INTRODUCTION TO CYBER FORENSICS

{elysiumsecurity}
INTRODUCTION TO CYBER FORENSICS
Version: 1.3a
Date: 04/07/2018
Author: Sylvain Martinez
Reference: ESC6-MUSCL
Classification: Public
cyber protection & response
{elysiumsecurity}
cyber protection & response
2
CASE STUDYFRAMEWORKPRINCIPLESCONTEXT
• Core Principles; • Client Database Leak
Investigation.
CONTENTS
Public
• Definitions
• Cyber Attacks and
M alware trends;
• GDPR Requirem ents;
• Overview;
• Goals;
• Actions;
• Activity Scope;
{elysiumsecurity}
cyber protection & response
3
CASE STUDYFRAMEWORKPRINCIPLESCONTEXT
DEFINITIONS
Public
FOREENSIC SCIENCE
THE APPLICATION OF SCIENCE TO CRIMINAL AND CIVIL LAWS, DURING CRIMINAL
INVESTIGATION, AS GOVERNED BY THE LEGAL STANDARDS OF ADMISSIBLE
EVIDENCE AND CRIMINAL PROCEDURE.
Definitions from Wikipedia
DIGITAL FORENSICS
A BRANCH OF FORENSIC SCIENCE ENCOMPASSING THE RECOVERY AND
INVESTIGATION OF MATERIAL FOUND IN DIGITAL DEVICES, OFTEN IN RELATION
TO COMPUTER CRIME
CYBER/COMPUTER FORENSICS
A BRANCH OF DIGITAL FORENSIC SCIENCE, THE APPLICATION OF INVESTIGATION
AND ANALYSIS TECHNIQUES TO GATHER AND PRESERVE EVIDENCE FROM A
PARTICULAR COMPUTING DEVICE IN A WAY THAT IS SUITABLE FOR PRESENTATION
IN A COURT OF LAW
{elysiumsecurity}
cyber protection & response
4
CASE STUDYFRAMEWORKPRINCIPLESCONTEXT
CYBER ATTACKS AND MALWARE TRENDS
Public Source: AV-TEST
{elysiumsecurity}
cyber protection & response
5
CASE STUDYFRAMEWORKPRINCIPLESCONTEXT
GDPR REQUIREMENTS
Public
ARTICLE 33
72H REPORTING
NATURE OF THE BREACH?
(WHO? WHERE? HOW?)
POTENTIAL IMPACT?
WHAT HAS BEEN DONE TO PREVENT THE BREACH?
(CONTROLS? PROCESSES?)
Icons from the Noun Project unless specified otherwise
{elysiumsecurity}
cyber protection & response
6
CASE STUDYFRAMEWORKPRINCIPLESCONTEXT
CORE PRINCIPLES
Public
PRESERVATION OF INTEGRITY
CHAIN OF CUSTODY
ONLINE/OFFLINE ?
NEVER FORGET THE « S »!!
ACTIVITY GOALS
{elysiumsecurity}
cyber protection & response
7
CASE STUDYFRAMEWORKPRINCIPLESCONTEXT
OVERVIEW
Public
CONTEXT LOGS FILESYSTEM CONFIG NETWORK MEMORY ADVANCED
ACTIVITY
SCOPE
ACQUISITION ANALYSIS REPORTINGACTIONS
GOALS
IDENTIFICATION
Impact/Target/Technique
ATTRIBUTION
Source of Attack
COLLECTION
Evidence of compromise
Copyright ELYSIUMSECURITY LTD, please refer to us if reusing this diagram: https://www.elysiumsecurity.com
{elysiumsecurity}
cyber protection & response
8
CASE STUDYFRAMEWORKPRINCIPLESCONTEXT
GOALS
Public
IDENTIFICATION
Impact/Target/Technique
ATTRIBUTION
Source of Attack
COLLECTION
Evidence of compromise
WHAT?
WAS COMPROMISED?
WAS STOLEN/MODIFIED?
WHERE?
THE CONTROLS FAILED?
THE DATA WENT?
HOW?
THEY HACKED?
WAS IT STOPPED?
WHY?
THEY TARGETED YOU?
WAS IT SUCCESSFUL?
WHO?
WAS TARGETED?
WAS RESPONSIBLE?
{elysiumsecurity}
cyber protection & response
9
CASE STUDYFRAMEWORKPRINCIPLESCONTEXT
ACTIONS
Public
ACQUISITION
REPORTING
ANALYSIS
IDENTIFICATION OF EVIDENCE
PRESERVATION OF EVIDENCE
COLLECTION OF EVIDENCE
ANALYSIS OF EVIDENCE
DOCUMENTATION OF EVIDENCE
PRESENTATION OF EVIDENCE
{elysiumsecurity}
cyber protection & response
10
CASE STUDYFRAMEWORKPRINCIPLESCONTEXT
ACTIVITY - CONTEXT
Public
CONTEXT
TIMELINE
LOCATION
MEDIUM
INDIVIDUALS
ACTIVITIES
READ-ONLY
COPY OF
EVIDENCE
!
INTERVIEWS
{elysiumsecurity}
cyber protection & response
11
CASE STUDYFRAMEWORKPRINCIPLESCONTEXT
ACTIVITY - LOG
Public
LOGS
ENDPOINTS
SERVERS
