Download presentation
Presentation is loading. Please wait.
1
2004, Jei F.I.R.E. Forensics & Incident Response Environment Information Networking Security and Assurance Lab National Chung Cheng University
2
Outline Preface Analyze Unknown Binary F.I.R.E. Example Conclusion Information Networking Security and Assurance Lab National Chung Cheng University
3
Outline Preface Analyze Unknown Binary F.I.R.E. Example Conclusion Information Networking Security and Assurance Lab National Chung Cheng University
4
What and The Purpose Examine an Unknown malware binary (Open Source tools) The Sleuth Kit autopsy strings hexedit … F.I.R.E. Package all tools together in a bootable CD
5
Outline Preface Analyze Unknown Binary F.I.R.E. Example Conclusion Information Networking Security and Assurance Lab National Chung Cheng University
6
Under an Unknown Condition Possibly where it came from What the binary’s purpose is It may be possible to identify when the system was compromised & the binary installed May be also discover which user id facilitated the compromise of the system
7
Binary Details From http://www.giac.org/gcfa/binary_v1.3.zip http://www.giac.org/gcfa/binary_v1.3.zip The file size when extracted The file size within the archive The last modified time CRC number Information Networking Security and Assurance Lab National Chung Cheng University Userid, md5sum, …
8
The strings command Parse an input file and output readable strings Sequentially program the code May deal with creating & starting services May be an ICMP back-door to a cmd.exe shell
9
The hexedit command The purposes Confirm the function of the application Confirm who was involved in it’s creation or distribution (possibly) The command line Some information you interested!! Information Networking Security and Assurance Lab National Chung Cheng University
10
The person may compile, write or created the zip file May be a ICMP back- door to a cmd.exe shell Information Networking Security and Assurance Lab National Chung Cheng University
11
May be the hacker’s message smesses.exe and reg.exe: querying amd modifying registry entries The ip address
12
Some DLL files KERNEL32.dll ADVAPI32.dll WS2_32.dll MSVCRT.dll MSVP60.dll Information Networking Security and Assurance Lab National Chung Cheng University
13
The objdump command View library information about a binary executable -p option Print the object header information command The time and date Information Networking Security and Assurance Lab National Chung Cheng University
14
The kernel interface was dealing with pipes and handles so the application was talking to interface, processes or other applications!! Information Networking Security and Assurance Lab National Chung Cheng University
15
The application was doing something to the systems services Information Networking Security and Assurance Lab National Chung Cheng University
16
May be Socket & IOCTL calls, so the application is definitely communicating with external applications through a socket Information Networking Security and Assurance Lab National Chung Cheng University
17
Shows the basic Terminal I/O communications through the standard MSVCRT library Information Networking Security and Assurance Lab National Chung Cheng University
18
The f-prot command It’s a virus scanner Can Live-Update (/usr/local/f-prot/update- defs.sh) Information Networking Security and Assurance Lab National Chung Cheng University The command Nothing you can find
19
All evidence leads me to decide An ICMP back-door to cmd.exe Default password may be loki Coded by Spoof Hacker group MFC May be installed by local user Rich Information Networking Security and Assurance Lab National Chung Cheng University
20
From Google http://packetstormsecurity.com/crypt/misc/l oki2.tar.gz http://packetstormsecurity.com/crypt/misc/l oki2.tar.gz Coded for windows version based on loki2 for Unix-Like OS Information Networking Security and Assurance Lab National Chung Cheng University
21
Outline Preface Analyze Unknown Binary F.I.R.E. Example Conclusion Information Networking Security and Assurance Lab National Chung Cheng University
22
What A bootable Linux CD that turns any machine into a forensics workstation Boot the entire system without touching the local system Open Source http://fire.dmzs.com http://www.sourceforge.net/projects/biatch ux http://www.sourceforge.net/projects/biatch ux Information Networking Security and Assurance Lab National Chung Cheng University
23
How F.I.R.E. runs within a RAM disk that it does not touch the system or images Log the information you need to the /data/ directory Information Networking Security and Assurance Lab National Chung Cheng University
24
Two quick ways of using F.I.R.E Burnt the ISO to a CD & boot from it The ISO can be booted from within VMWare Information Networking Security and Assurance Lab National Chung Cheng University
25
Autopsy http://www.sleuthkit.org/autopsy/desc.php Graphic interface Some features Case Management File Analysis File Content Analysis File Type Hash Database Timeline of File Activity Keyword Search Meta Data Analysis Image Details Image integrity Notes Reports Logging Open Design Client Server Model
26
Outline Preface Analyze Unknown Binary F.I.R.E. Example Conclusion Information Networking Security and Assurance Lab National Chung Cheng University
27
The compromised image From the Digital Forensics Research Workshop http://www.dfrw.org Download site http://www.honeynet.org/scans/scan24/ http://www.honeynet.org/scans/scan24/ Information Networking Security and Assurance Lab National Chung Cheng University
28
The VMWare Select the ISO image The beginning!! Information Networking Security and Assurance Lab National Chung Cheng University
29
Set-up your network(1/2) Prompt mode Information Networking Security and Assurance Lab National Chung Cheng University Start menu!! Many options
30
Set-up your network(2/2) Command line Set up the IP Address, Netmask and default gateway!! Information Networking Security and Assurance Lab National Chung Cheng University
31
Log you activity Like The script command! Right clicking->Shells/Consoles->logging->respawn all logging xterms The data was saved to /data/consolelogs/$user/$date-$tty.log
32
consh and replay consh (shell script) Do the logging replay (command) #replay May30-182215-tty_ttyp0.log.timing May30-182215-tty_ttyp0.log Information Networking Security and Assurance Lab National Chung Cheng University
33
Start Information Networking Security and Assurance Lab National Chung Cheng University Command You must start your browser to this URL for starting
34
Set-up the Case select /data/ Information Networking Security and Assurance Lab National Chung Cheng University
35
Add Host Information Networking Security and Assurance Lab National Chung Cheng University
36
Add Image Information Networking Security and Assurance Lab National Chung Cheng University
37
Analysis type File analysis Browse the various files available on the image, including deleted files Keyword search Search the image for various keywords File type Run the sorter that counts the various file types on the image Image details Contain summary data about the image Meta Data You can enter a meta data number for search Data Unit Allow for the entry of a sector number
38
Some test(1/6) Information Networking Security and Assurance Lab National Chung Cheng University
39
Some test(2/6) Information Networking Security and Assurance Lab National Chung Cheng University Enter what you want to search Quick search
40
Some test(3/6) Information Networking Security and Assurance Lab National Chung Cheng University summary
41
Some test(4/6) Information Networking Security and Assurance Lab National Chung Cheng University
42
Some test(5/6) Information Networking Security and Assurance Lab National Chung Cheng University
43
Some test(6/6) Information Networking Security and Assurance Lab National Chung Cheng University
44
The final step Create Data File Create Timeline tar & md5sum Information Networking Security and Assurance Lab National Chung Cheng University
45
Information Networking Security and Assurance Lab National Chung Cheng University
46
Information Networking Security and Assurance Lab National Chung Cheng University
47
Outline Preface Analyze Unknown Binary F.I.R.E. Example Conclusion Information Networking Security and Assurance Lab National Chung Cheng University
48
Do not touch the local system Information Networking Security and Assurance Lab National Chung Cheng University
49
Additional Information(1/2) VNC Internet VNC connection Information Networking Security and Assurance Lab National Chung Cheng University
50
Addition Information(2/2) Some legal issue Go to the INSA Knowledge-Base Information Networking Security and Assurance Lab National Chung Cheng University
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.