SlideShare a Scribd company logo
1 of 106
Download to read offline
CNIT 121:
Computer
Forensics
6. Discovering the Scope of the Incident
Scope
• What did the attacker do?
• Initial detection is usually only part of the story
Examining Initial Data
• Look at original alert
• You may notice more than the person who reported
it did
• Ask about other detection systems and review what
they recorded
• Network administrators may not think like
investigators
• Gather context for the detection event
Preliminary Evidence
• Determine what sources of preliminary evidence
may help
• Decide which sources you will actually use
• Collect and review the evidence
• Identify sources that are easy to analyze, and
that quickly provide initial answers
Example: Malware
Indpendent Sources
• Firewall logs don't depend on registry keys, etc.
• Multiple independent exvidence sources lead to
more reliable conclusions
• It's difficult for an attacker to remove or modify
evidence from all sources
• Less likely that a routine process would overwrite
or discard all evidence
• Cross-check information, like date and time
Review
• Attacker may be causing more damage
• Test a detection method on one system, or a
small date range of log entries
• Make sure your detection method is fast and
effective
Determining a Course of
Action
Data Loss Scenario
• Large online retailer
• You work in IT security department
• Customers are complaining about spam after
becoming a new customer
Finding Something Concrete
• Anecdotal customer complaints are
inconclusive
• Options
• Work with customers and review their email
• Relability and privacy problems
• Create fake customer accounts with unique
email addresses
Fake Accounts
• Use 64-character random usernames
• Unlikely that spammers would guess the
usernames
• Monitor those accounts
Preliminary Evidence
• Assuming customer data is being lost
somehow:
• Find where customer data is and how it is
managed
• One internal database on production server
• One external database at a third-party marketing
firm
Interview Results
Progress
Theories & Simple Tests
• Insider
• No easy way to test
• Modified code on website to capture email
addresses
• Enter some fake accounts directly into
database, bypassing the web form
• Someone copying backup tapes
• Add some fake accounts to the backups
Two Weeks Later
• Spam comes to the first set of fake accounts
• And to the accounts manually entered into the
database
• Suggests the website is not part of the
problem
• No spam from the accounts on the backup tape
• Backups aren't the source of data loss
New Theories
• Direct access to the database
• Malware on the database server
• Accessing it over the network
Monitoring Queries
• Network-level packet captures
• Expensive, powerful system required
• If queries are encrypted, or malware is
obfuscating them, it may be hard to decode
the traffic
• Database-level query monitoring and logging
• Most efficient and reliable technique
Next Steps
• Create a few more fake accounts
• Talk to database and application administrators
• To find out where data is stored
• Scan through logs to see what is "normal"
• No queries or stored procedures perform a bulk
export of email addresses on a daily basis
Two Weeks Later
• New accounts get spam
• Retrieve query logs from time accounts created
to spam time
• For the field "custemail"
• A single query is found
• SELECT custemail FROM custprofile WHERE
signupdate >= "2014-02-16"
Query Details
• Feb 17, 2014 at 11:42 am GMT
• Originated from IP in graphics arts dept.
• Query used an database administrator's
username from the IT dept.
• Interview reveals that graphics arts dept. has no
direct interaction with customers, only outside
vendors
Leads
Action: Graphics Arts
Desktop
Action: Database Server
Results from Workstation
• Examine images, focusing on actions at the time of
the query
• Malware found on workstation
• Persistent, provides remote shell, remote graphical
interface, ability to launch and terminate processes
• Connects to a foreign IP
• Has been installed for two years
• Cannot determine how system was originally
compromised
Final Steps of Investigation
Scoping Gone Wrong
• After complaints from customers
• Search every computer in the company for
unique strings in the customer data,
• And files large enough to include all the
customer records
Problems
• No evidence that the stolen data is stored on
company servers
• No evidence that the data is all being stolen at
once in a large file
• And even so, it would probably be
compressed
• Large amount of effort; low chance of success
Another Unwise Path
• Focus on insiders
• Who had access and knowledge to steal the
customer data
• Compile profiles of numerous employees
• Review personnel files
• Background checks, surveillance softare
capturing keystrokes and screen images
• Video surveillance installed
Problems
• Leads to a "witch hunt"
• Invades privacy of employees
• Large effort, small chance of success
Another Unwise Path
• Because the data resides on the database
server
• Image and analyze RAM from the database
server to hunt for malware
• Because the hard drives are massive and too
large to investigate easily
Problems
• Once again, they have jumped to a conclusion
• And ignored other possibilities
• Large effort, low chance of success
Scenario 2: Automated
Clearing House Fraud
• Bank called the CEO--they blocked an ACH
transfer of $183,642.73
• To an account that was never used before
• Flagged by their fraud prevention system
• Transfer from CFO's account, but he says he
never authorized it
Facts from the Bank
Preliminary Evidence
• Firewall
• Two weeks of logs
• Examine this first
• CFO's laptop computer
• Live resonse, RAM, hard drive
• But maybe other computers are involved
Firewall Logs
• Look near the time the unauthorized transfer
occurred (4:37 pm)
• See who logged in prior to that
• Two computers logged in via HTTPS, making a
number of connections between 4:10 pm and
4:48 pm
• From two IPs -- one is CFO's, other not
immediately recognized
Two Immediate Tasks
• Gather complete forensic evidence from CFO's
computer
• Live response, RAM, and hard disk
• Because evidence is being lost as time
passes
• Track down the other IP address and decide
what action is appropriate
DHCP Logs
• Search for the time in question
• Get MAC address from DHCP logs
• It's the MAC of the CFO's laptop!
Interview the CFO
Recap
Theories
Open Office Space
• CFO's office is in clear view of other workers
• It's unlikely that someone could go into it
unobserved
CFO's Computer
• Recently installed persistent executable
• Send it to a third-party analysis site
• It's a variant of the Zeus banking malware
Final Steps of Investigation
Scoping Gone Wrong
• There are no recent antivirus or IDS alerts
• So you believe the security issue must be at the
bank
• Tell the bank to find the attacker and put them in
jail
Problems
• No attempt to validate the bank's original data
• Company assumes that existing network
security measures would detect a problem, if
there was one
• Assumption that a third-party can help you
• While you wait, data on company systems is
lost
Another Unwise Path
• CEO believes that security measures are in
place to prevent malware, so the CFO must have
initiated the transfer
• The CEO wants you to investigate the CFO and