NETWORK DEVICES
CLOUD SERVICES
EVENT VIEWER, WEBTOOLS
START WITH
TIMELINE RANGE
READ-ONLY
COPY OF
EVIDENCE
!
{elysiumsecurity}
cyber protection & response
12
CASE STUDYFRAMEWORKPRINCIPLESCONTEXT
ACTIVITY - FILESYSTEM
Public
FILESYSTEM
SUPER TIMELINE
FILE/APP/KEYWORD SEARCH
PLACES OF INTEREST
VIRUS SCANS
LOG2TIMELINE, TSK
HUGE
AMOUNT
OF DATA
READ-ONLY
COPY OF
EVIDENCE
!
{elysiumsecurity}
cyber protection & response
13
CASE STUDYFRAMEWORKPRINCIPLESCONTEXT
ACTIVITY - CONFIG
Public
CONFIG
REGISTRY KEY HIVE
SYSTEM FILES
APPLICATION CONFIGURATION
RECENT CHANGES/INSTALLATIONS
REGEDIT/HIJACKTHIS/GREP
READ-ONLY
COPY OF
EVIDENCE
!
{elysiumsecurity}
cyber protection & response
14
CASE STUDYFRAMEWORKPRINCIPLESCONTEXT
ACTIVITY - NETWORK
Public
NETWORK
SOURCE / DESTINATION ACTIVITIES
PROTOCOL USED
TRAFFIC CONTENT ANALYSIS
IDS ANALYSIS
WIRESHARK / TCPDUMP
READ-ONLY
COPY OF
EVIDENCE
!
{elysiumsecurity}
cyber protection & response
15
CASE STUDYFRAMEWORKPRINCIPLESCONTEXT
ACTIVITY - MEMORY
Public
MEMORY
DUMP MEMORY / PAGE FILES
RUNNING PROCESSES
BINARY INSPECTION
HIDDEN DATA
VOLATILITY / REKAL
READ-ONLY
COPY OF
EVIDENCE
!
{elysiumsecurity}
cyber protection & response
16
CASE STUDYFRAMEWORKPRINCIPLESCONTEXT
ACTIVITY - ADVANCED
Public
ADVANCED
USER ACTIVITY SIMULATION
MALWARE REVERSE ENGINEERING
MALWARE SANDBOXING
HONEYPOTS
HACKER COMMUNICATION
DANGEROUS!READ-ONLY
COPY OF
EVIDENCE
!
{elysiumsecurity}
cyber protection & response
17
CASE STUDYFRAMEWORKPRINCIPLESCONTEXT
CLIENT DATABASE LEAK INVESTIGATION
Public
CONTEXT LOG FILESYSTEM CONFIG NETWORK MEMORY ADVANCED
- EXECUTIVE ATTENDED A
CONFERENCE;
- LOGGED TO WEBMAIL;
- WARNING IGNORED;
- CLIENT DB LEAKED;
- 29/05/18 @ 09:09
- TROJAN FILES FOUND;
- HIDDEN PARTITION
IDENTIFIED;
- BAD WEB PLUGIN
DELETED;
- USB CONNECTION.
- PROCESS SENDING DATA
TO IP EVERY 5 MINUTES;
- ENDPOINT ACTING AS A
PROXY FOR INTRANET;
- IDS FLAG ALERTS.
- MALWARE SOURCE
CODE IN FRENCH;
- IP TRAIL FROM KNOWN
GROUPS;
- HACKER FOR HIRE
FROM EX EMPLOYEE.
- EMAIL LOGING FROM
SUSPICIOUS COUNTRY;
- EMAIL DELETED TO DB
SUPPORT;
- VPN ACCESS FROM
CONFERENCE.
- WEB HISTORY TO FAKE
WEBMAIL;
- FIREWALL TURNED OFF;
- AV WHITELIST OF
SUSPICIOUS DIRECTORY;
- SUSPICIOUS SERVICE.
- HIDDEN PROCESSES;
- TROJAN DETECTED IN
MEMORY;
- REMOTE CONNECTION
LIVE;
{elysiumsecurity}
cyber protection & response
© 2018 Elysium Security Ltd.
All Rights Reserved
www.elysium security.com
ElysiumSecurity provides practical expertise to identify
vulnerabilities, assess their risks and impact, remediate
those risks, prepare and respond to incidents as well as raise
security awareness through an organization.
ElysiumSecurity provides high level expertise gathered
through years of best practices experience in large
international companies allowing us to provide advice best
suited to your business operational model and priorities.
ABOUT ELYSIUMSECURITY LTD.
ElysiumSecurity provides a portfolio of Strategic and Tactical
Services to help companies protect and respond against Cyber
Security Threats. We differentiate ourselves by offering discreet,
tailored and specialized engagements.
Operating in Mauritius and in the United Kingdom,
our boutique style approach means we can easily adapt to your
business operational model and requirements to provide a
personalized service that fits your working environment.
1 of 18

