SlideShare a Scribd company logo
1 of 124
Download to read offline
Velociraptor
Dig deeper.
www.velocidex.com
Nick Klein
Director, Velocidex Enterprises
nick@velocidex.com
Director, Klein & Co.
nick@kleinco.com.au
SANS DFIR Certified Instructor
Mike Cohen
Director, Velocidex Enterprises
mike@velocidex.com
© Velocidex Enterprises 2019 / www.velocidex.com
Who are we?
Dr Michael Cohen (scudette)
• Digital forensic software developer
• Developer of Volatility and Rekall
• Former lead developer of Grr at Google
Nick Klein
• Director of Klein & Co. DFIR team
• SANS DFIR Certified Instructor
2
© Velocidex Enterprises 2019 / www.velocidex.com
What’s the need?
• Deep visibility of endpoints is a game changer for:
• digital forensic investigations
• threat hunting
• cyber breach response
• operational security monitoring.
• Few current tools offer network-wide deep forensic
analysis
• We’re building (and using) Velociraptor to address this
3
© Velocidex Enterprises 2019 / www.velocidex.com
Technical overview
© Velocidex Enterprises 2019 / www.velocidex.com
Velociraptor architecture
5
© Velocidex Enterprises 2019 / www.velocidex.com
Velociraptor architecture
5
Velociraptor server
and GUI frontend
© Velocidex Enterprises 2019 / www.velocidex.com
Data store File store
Velociraptor architecture
5
Velociraptor server
and GUI frontend
© Velocidex Enterprises 2019 / www.velocidex.com
Data store File store
Velociraptor architecture
5
Velociraptor server
and GUI frontend
© Velocidex Enterprises 2019 / www.velocidex.com
Velociraptor
Windows client
Encrypted comms
Data store File store
Velociraptor architecture
5
Velociraptor server
and GUI frontend
© Velocidex Enterprises 2019 / www.velocidex.com
Velociraptor
Linux client
Velociraptor
Windows client
Encrypted comms
Data store File store
Velociraptor architecture
5
Velociraptor server
and GUI frontend
© Velocidex Enterprises 2019 / www.velocidex.com
Velociraptor
Mac client
Velociraptor
Linux client
Velociraptor
Windows client
Encrypted comms
Data store File store
Velociraptor architecture
5
Velociraptor server
and GUI frontend
© Velocidex Enterprises 2019 / www.velocidex.com
Velociraptor
Mac client
Velociraptor
Linux client
Velociraptor
Windows client
Encrypted comms
Data store File store
Velociraptor architecture
5
Velociraptor server
and GUI frontend
© Velocidex Enterprises 2019 / www.velocidex.com
Encrypted comms
Velociraptor users
connect to GUI
frontend
Velociraptor
Mac client
Velociraptor
Linux client
Velociraptor
Windows client
Encrypted comms
Data store File store
Velociraptor architecture
5
Velociraptor server
and GUI frontend
© Velocidex Enterprises 2019 / www.velocidex.com
Encrypted comms
Velociraptor users
connect to GUI
frontend
Velociraptor
Mac client
Velociraptor
Linux client
Velociraptor
Windows client
Encrypted comms
Data store File store
Velociraptor architecture
5
Velociraptor server
and GUI frontend
© Velocidex Enterprises 2019 / www.velocidex.com
Velociraptor architecture
• A single executable (OS specific) which can be a server or a client
• No libraries, no external dependencies
• Server and client config files are plain text
• No database – data stores and file stores are just files on disk
• Velociraptor can process data on the clients and the server
• You can customise many elements:
• Communication ports
• Executable names and locations
• Data locations
• Service name and descriptions
6
© Velocidex Enterprises 2019 / www.velocidex.com
Key principles
• The core feature of
Velociraptor is the
Velociraptor Query Language
(VQL) which is an expressive
language providing power
and flexibility
• We use VQL to construct
Velociraptor artefacts
• Velociraptor artefacts
encapsulate DFIR knowledge,
so users don’t need to be
DFIR experts
7
VQL queries
VQL queries
VQL queries
VQL queries
Velociraptor
Artefacts
Functions Plugins
Used to build
Used to enhance
Parameter
s
Collect
Analyse
Monitor
Respond
Actions on
endpoints
© Velocidex Enterprises 2019 / www.velocidex.com
Key principles
8
We have questions to answer