avoid tipping him (or her) off
Problem
• No security measures are perfect, not even two-
factor authentication
• Also, that sort of investigation is outside your
expertise, and should be referred to an outside
contractor
CNIT 121:
Computer
Forensics
7. Live Data Collection
Purpose of Live Collection
• Preserve volatile evidence that will further the
investigation
• Also collect log files and file listings
• Get answers quickly
• Minimize changes to the system
• Avoid disrupting business, causing crashes, or
destroying evidence
When to Perform Live
Response
Risks of Live Response
Altering the Evidence
• All live response changes the system
• Purists don't like it
• But the alternative is to lose all volatile data and
get only a disk image
• You can minimize changes, but not eliminate
them
Selecting a Live Response
Tool
• Homegrown Microsoft DOS batch script (or
bash)
• Perl-based script
• There are specialized live-response products,
free and commercial
Factors to Consider
• Is the tool generally accepted in the forensic
community?
• Does the solution address the common
operating systems in your environment?
• Tools that use OS commands should contain
known good copies of those commands, not
trust the local commands on the suspect
system
Factors to Consider
• Does the solution collect data that is important
to have, in your environment?
• How long does a collection take?
• Recommended: less than an hour per system
• Is the system configurable?
• Is the output easily reviewed and understood?
What to Collect
• Current running state of the system
• Network connections
• Running Processes
• What happened in the past
• File listings, system logs
• Usually a higher priority
The Deep End
• Some oranizations always collect entire RAM
contents, or hard disk images
• Don't collect data that you can't effectively use
or understand
• Collect data you can really use to quickly
determine the impact of the incident
Data to Collect
Data to Collect
Complete RAM Capture
• Requires specialized tools to collect and
interpret
• Not part of Live Response
• Sometimes needed on carefully chosen systems
Collection Best Practices
• Practice on a test system first
• Learn how fast the process is, and how large
the output is
• Practice handling problems
• Broken USB port or NIC
• Locked screen
Caution: Malware
• The system you are examining may be infected
with malware
• Any media you connect may become infected
• Any credentials you use may be compromised
Recommended Procedure
Recommended Procedure
Recommended Procedure
Horror Stories:
IR Procedures
• Copy live response toolkit to affected systems,
save collected data back to that same system
including full RAM dump, several gigabytes in
size
• Remotely log in with domain administrator
account, run netstat & Task Manager
• Pull out the plug, image the hard drive
Good Methods of
Live Response
• Network share on a dedicated file server
• Not part of any domain
• Used throwaway credentials not used for any
other purpose
• Two folders
• Read-only containing the live response toolkit
• Writeable for output from live response toolkit
Live Response Process
Live Response Tips
• Air-gap for evidence server
• Logging and auditing access to evidence server
• Automate process for consistency
• Live Response software must run as Local
Administrator/root
Media
• Some computers cannot connect external media
• Hardware failure, configuration, etc.
• Common options for running toolkit
• CD-ROM, DVD, network share
• Encrypted network streaming tool like
cryptcat or stunnel to send output to another
system
Unexpected OS
• Cannot run your normal live response toolkit
• If you can't update or modify your toolkit to run
• Perform manual live response
Unexpected OS
• Create a checklist of the automated steps in the
toolkit for a similar OS
• Research command-line options
• Test them on a known clean system, if possible
• Manually perform steps to collect evidence
Automation
• Decreases human error
• Makes processes more consistent and faster
• Helps to prevent bad guys from gathering
intelligence about how you respond to incidents
• Anything you do on the evidence system may
be sent to the bad guys
Live Data Collection on
Microsoft Windows Systems
Three Main Options
• Use a prebuilt kit (Mandiant Redline)
• Create your own
• Use a hybrid of the two
Mandiant Redline
• Install the Redline MSI package on a trusted
workstation
• Create the Redline collector on the trusted
system
• The only step you take on a suspect system is to
run the stand-alone Redline collector batch script
• Automatically saves data to the same location
you ran the script from
Do It Yourself
• Make your own live response toolkit
• Decide what OS to support
• Windows has many versions, and big
differences between 32-bit and 64-bit
• Find tools that collect the information you want
Windows Built-in Tools
• Copy these files from a
clean Windows system
• Also copy cmd.exe
• "Trusted binaries"
• Don't trust files on the
evidence machine
Free Tools
• Use command-line
versions, not GUI
versions
• Easier to script
• Less impact
• Rename every tool so
you can identify it as
something you added
to the system
• Prepend "t_"
Other Data Items
• Prefetch information
• System restore point information
• Browser history, and more
• Balance your needs with the impact the
collection has on the system
Scripting Language
• Choose one
• MS-DOS Batch (lowest impact)
• VBScript
• Perl
• Python
Scripting Tips
• Add logging and compute a checksum of
collected data
• Be careful with file and directory names
• They may be long or include spaces
• Test your script extensively
• Built a test environment that resembles your
production systems
• Watch for errors and unexpected results
Memory Collection
• Tools for a full memory dump
• AccessData FTK Imager Lite
• Mandiant Memoryze
• Monsools Windows Memory Toolkit
Mandiant Memoryze
• Command-line tool: MemoryDD.bat
AccessData FTK Imager Lite
Individual Process RAM
Dump
• Tools
• Mandiant Memoryze
• Microsoft userdump
• Microsoft procdump
• Ntsecurity.nu pmdump
TeamViewer Credentials
Live Data Collection on
Unix-Based Systems
LINReS
• From Network Intelligence India
• Written for RedHat 3 and 4, not updated since
2006
• Useful mainly as an example to guide you in
making a custom tool
Do It Yourself
• Really the only option
• Make some scripts
• Mandiant uses Bourne shell scripts that make
scripts for various Unix/Linux versions
• Requires constant maintenance
Language Choices
• Perl
• Python
• Bourne shell
• BASH (Mandiant uses this)
• others
Apple Systems
• system_profiler
• Very long list of software, hardware, logs, etc.
system_profiler
system_profiler
Built-in Unix Tools
Built-in Unix Tools
Built-in Unix Tools
Memory Collection
• The memory device is handled differently in
every version of Unix, BSD, and Linux
• In earlier versions, you could just use dd to
collect RAM through the /dev/mem device
• Direct access to memory os now blocked for
security reasons
• Use LiME – Linux Memory Extractor (link Ch 7c)
Loadable Kernel Modules
• LiME is an LKM
• Must be compiled for the exact kernel version
running on the target system
• No ability to include checksums of the output
• You must do that yourself
Collection from BSD-Based
Kernels
• Use dc3dd or dcfldd to capture contents of 