Recommended

Cyber Forensics Overview by
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics OverviewYansi Keim
10.7K views43 slides
Ethical hacking by
Ethical hackingEthical hacking
Ethical hackingAlapan Banerjee
804 views39 slides
Computer forensics toolkit by
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
6.8K views32 slides
Digital forensic tools by
Digital forensic toolsDigital forensic tools
Digital forensic toolsParsons Corporation
952 views14 slides
Dark Web Forensics by
Dark Web Forensics Dark Web Forensics
Dark Web Forensics Deepak Kumar (D3)
1.1K views38 slides
Social engineering attacks by
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
5.8K views22 slides

More Related Content

What's hot

Digital Forensic by
Digital ForensicDigital Forensic
Digital ForensicCleverence Kombe
23.5K views31 slides
cyber security and forensic tools by
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
3.3K views21 slides
Mobile Forensics by
Mobile ForensicsMobile Forensics
Mobile Forensicsprimeteacher32
8.6K views14 slides
CS6004 Cyber Forensics by
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber ForensicsKathirvel Ayyaswamy
7.9K views148 slides
Forensic imaging by
Forensic imagingForensic imaging
Forensic imagingDINESH KAMBLE
1.4K views17 slides
Types of Hacker by
 Types of Hacker Types of Hacker
Types of HackerMukund Kumar Bharti
4.9K views15 slides

What's hot(20)

cyber security and forensic tools by Sonu Sunaliya
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
Sonu Sunaliya3.3K views
Threat Hunting by Splunk
Threat HuntingThreat Hunting
Threat Hunting
Splunk4.3K views
Cia security model by Imran Ahmed
Cia security modelCia security model
Cia security model
Imran Ahmed19.1K views
Digital Forensic: Brief Intro & Research Challenge by Aung Thu Rha Hein
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
Cyber forensic 1 by anilinvns
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
anilinvns2.4K views
Digital forensics Steps by gamemaker762
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
gamemaker762238 views
Cyber Security Vulnerabilities by Siemplify
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
Siemplify2.3K views
mobile forensic.pptx by Ambuj Kumar
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
Ambuj Kumar870 views
Module 2 Foot Printing by leminhvuong
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printing
leminhvuong8.2K views
Email Forensics by Gol D Roger
Email ForensicsEmail Forensics
Email Forensics
Gol D Roger4.9K views
Cyber threats landscape and defense by fantaghost
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
fantaghost4.7K views