e.g. What programs were executed?
We know where to look

e.g. shimcache, prefetch, exe’s on disk
We use VQL to build Velociraptor artefacts
that encapsulate this knowledge
We use these same artefacts everywhere
to collect, analyse and monitor endpoints
We have
these
We need
these
Metadata for
understanding
purpose,
functions,
resources and
contributors
Queries can be
split into sub-
queries for easy
understanding and
modification
Parameters provide
easy customisation
of things to look for
VQL functions and
plugins provide
capabilities
Metadata
Parameters
Queries
Metadata for
understanding
purpose,
functions,
resources and
contributors
Queries can be
split into sub-
queries for easy
understanding and
modification
Parameters provide
easy customisation
of things to look for
VQL functions and
plugins provide
capabilities
Metadata
Parameters
Queries
Metadata for
understanding
purpose,
functions,
resources and
contributors
Queries can be
split into sub-
queries for easy
understanding and
modification
Parameters provide
easy customisation
of things to look for
VQL functions and
plugins provide
capabilities
Metadata
Parameters
Queries
Metadata for
understanding
purpose,
functions,
resources and
contributors
Queries can be
split into sub-
queries for easy
understanding and
modification
Parameters provide
easy customisation
of things to look for
VQL functions and
plugins provide
capabilities
Metadata
Parameters
Queries
Metadata for
understanding
purpose,
functions,
resources and
contributors
Queries can be
split into sub-
queries for easy
understanding and
modification
Parameters provide
easy customisation
of things to look for
VQL functions and
plugins provide
capabilities
Metadata
Parameters
Queries
Metadata for
understanding
purpose,
functions,
resources and
contributors
Queries can be
split into sub-
queries for easy
understanding and
modification
Parameters provide
easy customisation
of things to look for
VQL functions and
plugins provide
capabilities
Metadata
Parameters
Queries
Metadata for
understanding
purpose,
functions,
resources and
contributors
Queries can be
split into sub-
queries for easy
understanding and
modification
Parameters provide
easy customisation
of things to look for
VQL functions and
plugins provide
capabilities
Metadata
Parameters
Queries
Comparison
between
osquery and
VQL for
checking
child-parent
process
relationships.
… this goes for a while
Comparison
between
osquery and
VQL for
checking
child-parent
process
relationships.
… this goes for a while
© Velocidex Enterprises 2019 / www.velocidex.com
Setup
Server setup
Server setup
Start the config generator
Server setup
Start the config generator
Server setup
Start the config generator
Server setup
Start the config generator
Answer the questions
Server setup
Start the config generator
Answer the questions
Server setup
Start the config generator
Server and client
config files are created
Answer the questions
Server setup
Start the config generator
Server and client
config files are created
Answer the questions
Server setup
Start the config generator
Server and client
config files are created
Answer the questions
Server setup
Start the config generator
Server and client
config files are created
Answer the questions
Server setup
Start the config generator
Server and client
config files are created
Answer the questions
Start the server
Server setup
Start the config generator
Server and client
config files are created