/dev/mem
• They are like dd but also include checksums
• In recent versions, there's no End Of File mark
in /dev/mem, so you must manually specify how
many bytes to capture
Collection from Apple OS X
• Memoryze for Mac (link Ch 7d)
• Mac Memory Reader seems to be gone
Individual Process Dump
• "gcore" (part of gdb, the GNU debugger)
Live Data Collection on
Microsoft Windows Systems
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection

More Related Content

What's hot

CNIT 152: 4 Starting the Investigation & 5 Leads
CNIT 152: 4 Starting the Investigation & 5 LeadsCNIT 152: 4 Starting the Investigation & 5 Leads
CNIT 152: 4 Starting the Investigation & 5 LeadsSam Bowne
 
CNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis MethodologyCNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis MethodologySam Bowne
 
CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence Sam Bowne
 
CNIT 121: Computer Forensics Ch 1
CNIT 121: Computer Forensics Ch 1CNIT 121: Computer Forensics Ch 1
CNIT 121: Computer Forensics Ch 1Sam Bowne
 
CNIT 152 12. Investigating Windows Systems (Part 3)
CNIT 152 12. Investigating Windows Systems (Part 3)CNIT 152 12. Investigating Windows Systems (Part 3)
CNIT 152 12. Investigating Windows Systems (Part 3)Sam Bowne
 
CNIT 152: 9 Network Evidence
CNIT 152: 9 Network EvidenceCNIT 152: 9 Network Evidence
CNIT 152: 9 Network EvidenceSam Bowne
 
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...Sam Bowne
 
CNIT 152 10 Enterprise Service
CNIT 152 10 Enterprise ServiceCNIT 152 10 Enterprise Service
CNIT 152 10 Enterprise ServiceSam Bowne
 
CNIT 121: 12 Investigating Windows Systems (Part 3)
CNIT 121: 12 Investigating Windows Systems (Part 3)CNIT 121: 12 Investigating Windows Systems (Part 3)
CNIT 121: 12 Investigating Windows Systems (Part 3)Sam Bowne
 
CNIT 152: 3 Pre-Incident Preparation
CNIT 152: 3 Pre-Incident PreparationCNIT 152: 3 Pre-Incident Preparation
CNIT 152: 3 Pre-Incident PreparationSam Bowne
 
CNIT 152: 6. Scope & 7. Live Data Collection
CNIT 152: 6. Scope & 7. Live Data CollectionCNIT 152: 6. Scope & 7. Live Data Collection
CNIT 152: 6. Scope & 7. Live Data CollectionSam Bowne
 
CNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating ApplicationsCNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating ApplicationsSam Bowne
 
CNIT 121: 13 Investigating Mac OS X Systems
CNIT 121: 13 Investigating Mac OS X SystemsCNIT 121: 13 Investigating Mac OS X Systems
CNIT 121: 13 Investigating Mac OS X SystemsSam Bowne
 
CNIT 152: 6 Scoping & 7 Live Data Collection
CNIT 152: 6 Scoping & 7 Live Data CollectionCNIT 152: 6 Scoping & 7 Live Data Collection
CNIT 152: 6 Scoping & 7 Live Data CollectionSam Bowne
 
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)Sam Bowne
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationSam Bowne
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security EngineeringSam Bowne
 
CNIT 152: 12b Windows Registry
CNIT 152: 12b Windows RegistryCNIT 152: 12b Windows Registry
CNIT 152: 12b Windows RegistrySam Bowne
 
CNIT 152 11 Analysis Methodology
CNIT 152 11 Analysis MethodologyCNIT 152 11 Analysis Methodology
CNIT 152 11 Analysis MethodologySam Bowne
 
CNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise ServicesCNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise ServicesSam Bowne
 

What's hot (20)

CNIT 152: 4 Starting the Investigation & 5 Leads
CNIT 152: 4 Starting the Investigation & 5 LeadsCNIT 152: 4 Starting the Investigation & 5 Leads
CNIT 152: 4 Starting the Investigation & 5 Leads
 
CNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis MethodologyCNIT 121: 11 Analysis Methodology
CNIT 121: 11 Analysis Methodology
 
CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence
 
CNIT 121: Computer Forensics Ch 1
CNIT 121: Computer Forensics Ch 1CNIT 121: Computer Forensics Ch 1
CNIT 121: Computer Forensics Ch 1
 
CNIT 152 12. Investigating Windows Systems (Part 3)
CNIT 152 12. Investigating Windows Systems (Part 3)CNIT 152 12. Investigating Windows Systems (Part 3)
CNIT 152 12. Investigating Windows Systems (Part 3)
 
CNIT 152: 9 Network Evidence
CNIT 152: 9 Network EvidenceCNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence
 
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
 
CNIT 152 10 Enterprise Service
CNIT 152 10 Enterprise ServiceCNIT 152 10 Enterprise Service
CNIT 152 10 Enterprise Service
 
CNIT 121: 12 Investigating Windows Systems (Part 3)
CNIT 121: 12 Investigating Windows Systems (Part 3)CNIT 121: 12 Investigating Windows Systems (Part 3)
CNIT 121: 12 Investigating Windows Systems (Part 3)
 
CNIT 152: 3 Pre-Incident Preparation
CNIT 152: 3 Pre-Incident PreparationCNIT 152: 3 Pre-Incident Preparation
CNIT 152: 3 Pre-Incident Preparation
 
CNIT 152: 6. Scope & 7. Live Data Collection
CNIT 152: 6. Scope & 7. Live Data CollectionCNIT 152: 6. Scope & 7. Live Data Collection
CNIT 152: 6. Scope & 7. Live Data Collection
 
CNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating ApplicationsCNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating Applications
 
CNIT 121: 13 Investigating Mac OS X Systems
CNIT 121: 13 Investigating Mac OS X SystemsCNIT 121: 13 Investigating Mac OS X Systems
CNIT 121: 13 Investigating Mac OS X Systems
 
CNIT 152: 6 Scoping & 7 Live Data Collection
CNIT 152: 6 Scoping & 7 Live Data CollectionCNIT 152: 6 Scoping & 7 Live Data Collection
CNIT 152: 6 Scoping & 7 Live Data Collection
 
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
CNIT 152: 12b Windows Registry
CNIT 152: 12b Windows RegistryCNIT 152: 12b Windows Registry
CNIT 152: 12b Windows Registry
 
CNIT 152 11 Analysis Methodology
CNIT 152 11 Analysis MethodologyCNIT 152 11 Analysis Methodology
CNIT 152 11 Analysis Methodology
 
CNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise ServicesCNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise Services
 

Viewers also liked

CNIT 129S: Ch 5: Bypassing Client-Side Controls
CNIT 129S: Ch 5: Bypassing Client-Side ControlsCNIT 129S: Ch 5: Bypassing Client-Side Controls
CNIT 129S: Ch 5: Bypassing Client-Side ControlsSam Bowne
 
CNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyondCNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyondSam Bowne
 
CNIT 129S: 8: Attacking Access Controls
CNIT 129S: 8: Attacking Access ControlsCNIT 129S: 8: Attacking Access Controls
CNIT 129S: 8: Attacking Access ControlsSam Bowne
 
CNIT 129S: Ch 4: Mapping the Application
CNIT 129S: Ch 4: Mapping the ApplicationCNIT 129S: Ch 4: Mapping the Application
CNIT 129S: Ch 4: Mapping the ApplicationSam Bowne
 
CNIT 129S: Ch 3: Web Application Technologies
CNIT 129S: Ch 3: Web Application TechnologiesCNIT 129S: Ch 3: Web Application Technologies
CNIT 129S: Ch 3: Web Application TechnologiesSam Bowne
 
CNIT 129S: Securing Web Applications Ch 1-2
CNIT 129S: Securing Web Applications Ch 1-2CNIT 129S: Securing Web Applications Ch 1-2
CNIT 129S: Securing Web Applications Ch 1-2Sam Bowne
 
CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)
CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)
CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)Sam Bowne
 
CNIT 129S: Ch 6: Attacking Authentication
CNIT 129S: Ch 6: Attacking AuthenticationCNIT 129S: Ch 6: Attacking Authentication
CNIT 129S: Ch 6: Attacking AuthenticationSam Bowne
 
CNIT 129S: 13: Attacking Users: Other Techniques (Part 1 of 2)
CNIT 129S: 13: Attacking Users: Other Techniques (Part 1 of 2)CNIT 129S: 13: Attacking Users: Other Techniques (Part 1 of 2)
CNIT 129S: 13: Attacking Users: Other Techniques (Part 1 of 2)Sam Bowne
 
CNIT 128 Ch 4: Android
CNIT 128 Ch 4: AndroidCNIT 128 Ch 4: Android
CNIT 128 Ch 4: AndroidSam Bowne
 
CNIT 40: 3: DNS vulnerabilities
CNIT 40: 3: DNS vulnerabilitiesCNIT 40: 3: DNS vulnerabilities
CNIT 40: 3: DNS vulnerabilitiesSam Bowne
 