Similar to INTRODUCTION TO CYBER FORENSICS

Zymr Cybersecurity by
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity Zymr Cloud
256 views15 slides
Cyber Security Services & Solutions - Zymr by
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrZYMR, INC.
218 views15 slides
Mobile Security Assessment by
Mobile Security AssessmentMobile Security Assessment
Mobile Security AssessmentSylvain Martinez
206 views16 slides
OFFENSIVE IDS by
OFFENSIVE IDSOFFENSIVE IDS
OFFENSIVE IDSSylvain Martinez
286 views17 slides
CONFidence2015: Real World Threat Hunting - Martin Nystrom by
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromPROIDEA
316 views52 slides
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ... by
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...James Anderson
218 views46 slides

Similar to INTRODUCTION TO CYBER FORENSICS(20)

Zymr Cybersecurity by Zymr Cloud
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity
Zymr Cloud256 views
Cyber Security Services & Solutions - Zymr by ZYMR, INC.
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - Zymr
ZYMR, INC.218 views
CONFidence2015: Real World Threat Hunting - Martin Nystrom by PROIDEA
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
PROIDEA316 views
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ... by James Anderson
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
James Anderson218 views
Exploring the Defender's Advantage by Raffael Marty
Exploring the Defender's AdvantageExploring the Defender's Advantage
Exploring the Defender's Advantage
Raffael Marty137 views
SEB Forcepoint Corporate Overview by Stephen Bates
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate Overview
Stephen Bates328 views
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks. by Scalar Decisions
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions2.4K views
Marlabs cyber threat management by Rajendra Menon
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
Rajendra Menon306 views
CV-SMB-infographic-small by Jeff Geissler
CV-SMB-infographic-smallCV-SMB-infographic-small
CV-SMB-infographic-small
Jeff Geissler115 views
Journey to the Center of Security Operations by ♟Sergej Epp
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations
♟Sergej Epp288 views
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba by Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Angeloluca Barba1.2K views
Cisco Security Architecture by Cisco Canada
Cisco Security ArchitectureCisco Security Architecture
Cisco Security Architecture
Cisco Canada15.9K views
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security by BGA Cyber Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
BGA Cyber Security2.8K views
Next Generation Firewall and IPS by Data#3 Limited
Next Generation Firewall and IPSNext Generation Firewall and IPS
Next Generation Firewall and IPS
Data#3 Limited796 views
Cybersecurity Risk from User Perspective by AvinantaTarigan
Cybersecurity Risk from User PerspectiveCybersecurity Risk from User Perspective
Cybersecurity Risk from User Perspective
AvinantaTarigan126 views

More from Sylvain Martinez

PROGRAMMING AND CYBER SECURITY by
PROGRAMMING AND CYBER SECURITYPROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITYSylvain Martinez
234 views23 slides
INTRODUCTION TO CRYPTOGRAPHY by
INTRODUCTION TO CRYPTOGRAPHYINTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHYSylvain Martinez
1.2K views21 slides
INCIDENT RESPONSE NIST IMPLEMENTATION by
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONSylvain Martinez
5.5K views27 slides
DATA LOSS PREVENTION OVERVIEW by
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWSylvain Martinez
599 views21 slides
2019 CYBER SECURITY TRENDS REPORT REVIEW by
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEWSylvain Martinez
1.8K views18 slides
INCIDENT RESPONSE CONCEPTS by
INCIDENT RESPONSE CONCEPTSINCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSSylvain Martinez
1.3K views39 slides

More from Sylvain Martinez(20)

INCIDENT RESPONSE NIST IMPLEMENTATION by Sylvain Martinez
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATION
Sylvain Martinez5.5K views
2019 CYBER SECURITY TRENDS REPORT REVIEW by Sylvain Martinez
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
Sylvain Martinez1.8K views
VIRTUAL CISO AND OTHER KEY CYBER ROLES by Sylvain Martinez
VIRTUAL CISO AND OTHER KEY CYBER ROLESVIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLES
Sylvain Martinez418 views
Talk1 esc7 muscl-dataprotection_v1_2 by Sylvain Martinez
Talk1 esc7 muscl-dataprotection_v1_2Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2
Sylvain Martinez183 views