Answer the questions
Start the server
Server setup
Start the config generator
Server and client
config files are created
Answer the questions
Start the server
Server setup
Start the config generator
Server and client
config files are created
Answer the questions
Server setup
Start the config generator
Server and client
config files are created
Answer the questions
Use your
deployment
method of
choice.
Recommend a
signed MSI for
Windows.
Client deployment
14
Clients have
a persistent
connection
to the server.
They’re
awaiting
your
commands.
You’re ready to go
15
© Velocidex Enterprises 2019 / www.velocidex.com
Scenerio: Data collection
• File system
via OS
• File system
via raw
access
• Windows
Registry
• Collected
artefacts
Browse remote computers
17
• File system
via OS
• File system
via raw
access
• Windows
Registry
• Collected
artefacts
Browse remote computers
17
• File system
via OS
• File system
via raw
access
• Windows
Registry
• Collected
artefacts
Browse remote computers
17
• File system
via OS
• File system
via raw
access
• Windows
Registry
• Collected
artefacts
Browse remote computers
17
18
We can collect all
user hives from a
single computer
with a VQL
artefact.
This simple VQL
artefact
enumerates all
users, then collects
all their user hives.
Collecting evidence from a single endpoint
18
We can collect all
user hives from a
single computer
with a VQL
artefact.
This simple VQL
artefact
enumerates all
users, then collects
all their user hives.
Collecting evidence from a single endpoint
Focussing on a
known
compromised
account
Customise a collection artefact
Focussing on a
known
compromised
account
Customise a collection artefact
Collecting
all OS and
user
Registry
hives
Collecting
all OS and
user
Registry
hives
Collecting
all OS and
user
Registry
hives
Any artifact that can be collected on
a single computer, can be hunted
across the network
Extending collection across the network
22
• A hunt can cover
a group of
clients, or the
whole network
• A hunt will
continue running
until it expires,
or is stopped
• As new machines
appear, they
automatically
join the hunt
Extending collection across the network
22
• A hunt can cover
a group of
clients, or the
whole network
• A hunt will
continue running
until it expires,
or is stopped
• As new machines
appear, they
automatically
join the hunt
© Velocidex Enterprises 2019 / www.velocidex.com
Scenario: Finding files
The file finder artefact
• Use raw NTFS access to
bypass file system locks
• Use wildcards to ‘glob’
over directories
• Use Yara to search the
contents of files
• Filter by modified or
created dates
• Upload matching files to
the server for further
analysis.
• A great starting point for
making your own
collection artefacts.
© Velocidex Enterprises 2019 / www.velocidex.com
Scenario: Hunt for forensic evidence
© Velocidex Enterprises 2019 / www.velocidex.com
Hunt for use of SysInternals tools
• Some attackers use SysInternals tools
• These require accepting a EULA on first use
• This modifies a key in the user’s Registry
• This Registry key can be a great malicious indicator
© Velocidex Enterprises 2019 / www.velocidex.com
This dodgy user
has run PsExec
and SDelete
© Velocidex Enterprises 2019 / www.velocidex.com
This dodgy user
has run PsExec
and SDelete
© Velocidex Enterprises 2019 / www.velocidex.com
We have an artefact for that too
UserAssist
Timeline
RecentApps
AppCompatCach
e
* artefacts build
upon each