CNIT 129S: 11: Attacking Application Logic
CNIT 129S: 11: Attacking Application LogicCNIT 129S: 11: Attacking Application Logic
CNIT 129S: 11: Attacking Application LogicSam Bowne
 
Is Your Mobile App Secure?
Is Your Mobile App Secure?Is Your Mobile App Secure?
Is Your Mobile App Secure?Sam Bowne
 
CNIT 129S: Ch 7: Attacking Session Management
CNIT 129S: Ch 7: Attacking Session Management CNIT 129S: Ch 7: Attacking Session Management
CNIT 129S: Ch 7: Attacking Session Management Sam Bowne
 
CNIT 127 Ch Ch 1: Before you Begin
CNIT 127 Ch Ch 1: Before you BeginCNIT 127 Ch Ch 1: Before you Begin
CNIT 127 Ch Ch 1: Before you BeginSam Bowne
 
CNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOSCNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOSSam Bowne
 
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
Practical Malware Analysis Ch 14: Malware-Focused Network SignaturesPractical Malware Analysis Ch 14: Malware-Focused Network Signatures
Practical Malware Analysis Ch 14: Malware-Focused Network SignaturesSam Bowne
 
CNIT 127 Ch 5: Introduction to heap overflows
CNIT 127 Ch 5: Introduction to heap overflowsCNIT 127 Ch 5: Introduction to heap overflows
CNIT 127 Ch 5: Introduction to heap overflowsSam Bowne
 
CNIT 40: 4: Monitoring and detecting security breaches
CNIT 40: 4: Monitoring and detecting security breachesCNIT 40: 4: Monitoring and detecting security breaches
CNIT 40: 4: Monitoring and detecting security breachesSam Bowne
 
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)Sam Bowne
 

Viewers also liked (20)

CNIT 129S: Ch 5: Bypassing Client-Side Controls
CNIT 129S: Ch 5: Bypassing Client-Side ControlsCNIT 129S: Ch 5: Bypassing Client-Side Controls
CNIT 129S: Ch 5: Bypassing Client-Side Controls
 
CNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyondCNIT 40: 6: DNSSEC and beyond
CNIT 40: 6: DNSSEC and beyond
 
CNIT 129S: 8: Attacking Access Controls
CNIT 129S: 8: Attacking Access ControlsCNIT 129S: 8: Attacking Access Controls
CNIT 129S: 8: Attacking Access Controls
 
CNIT 129S: Ch 4: Mapping the Application
CNIT 129S: Ch 4: Mapping the ApplicationCNIT 129S: Ch 4: Mapping the Application
CNIT 129S: Ch 4: Mapping the Application
 
CNIT 129S: Ch 3: Web Application Technologies
CNIT 129S: Ch 3: Web Application TechnologiesCNIT 129S: Ch 3: Web Application Technologies
CNIT 129S: Ch 3: Web Application Technologies
 
CNIT 129S: Securing Web Applications Ch 1-2
CNIT 129S: Securing Web Applications Ch 1-2CNIT 129S: Securing Web Applications Ch 1-2
CNIT 129S: Securing Web Applications Ch 1-2
 
CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)
CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)
CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)
 
CNIT 129S: Ch 6: Attacking Authentication
CNIT 129S: Ch 6: Attacking AuthenticationCNIT 129S: Ch 6: Attacking Authentication
CNIT 129S: Ch 6: Attacking Authentication
 
CNIT 129S: 13: Attacking Users: Other Techniques (Part 1 of 2)
CNIT 129S: 13: Attacking Users: Other Techniques (Part 1 of 2)CNIT 129S: 13: Attacking Users: Other Techniques (Part 1 of 2)
CNIT 129S: 13: Attacking Users: Other Techniques (Part 1 of 2)
 
CNIT 128 Ch 4: Android
CNIT 128 Ch 4: AndroidCNIT 128 Ch 4: Android
CNIT 128 Ch 4: Android
 
CNIT 40: 3: DNS vulnerabilities
CNIT 40: 3: DNS vulnerabilitiesCNIT 40: 3: DNS vulnerabilities
CNIT 40: 3: DNS vulnerabilities
 
CNIT 129S: 11: Attacking Application Logic
CNIT 129S: 11: Attacking Application LogicCNIT 129S: 11: Attacking Application Logic
CNIT 129S: 11: Attacking Application Logic
 
Is Your Mobile App Secure?
Is Your Mobile App Secure?Is Your Mobile App Secure?
Is Your Mobile App Secure?
 
CNIT 129S: Ch 7: Attacking Session Management
CNIT 129S: Ch 7: Attacking Session Management CNIT 129S: Ch 7: Attacking Session Management
CNIT 129S: Ch 7: Attacking Session Management
 
CNIT 127 Ch Ch 1: Before you Begin
CNIT 127 Ch Ch 1: Before you BeginCNIT 127 Ch Ch 1: Before you Begin
CNIT 127 Ch Ch 1: Before you Begin
 
CNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOSCNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOS
 
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
Practical Malware Analysis Ch 14: Malware-Focused Network SignaturesPractical Malware Analysis Ch 14: Malware-Focused Network Signatures
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
 
CNIT 127 Ch 5: Introduction to heap overflows
CNIT 127 Ch 5: Introduction to heap overflowsCNIT 127 Ch 5: Introduction to heap overflows
CNIT 127 Ch 5: Introduction to heap overflows
 
CNIT 40: 4: Monitoring and detecting security breaches
CNIT 40: 4: Monitoring and detecting security breachesCNIT 40: 4: Monitoring and detecting security breaches
CNIT 40: 4: Monitoring and detecting security breaches
 