Recently uploaded

ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...Jasper Oosterveld
19 views49 slides
6g - REPORT.pdf by
6g - REPORT.pdf6g - REPORT.pdf
6g - REPORT.pdfLiveplex
10 views23 slides
PRODUCT PRESENTATION.pptx by
PRODUCT PRESENTATION.pptxPRODUCT PRESENTATION.pptx
PRODUCT PRESENTATION.pptxangelicacueva6
15 views1 slide
Evolving the Network Automation Journey from Python to Platforms by
Evolving the Network Automation Journey from Python to PlatformsEvolving the Network Automation Journey from Python to Platforms
Evolving the Network Automation Journey from Python to PlatformsNetwork Automation Forum
13 views21 slides
Powerful Google developer tools for immediate impact! (2023-24) by
Powerful Google developer tools for immediate impact! (2023-24)Powerful Google developer tools for immediate impact! (2023-24)
Powerful Google developer tools for immediate impact! (2023-24)wesley chun
10 views38 slides
Democratising digital commerce in India-Report by
Democratising digital commerce in India-ReportDemocratising digital commerce in India-Report
Democratising digital commerce in India-ReportKapil Khandelwal (KK)
18 views161 slides

Recently uploaded(20)

ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
6g - REPORT.pdf by Liveplex
6g - REPORT.pdf6g - REPORT.pdf
6g - REPORT.pdf
Liveplex10 views
Powerful Google developer tools for immediate impact! (2023-24) by wesley chun
Powerful Google developer tools for immediate impact! (2023-24)Powerful Google developer tools for immediate impact! (2023-24)
Powerful Google developer tools for immediate impact! (2023-24)
wesley chun10 views
Future of AR - Facebook Presentation by ssuserb54b561
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
ssuserb54b56115 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker40 views
Data Integrity for Banking and Financial Services by Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely25 views
Special_edition_innovator_2023.pdf by WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2218 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc11 views
Serverless computing with Google Cloud (2023-24) by wesley chun
Serverless computing with Google Cloud (2023-24)Serverless computing with Google Cloud (2023-24)
Serverless computing with Google Cloud (2023-24)
wesley chun11 views
PharoJS - Zürich Smalltalk Group Meetup November 2023 by Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi132 views
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf by Dr. Jimmy Schwarzkopf
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf by StephenTec
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf
StephenTec12 views
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10300 views

