Prevents permanent changes to computer  FOG  Cloning and imaging software

Malware investigations  Analysis Cycle Create Baseline Reimage target Transfer malware Preexecution Execute malware Suspend VM dump memory Postexecution Analyze hard disk

Malware investigations