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
 

Similar to CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection

6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data CollectionSam Bowne
 
Incident Response Fails
Incident Response FailsIncident Response Fails
Incident Response FailsMichael Gough
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis MethodologySam Bowne
 
4 Getting Started & 5 Leads
4 Getting Started & 5 Leads4 Getting Started & 5 Leads
4 Getting Started & 5 LeadsSam Bowne
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas IndonesiaIGN MANTRA
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handlingnewbie2019
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its roleSudeshna Basak
 
CNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring RationaleCNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring RationaleSam Bowne
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenesprimeteacher32
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraIGN MANTRA
 
RuSIEM overview (english version)
RuSIEM overview (english version)RuSIEM overview (english version)
RuSIEM overview (english version)Olesya Shelestova
 
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...Health IT Conference – iHT2
 
TTPs for Threat hunting In Oil Refineries
TTPs for Threat hunting In Oil RefineriesTTPs for Threat hunting In Oil Refineries
TTPs for Threat hunting In Oil RefineriesDragos, Inc.
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx9905234521
 
CNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsCNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsSam Bowne
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)Aj Maurya
 

Similar to CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection (20)

6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
 
Incident Response Fails
Incident Response FailsIncident Response Fails
Incident Response Fails
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
 
4 Getting Started & 5 Leads
4 Getting Started & 5 Leads4 Getting Started & 5 Leads
4 Getting Started & 5 Leads
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its role
 
CNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring RationaleCNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring Rationale
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
 
RuSIEM overview (english version)
RuSIEM overview (english version)RuSIEM overview (english version)
RuSIEM overview (english version)
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
 
TTPs for Threat hunting In Oil Refineries
TTPs for Threat hunting In Oil RefineriesTTPs for Threat hunting In Oil Refineries
TTPs for Threat hunting In Oil Refineries
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx
 
CF.ppt
CF.pptCF.ppt
CF.ppt
 
CNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsCNIT 50: 9. NSM Operations
CNIT 50: 9. NSM Operations
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
cyber Forensics
cyber Forensicscyber Forensics
cyber Forensics
 

More from Sam Bowne

3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities Sam Bowne
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development SecuritySam Bowne
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the ApplicationSam Bowne
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)Sam Bowne
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic CurvesSam Bowne
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-HellmanSam Bowne
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1Sam Bowne
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android ApplicationsSam Bowne
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)Sam Bowne
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3Sam Bowne
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard ProblemsSam Bowne
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)Sam Bowne
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated EncryptionSam Bowne
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)Sam Bowne
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)Sam Bowne
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream CiphersSam Bowne
 
4. Block Ciphers
4. Block Ciphers 4. Block Ciphers
4. Block Ciphers Sam Bowne
 
6 Analyzing Android Applications (Part 2)
6 Analyzing Android Applications (Part 2)6 Analyzing Android Applications (Part 2)
6 Analyzing Android Applications (Part 2)Sam Bowne
 

More from Sam Bowne (20)

Cyberwar
CyberwarCyberwar
Cyberwar
 
3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
 
10 RSA
10 RSA10 RSA
10 RSA
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard Problems
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
 
4. Block Ciphers
4. Block Ciphers 4. Block Ciphers
4. Block Ciphers
 
6 Analyzing Android Applications (Part 2)
6 Analyzing Android Applications (Part 2)6 Analyzing Android Applications (Part 2)
6 Analyzing Android Applications (Part 2)
 

Recently uploaded

ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...Nguyen Thanh Tu Collection
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptxAneriPatwari
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Celine George
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...HetalPathak10
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroomSamsung Business USA
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Osopher
 

Recently uploaded (20)

ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
Spearman's correlation,Formula,Advantages,
Spearman's correlation,Formula,Advantages,Spearman's correlation,Formula,Advantages,
Spearman's correlation,Formula,Advantages,
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptx
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
 

CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection

  • 2. Scope • What did the attacker do? • Initial detection is usually only part of the story
  • 3. Examining Initial Data • Look at original alert • You may notice more than the person who reported it did • Ask about other detection systems and review what they recorded • Network administrators may not think like investigators • Gather context for the detection event
  • 4. Preliminary Evidence • Determine what sources of preliminary evidence may help • Decide which sources you will actually use • Collect and review the evidence • Identify sources that are easy to analyze, and that quickly provide initial answers
  • 6. Indpendent Sources • Firewall logs don't depend on registry keys, etc. • Multiple independent exvidence sources lead to more reliable conclusions • It's difficult for an attacker to remove or modify evidence from all sources • Less likely that a routine process would overwrite or discard all evidence • Cross-check information, like date and time
  • 7. Review • Attacker may be causing more damage • Test a detection method on one system, or a small date range of log entries • Make sure your detection method is fast and effective
  • 9. Data Loss Scenario • Large online retailer • You work in IT security department • Customers are complaining about spam after becoming a new customer
  • 10. Finding Something Concrete • Anecdotal customer complaints are inconclusive • Options • Work with customers and review their email • Relability and privacy problems • Create fake customer accounts with unique email addresses
  • 11. Fake Accounts • Use 64-character random usernames • Unlikely that spammers would guess the usernames • Monitor those accounts
  • 12. Preliminary Evidence • Assuming customer data is being lost somehow: • Find where customer data is and how it is managed • One internal database on production server • One external database at a third-party marketing firm
  • 15. Theories & Simple Tests • Insider • No easy way to test • Modified code on website to capture email addresses • Enter some fake accounts directly into database, bypassing the web form • Someone copying backup tapes • Add some fake accounts to the backups
  • 16. Two Weeks Later • Spam comes to the first set of fake accounts • And to the accounts manually entered into the database • Suggests the website is not part of the problem • No spam from the accounts on the backup tape • Backups aren't the source of data loss
  • 17. New Theories • Direct access to the database • Malware on the database server • Accessing it over the network
  • 18. Monitoring Queries • Network-level packet captures • Expensive, powerful system required • If queries are encrypted, or malware is obfuscating them, it may be hard to decode the traffic • Database-level query monitoring and logging • Most efficient and reliable technique
  • 19. Next Steps • Create a few more fake accounts • Talk to database and application administrators • To find out where data is stored • Scan through logs to see what is "normal" • No queries or stored procedures perform a bulk export of email addresses on a daily basis
  • 20. Two Weeks Later • New accounts get spam • Retrieve query logs from time accounts created to spam time • For the field "custemail" • A single query is found • SELECT custemail FROM custprofile WHERE signupdate >= "2014-02-16"
  • 21. Query Details • Feb 17, 2014 at 11:42 am GMT • Originated from IP in graphics arts dept. • Query used an database administrator's username from the IT dept. • Interview reveals that graphics arts dept. has no direct interaction with customers, only outside vendors
  • 22. Leads
  • 25. Results from Workstation • Examine images, focusing on actions at the time of the query • Malware found on workstation • Persistent, provides remote shell, remote graphical interface, ability to launch and terminate processes • Connects to a foreign IP • Has been installed for two years • Cannot determine how system was originally compromised
  • 26. Final Steps of Investigation
  • 27. Scoping Gone Wrong • After complaints from customers • Search every computer in the company for unique strings in the customer data, • And files large enough to include all the customer records
  • 28. Problems • No evidence that the stolen data is stored on company servers • No evidence that the data is all being stolen at once in a large file • And even so, it would probably be compressed • Large amount of effort; low chance of success
  • 29. Another Unwise Path • Focus on insiders • Who had access and knowledge to steal the customer data • Compile profiles of numerous employees • Review personnel files • Background checks, surveillance softare capturing keystrokes and screen images • Video surveillance installed
  • 30. Problems • Leads to a "witch hunt" • Invades privacy of employees • Large effort, small chance of success
  • 31. Another Unwise Path • Because the data resides on the database server • Image and analyze RAM from the database server to hunt for malware • Because the hard drives are massive and too large to investigate easily
  • 32. Problems • Once again, they have jumped to a conclusion • And ignored other possibilities • Large effort, low chance of success
  • 33. Scenario 2: Automated Clearing House Fraud • Bank called the CEO--they blocked an ACH transfer of $183,642.73 • To an account that was never used before • Flagged by their fraud prevention system • Transfer from CFO's account, but he says he never authorized it
  • 35. Preliminary Evidence • Firewall • Two weeks of logs • Examine this first • CFO's laptop computer • Live resonse, RAM, hard drive • But maybe other computers are involved
  • 36. Firewall Logs • Look near the time the unauthorized transfer occurred (4:37 pm) • See who logged in prior to that • Two computers logged in via HTTPS, making a number of connections between 4:10 pm and 4:48 pm • From two IPs -- one is CFO's, other not immediately recognized
  • 37. Two Immediate Tasks • Gather complete forensic evidence from CFO's computer • Live response, RAM, and hard disk • Because evidence is being lost as time passes • Track down the other IP address and decide what action is appropriate
  • 38. DHCP Logs • Search for the time in question • Get MAC address from DHCP logs • It's the MAC of the CFO's laptop!
  • 40. Recap
  • 42. Open Office Space • CFO's office is in clear view of other workers • It's unlikely that someone could go into it unobserved
  • 43. CFO's Computer • Recently installed persistent executable • Send it to a third-party analysis site • It's a variant of the Zeus banking malware
  • 44. Final Steps of Investigation
  • 45. Scoping Gone Wrong • There are no recent antivirus or IDS alerts • So you believe the security issue must be at the bank • Tell the bank to find the attacker and put them in jail
  • 46. Problems • No attempt to validate the bank's original data • Company assumes that existing network security measures would detect a problem, if there was one • Assumption that a third-party can help you • While you wait, data on company systems is lost
  • 47. Another Unwise Path • CEO believes that security measures are in place to prevent malware, so the CFO must have initiated the transfer • The CEO wants you to investigate the CFO and avoid tipping him (or her) off
  • 48. Problem • No security measures are perfect, not even two- factor authentication • Also, that sort of investigation is outside your expertise, and should be referred to an outside contractor