other
Lateral movement - WMI
Lateral movement - WMI
On source computer
On destination computer
© Velocidex Enterprises 2019 / www.velocidex.com
Scenario: Hunt for specific IOCs
© Velocidex Enterprises 2019 / www.velocidex.com
Scenario: Hunt for shadow IT
Hunting for Dropbox usage
Hunting for Dropbox usage
Hunting for Dropbox usage
Turn hunting into monitoring
© Velocidex Enterprises 2019 / www.velocidex.com
Event artifacts are never-ending VQL
queries that watch for events on clients
and stream those events to the server
when they occur
© Velocidex Enterprises 2019 / www.velocidex.com
Scenario: Monitor DNS on the endpoints
© Velocidex Enterprises 2019 / www.velocidex.com
Monitor DNS on the endpoints
• DNS is an excellent network indicator ☺
• But many organisations still don’t log DNS ☹
• Logging on internal DNS or network gateway is
limited ☹
• Velociraptor can monitor DNS at the endpoint ☺
Monitoring DNS
© Velocidex Enterprises 2019 / www.velocidex.com
Scenario: Monitoring USB devices
© Velocidex Enterprises 2019 / www.velocidex.com
Monitoring USB devices
• USB drives are a constant threat:
• Can introduce malware
• Commonly used to exfiltrate confidential documents
• Forensic analysis of USB usage has blind spots
• Velociraptor provides artefacts that can watch for
USB drive insertion and take various actions
© Velocidex Enterprises 2019 / www.velocidex.com
Server event artefacts
© Velocidex Enterprises 2019 / www.velocidex.com
Server event artifacts are similar to
the client event artifacts, except
they run on the server
© Velocidex Enterprises 2019 / www.velocidex.com
Scenario: Monitoring for encoded PowerShell
© Velocidex Enterprises 2019 / www.velocidex.com
Monitor for encoded PowerShell
• PowerShell encoded commands are easy to decode
individually, but harder at scale
• By default, Velociraptor watches all endpoint process
execution and sends logs to the server
• When the server sees PowerShell, it can check for
encoded commands and decodes them automatically
Introduce automation through the API
© Velocidex Enterprises 2019 / www.velocidex.com
Scenario: Monitor for service creation and
automatically sandbox the executable
Function to submit file to online sandbox
Function to submit file to online sandbox
Connect to Velociraptor API
Function to submit file to online sandbox
Connect to Velociraptor API
Monitors files uploaded to server
Function to submit file to online sandbox
Connect to Velociraptor API
Monitors files uploaded to server
Submit each uploaded file to online sandbbox
Event triggers the action
Event triggers the action
Which submits the
executable
Turn monitoring into responding
© Velocidex Enterprises 2019 / www.velocidex.com
Scenario: Block PsExec remoting
© Velocidex Enterprises 2019 / www.velocidex.com
© Velocidex Enterprises 2019 / www.velocidex.com
© Velocidex Enterprises 2019 / www.velocidex.com
© Velocidex Enterprises 2019 / www.velocidex.com
Note: this is a
race condition
© Velocidex Enterprises 2019 / www.velocidex.com
So, what do you want to find?
© Velocidex Enterprises 2019 / www.velocidex.com
Where to from here?
Velociraptor is a work in progress – please be
patient
• Our development roadmap includes:
• Sysmon integration
• Better presentation of results
• Improving the user interface
• Expanding the artefact library
• Further documentation
• More artefact parsers
• A true kernel driver for Windows
© Velocidex Enterprises 2019 / www.velocidex.com
Where to from here?
Velociraptor is a work in progress – please be
patient
• Our development roadmap includes:
• Sysmon integration
• Better presentation of results
• Improving the user interface
• Expanding the artefact library
• Further documentation
• More artefact parsers
• A true kernel driver for Windows
© Velocidex Enterprises 2019 / www.velocidex.com
Where can you start?
• Visit www.velocidex.com for
links to docs and downloads
• Download the latest release
• RTFM ☺
• Setup a test deployment
• Send us your ideas and input
• Contribute back to the project
www.velocidex.com
Thanks
Nick Klein
Director, Velocidex Enterprises
nick@velocidex.com
Director, Klein & Co.
nick@kleinco.com.au
SANS DFIR Certified Instructor
Mike Cohen
Director, Velocidex Enterprises
mike@velocidex.com