INTRODUCTION TO CYBER FORENSICS

  • 1. {elysiumsecurity} INTRODUCTION TO CYBER FORENSICS Version: 1.3a Date: 04/07/2018 Author: Sylvain Martinez Reference: ESC6-MUSCL Classification: Public cyber protection & response
  • 2. {elysiumsecurity} cyber protection & response 2 CASE STUDYFRAMEWORKPRINCIPLESCONTEXT • Core Principles; • Client Database Leak Investigation. CONTENTS Public • Definitions • Cyber Attacks and M alware trends; • GDPR Requirem ents; • Overview; • Goals; • Actions; • Activity Scope;
  • 3. {elysiumsecurity} cyber protection & response 3 CASE STUDYFRAMEWORKPRINCIPLESCONTEXT DEFINITIONS Public FOREENSIC SCIENCE THE APPLICATION OF SCIENCE TO CRIMINAL AND CIVIL LAWS, DURING CRIMINAL INVESTIGATION, AS GOVERNED BY THE LEGAL STANDARDS OF ADMISSIBLE EVIDENCE AND CRIMINAL PROCEDURE. Definitions from Wikipedia DIGITAL FORENSICS A BRANCH OF FORENSIC SCIENCE ENCOMPASSING THE RECOVERY AND INVESTIGATION OF MATERIAL FOUND IN DIGITAL DEVICES, OFTEN IN RELATION TO COMPUTER CRIME CYBER/COMPUTER FORENSICS A BRANCH OF DIGITAL FORENSIC SCIENCE, THE APPLICATION OF INVESTIGATION AND ANALYSIS TECHNIQUES TO GATHER AND PRESERVE EVIDENCE FROM A PARTICULAR COMPUTING DEVICE IN A WAY THAT IS SUITABLE FOR PRESENTATION IN A COURT OF LAW
  • 4. {elysiumsecurity} cyber protection & response 4 CASE STUDYFRAMEWORKPRINCIPLESCONTEXT CYBER ATTACKS AND MALWARE TRENDS Public Source: AV-TEST
  • 5. {elysiumsecurity} cyber protection & response 5 CASE STUDYFRAMEWORKPRINCIPLESCONTEXT GDPR REQUIREMENTS Public ARTICLE 33 72H REPORTING NATURE OF THE BREACH? (WHO? WHERE? HOW?) POTENTIAL IMPACT? WHAT HAS BEEN DONE TO PREVENT THE BREACH? (CONTROLS? PROCESSES?) Icons from the Noun Project unless specified otherwise
  • 6. {elysiumsecurity} cyber protection & response 6 CASE STUDYFRAMEWORKPRINCIPLESCONTEXT CORE PRINCIPLES Public PRESERVATION OF INTEGRITY CHAIN OF CUSTODY ONLINE/OFFLINE ? NEVER FORGET THE « S »!! ACTIVITY GOALS
  • 7. {elysiumsecurity} cyber protection & response 7 CASE STUDYFRAMEWORKPRINCIPLESCONTEXT OVERVIEW Public CONTEXT LOGS FILESYSTEM CONFIG NETWORK MEMORY ADVANCED ACTIVITY SCOPE ACQUISITION ANALYSIS REPORTINGACTIONS GOALS IDENTIFICATION Impact/Target/Technique ATTRIBUTION Source of Attack COLLECTION Evidence of compromise Copyright ELYSIUMSECURITY LTD, please refer to us if reusing this diagram: https://www.elysiumsecurity.com
  • 8. {elysiumsecurity} cyber protection & response 8 CASE STUDYFRAMEWORKPRINCIPLESCONTEXT GOALS Public IDENTIFICATION Impact/Target/Technique ATTRIBUTION Source of Attack COLLECTION Evidence of compromise WHAT? WAS COMPROMISED? WAS STOLEN/MODIFIED? WHERE? THE CONTROLS FAILED? THE DATA WENT? HOW? THEY HACKED? WAS IT STOPPED? WHY? THEY TARGETED YOU? WAS IT SUCCESSFUL? WHO? WAS TARGETED? WAS RESPONSIBLE?
  • 9. {elysiumsecurity} cyber protection & response 9 CASE STUDYFRAMEWORKPRINCIPLESCONTEXT ACTIONS Public ACQUISITION REPORTING ANALYSIS IDENTIFICATION OF EVIDENCE PRESERVATION OF EVIDENCE COLLECTION OF EVIDENCE ANALYSIS OF EVIDENCE DOCUMENTATION OF EVIDENCE PRESENTATION OF EVIDENCE
  • 10. {elysiumsecurity} cyber protection & response 10 CASE STUDYFRAMEWORKPRINCIPLESCONTEXT ACTIVITY - CONTEXT Public CONTEXT TIMELINE LOCATION MEDIUM INDIVIDUALS ACTIVITIES READ-ONLY COPY OF EVIDENCE ! INTERVIEWS
  • 11. {elysiumsecurity} cyber protection & response 11 CASE STUDYFRAMEWORKPRINCIPLESCONTEXT ACTIVITY - LOG Public LOGS ENDPOINTS SERVERS NETWORK DEVICES CLOUD SERVICES EVENT VIEWER, WEBTOOLS START WITH TIMELINE RANGE READ-ONLY COPY OF EVIDENCE !