  • 50. Purpose of Live Collection • Preserve volatile evidence that will further the investigation • Also collect log files and file listings • Get answers quickly • Minimize changes to the system • Avoid disrupting business, causing crashes, or destroying evidence
  • 51. When to Perform Live Response
  • 52. Risks of Live Response
  • 53. Altering the Evidence • All live response changes the system • Purists don't like it • But the alternative is to lose all volatile data and get only a disk image • You can minimize changes, but not eliminate them
  • 54. Selecting a Live Response Tool • Homegrown Microsoft DOS batch script (or bash) • Perl-based script • There are specialized live-response products, free and commercial
  • 55. Factors to Consider • Is the tool generally accepted in the forensic community? • Does the solution address the common operating systems in your environment? • Tools that use OS commands should contain known good copies of those commands, not trust the local commands on the suspect system
  • 56. Factors to Consider • Does the solution collect data that is important to have, in your environment? • How long does a collection take? • Recommended: less than an hour per system • Is the system configurable? • Is the output easily reviewed and understood?
  • 57. What to Collect • Current running state of the system • Network connections • Running Processes • What happened in the past • File listings, system logs • Usually a higher priority
  • 58. The Deep End • Some oranizations always collect entire RAM contents, or hard disk images • Don't collect data that you can't effectively use or understand • Collect data you can really use to quickly determine the impact of the incident
  • 61. Complete RAM Capture • Requires specialized tools to collect and interpret • Not part of Live Response • Sometimes needed on carefully chosen systems
  • 62. Collection Best Practices • Practice on a test system first • Learn how fast the process is, and how large the output is • Practice handling problems • Broken USB port or NIC • Locked screen
  • 63. Caution: Malware • The system you are examining may be infected with malware • Any media you connect may become infected • Any credentials you use may be compromised
  • 67. Horror Stories: IR Procedures • Copy live response toolkit to affected systems, save collected data back to that same system including full RAM dump, several gigabytes in size • Remotely log in with domain administrator account, run netstat & Task Manager • Pull out the plug, image the hard drive
  • 68. Good Methods of Live Response • Network share on a dedicated file server • Not part of any domain • Used throwaway credentials not used for any other purpose • Two folders • Read-only containing the live response toolkit • Writeable for output from live response toolkit
  • 70. Live Response Tips • Air-gap for evidence server • Logging and auditing access to evidence server • Automate process for consistency • Live Response software must run as Local Administrator/root
  • 71. Media • Some computers cannot connect external media • Hardware failure, configuration, etc. • Common options for running toolkit • CD-ROM, DVD, network share • Encrypted network streaming tool like cryptcat or stunnel to send output to another system
  • 72. Unexpected OS • Cannot run your normal live response toolkit • If you can't update or modify your toolkit to run • Perform manual live response
  • 73. Unexpected OS • Create a checklist of the automated steps in the toolkit for a similar OS • Research command-line options • Test them on a known clean system, if possible • Manually perform steps to collect evidence
  • 74. Automation • Decreases human error • Makes processes more consistent and faster • Helps to prevent bad guys from gathering intelligence about how you respond to incidents • Anything you do on the evidence system may be sent to the bad guys
  • 75. Live Data Collection on Microsoft Windows Systems
  • 76. Three Main Options • Use a prebuilt kit (Mandiant Redline) • Create your own • Use a hybrid of the two
  • 77. Mandiant Redline • Install the Redline MSI package on a trusted workstation • Create the Redline collector on the trusted system • The only step you take on a suspect system is to run the stand-alone Redline collector batch script • Automatically saves data to the same location you ran the script from
  • 78. Do It Yourself • Make your own live response toolkit • Decide what OS to support • Windows has many versions, and big differences between 32-bit and 64-bit • Find tools that collect the information you want
  • 79. Windows Built-in Tools • Copy these files from a clean Windows system • Also copy cmd.exe • "Trusted binaries" • Don't trust files on the evidence machine
  • 80. Free Tools • Use command-line versions, not GUI versions • Easier to script • Less impact • Rename every tool so you can identify it as something you added to the system • Prepend "t_"
  • 81. Other Data Items • Prefetch information • System restore point information • Browser history, and more • Balance your needs with the impact the collection has on the system
  • 82. Scripting Language • Choose one • MS-DOS Batch (lowest impact) • VBScript • Perl • Python
  • 83. Scripting Tips • Add logging and compute a checksum of collected data • Be careful with file and directory names • They may be long or include spaces • Test your script extensively • Built a test environment that resembles your production systems • Watch for errors and unexpected results
  • 84. Memory Collection • Tools for a full memory dump • AccessData FTK Imager Lite • Mandiant Memoryze • Monsools Windows Memory Toolkit
  • 87. Individual Process RAM Dump • Tools • Mandiant Memoryze • Microsoft userdump • Microsoft procdump • Ntsecurity.nu pmdump
  • 89. Live Data Collection on Unix-Based Systems
  • 90. LINReS • From Network Intelligence India • Written for RedHat 3 and 4, not updated since 2006 • Useful mainly as an example to guide you in making a custom tool
  • 91. Do It Yourself • Really the only option • Make some scripts • Mandiant uses Bourne shell scripts that make scripts for various Unix/Linux versions • Requires constant maintenance
  • 92. Language Choices • Perl • Python • Bourne shell • BASH (Mandiant uses this) • others
  • 93. Apple Systems • system_profiler • Very long list of software, hardware, logs, etc.
  • 99. Memory Collection • The memory device is handled differently in every version of Unix, BSD, and Linux • In earlier versions, you could just use dd to collect RAM through the /dev/mem device • Direct access to memory os now blocked for security reasons • Use LiME – Linux Memory Extractor (link Ch 7c)
  • 100. Loadable Kernel Modules • LiME is an LKM • Must be compiled for the exact kernel version running on the target system • No ability to include checksums of the output • You must do that yourself
  • 101. Collection from BSD-Based Kernels • Use dc3dd or dcfldd to capture contents of 
 /dev/mem • They are like dd but also include checksums • In recent versions, there's no End Of File mark in /dev/mem, so you must manually specify how many bytes to capture
  • 102. Collection from Apple OS X • Memoryze for Mac (link Ch 7d) • Mac Memory Reader seems to be gone
  • 103. Individual Process Dump • "gcore" (part of gdb, the GNU debugger)
  • 104.
  • 105. Live Data Collection on Microsoft Windows Systems