More Related Content

What's hot

Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in AssemblyPractical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in AssemblySam Bowne
 
The Columnar Era: Leveraging Parquet, Arrow and Kudu for High-Performance Ana...
The Columnar Era: Leveraging Parquet, Arrow and Kudu for High-Performance Ana...The Columnar Era: Leveraging Parquet, Arrow and Kudu for High-Performance Ana...
The Columnar Era: Leveraging Parquet, Arrow and Kudu for High-Performance Ana...DataWorks Summit/Hadoop Summit
 
Journeys from Kafka to Parquet
Journeys from Kafka to ParquetJourneys from Kafka to Parquet
Journeys from Kafka to ParquetDataWorks Summit
 
Log management with ELK
Log management with ELKLog management with ELK
Log management with ELKGeert Pante
 
第一次Elasticsearch就上手
第一次Elasticsearch就上手第一次Elasticsearch就上手
第一次Elasticsearch就上手Aaron King
 
What Is ELK Stack | ELK Tutorial For Beginners | Elasticsearch Kibana | ELK S...
What Is ELK Stack | ELK Tutorial For Beginners | Elasticsearch Kibana | ELK S...What Is ELK Stack | ELK Tutorial For Beginners | Elasticsearch Kibana | ELK S...
What Is ELK Stack | ELK Tutorial For Beginners | Elasticsearch Kibana | ELK S...Edureka!
 
차곡차곡 쉽게 알아가는 Elasticsearch와 Node.js
차곡차곡 쉽게 알아가는 Elasticsearch와 Node.js차곡차곡 쉽게 알아가는 Elasticsearch와 Node.js
차곡차곡 쉽게 알아가는 Elasticsearch와 Node.jsHeeJung Hwang
 
Enterprise class storage & san
Enterprise class storage & sanEnterprise class storage & san
Enterprise class storage & sanAishwarya wankhade
 
Real-time Analytics with Trino and Apache Pinot
Real-time Analytics with Trino and Apache PinotReal-time Analytics with Trino and Apache Pinot
Real-time Analytics with Trino and Apache PinotXiang Fu
 
ACID ORC, Iceberg, and Delta Lake—An Overview of Table Formats for Large Scal...
ACID ORC, Iceberg, and Delta Lake—An Overview of Table Formats for Large Scal...ACID ORC, Iceberg, and Delta Lake—An Overview of Table Formats for Large Scal...
ACID ORC, Iceberg, and Delta Lake—An Overview of Table Formats for Large Scal...Databricks
 
Alfresco Backup and Disaster Recovery White Paper
Alfresco Backup and Disaster Recovery White PaperAlfresco Backup and Disaster Recovery White Paper
Alfresco Backup and Disaster Recovery White PaperToni de la Fuente
 
Elasticsearch for Logs & Metrics - a deep dive
Elasticsearch for Logs & Metrics - a deep diveElasticsearch for Logs & Metrics - a deep dive
Elasticsearch for Logs & Metrics - a deep diveSematext Group, Inc.
 
Securing Hadoop with Apache Ranger
Securing Hadoop with Apache RangerSecuring Hadoop with Apache Ranger
Securing Hadoop with Apache RangerDataWorks Summit
 
Elasticsearch in Netflix
Elasticsearch in NetflixElasticsearch in Netflix
Elasticsearch in NetflixDanny Yuan
 

What's hot (20)

ELK Stack
ELK StackELK Stack
ELK Stack
 
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in AssemblyPractical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
 
Apache Ranger
Apache RangerApache Ranger
Apache Ranger
 
The Columnar Era: Leveraging Parquet, Arrow and Kudu for High-Performance Ana...
The Columnar Era: Leveraging Parquet, Arrow and Kudu for High-Performance Ana...The Columnar Era: Leveraging Parquet, Arrow and Kudu for High-Performance Ana...
The Columnar Era: Leveraging Parquet, Arrow and Kudu for High-Performance Ana...
 
Journeys from Kafka to Parquet
Journeys from Kafka to ParquetJourneys from Kafka to Parquet
Journeys from Kafka to Parquet
 
Log management with ELK
Log management with ELKLog management with ELK
Log management with ELK
 
第一次Elasticsearch就上手
第一次Elasticsearch就上手第一次Elasticsearch就上手
第一次Elasticsearch就上手
 
What Is ELK Stack | ELK Tutorial For Beginners | Elasticsearch Kibana | ELK S...
What Is ELK Stack | ELK Tutorial For Beginners | Elasticsearch Kibana | ELK S...What Is ELK Stack | ELK Tutorial For Beginners | Elasticsearch Kibana | ELK S...
What Is ELK Stack | ELK Tutorial For Beginners | Elasticsearch Kibana | ELK S...
 