  • 12. {elysiumsecurity} cyber protection & response 12 CASE STUDYFRAMEWORKPRINCIPLESCONTEXT ACTIVITY - FILESYSTEM Public FILESYSTEM SUPER TIMELINE FILE/APP/KEYWORD SEARCH PLACES OF INTEREST VIRUS SCANS LOG2TIMELINE, TSK HUGE AMOUNT OF DATA READ-ONLY COPY OF EVIDENCE !
  • 13. {elysiumsecurity} cyber protection & response 13 CASE STUDYFRAMEWORKPRINCIPLESCONTEXT ACTIVITY - CONFIG Public CONFIG REGISTRY KEY HIVE SYSTEM FILES APPLICATION CONFIGURATION RECENT CHANGES/INSTALLATIONS REGEDIT/HIJACKTHIS/GREP READ-ONLY COPY OF EVIDENCE !
  • 14. {elysiumsecurity} cyber protection & response 14 CASE STUDYFRAMEWORKPRINCIPLESCONTEXT ACTIVITY - NETWORK Public NETWORK SOURCE / DESTINATION ACTIVITIES PROTOCOL USED TRAFFIC CONTENT ANALYSIS IDS ANALYSIS WIRESHARK / TCPDUMP READ-ONLY COPY OF EVIDENCE !
  • 15. {elysiumsecurity} cyber protection & response 15 CASE STUDYFRAMEWORKPRINCIPLESCONTEXT ACTIVITY - MEMORY Public MEMORY DUMP MEMORY / PAGE FILES RUNNING PROCESSES BINARY INSPECTION HIDDEN DATA VOLATILITY / REKAL READ-ONLY COPY OF EVIDENCE !
  • 16. {elysiumsecurity} cyber protection & response 16 CASE STUDYFRAMEWORKPRINCIPLESCONTEXT ACTIVITY - ADVANCED Public ADVANCED USER ACTIVITY SIMULATION MALWARE REVERSE ENGINEERING MALWARE SANDBOXING HONEYPOTS HACKER COMMUNICATION DANGEROUS!READ-ONLY COPY OF EVIDENCE !
  • 17. {elysiumsecurity} cyber protection & response 17 CASE STUDYFRAMEWORKPRINCIPLESCONTEXT CLIENT DATABASE LEAK INVESTIGATION Public CONTEXT LOG FILESYSTEM CONFIG NETWORK MEMORY ADVANCED - EXECUTIVE ATTENDED A CONFERENCE; - LOGGED TO WEBMAIL; - WARNING IGNORED; - CLIENT DB LEAKED; - 29/05/18 @ 09:09 - TROJAN FILES FOUND; - HIDDEN PARTITION IDENTIFIED; - BAD WEB PLUGIN DELETED; - USB CONNECTION. - PROCESS SENDING DATA TO IP EVERY 5 MINUTES; - ENDPOINT ACTING AS A PROXY FOR INTRANET; - IDS FLAG ALERTS. - MALWARE SOURCE CODE IN FRENCH; - IP TRAIL FROM KNOWN GROUPS; - HACKER FOR HIRE FROM EX EMPLOYEE. - EMAIL LOGING FROM SUSPICIOUS COUNTRY; - EMAIL DELETED TO DB SUPPORT; - VPN ACCESS FROM CONFERENCE. - WEB HISTORY TO FAKE WEBMAIL; - FIREWALL TURNED OFF; - AV WHITELIST OF SUSPICIOUS DIRECTORY; - SUSPICIOUS SERVICE. - HIDDEN PROCESSES; - TROJAN DETECTED IN MEMORY; - REMOTE CONNECTION LIVE;
  • 18. {elysiumsecurity} cyber protection & response © 2018 Elysium Security Ltd. All Rights Reserved www.elysium security.com ElysiumSecurity provides practical expertise to identify vulnerabilities, assess their risks and impact, remediate those risks, prepare and respond to incidents as well as raise security awareness through an organization. ElysiumSecurity provides high level expertise gathered through years of best practices experience in large international companies allowing us to provide advice best suited to your business operational model and priorities. ABOUT ELYSIUMSECURITY LTD. ElysiumSecurity provides a portfolio of Strategic and Tactical Services to help companies protect and respond against Cyber Security Threats. We differentiate ourselves by offering discreet, tailored and specialized engagements. Operating in Mauritius and in the United Kingdom, our boutique style approach means we can easily adapt to your business operational model and requirements to provide a personalized service that fits your working environment.