차곡차곡 쉽게 알아가는 Elasticsearch와 Node.js
차곡차곡 쉽게 알아가는 Elasticsearch와 Node.js차곡차곡 쉽게 알아가는 Elasticsearch와 Node.js
차곡차곡 쉽게 알아가는 Elasticsearch와 Node.js
 
Enterprise class storage & san
Enterprise class storage & sanEnterprise class storage & san
Enterprise class storage & san
 
Elasticsearch 簡介
Elasticsearch 簡介Elasticsearch 簡介
Elasticsearch 簡介
 
Real-time Analytics with Trino and Apache Pinot
Real-time Analytics with Trino and Apache PinotReal-time Analytics with Trino and Apache Pinot
Real-time Analytics with Trino and Apache Pinot
 
ACID ORC, Iceberg, and Delta Lake—An Overview of Table Formats for Large Scal...
ACID ORC, Iceberg, and Delta Lake—An Overview of Table Formats for Large Scal...ACID ORC, Iceberg, and Delta Lake—An Overview of Table Formats for Large Scal...
ACID ORC, Iceberg, and Delta Lake—An Overview of Table Formats for Large Scal...
 
Alfresco Backup and Disaster Recovery White Paper
Alfresco Backup and Disaster Recovery White PaperAlfresco Backup and Disaster Recovery White Paper
Alfresco Backup and Disaster Recovery White Paper
 
Elasticsearch for Logs & Metrics - a deep dive
Elasticsearch for Logs & Metrics - a deep diveElasticsearch for Logs & Metrics - a deep dive
Elasticsearch for Logs & Metrics - a deep dive
 
LLAP: Sub-Second Analytical Queries in Hive
LLAP: Sub-Second Analytical Queries in HiveLLAP: Sub-Second Analytical Queries in Hive
LLAP: Sub-Second Analytical Queries in Hive
 
Securing Hadoop with Apache Ranger
Securing Hadoop with Apache RangerSecuring Hadoop with Apache Ranger
Securing Hadoop with Apache Ranger
 
Elasticsearch in Netflix
Elasticsearch in NetflixElasticsearch in Netflix
Elasticsearch in Netflix
 
Find and locate
Find and locateFind and locate
Find and locate
 
Elk
Elk Elk
Elk
 

Similar to Velociraptor - SANS Summit 2019

01282016 Aerospike-Docker webinar
01282016 Aerospike-Docker webinar01282016 Aerospike-Docker webinar
01282016 Aerospike-Docker webinarAerospike, Inc.
 
Tampere Docker meetup - Happy 5th Birthday Docker
Tampere Docker meetup - Happy 5th Birthday DockerTampere Docker meetup - Happy 5th Birthday Docker
Tampere Docker meetup - Happy 5th Birthday DockerSakari Hoisko
 
{code} and Containers - Open Source Infrastructure within Dell Technologies
{code} and Containers - Open Source Infrastructure within Dell Technologies{code} and Containers - Open Source Infrastructure within Dell Technologies
{code} and Containers - Open Source Infrastructure within Dell TechnologiesThe {code} Team
 
Business and IT agility through DevOps and microservice architecture powered ...
Business and IT agility through DevOps and microservice architecture powered ...Business and IT agility through DevOps and microservice architecture powered ...
Business and IT agility through DevOps and microservice architecture powered ...Lucas Jellema
 
Docker Birthday #5 Meetup Cluj - Presentation
Docker Birthday #5 Meetup Cluj - PresentationDocker Birthday #5 Meetup Cluj - Presentation
Docker Birthday #5 Meetup Cluj - PresentationAlex Vranceanu
 
Introduction to Hibernate Framework
Introduction to Hibernate FrameworkIntroduction to Hibernate Framework
Introduction to Hibernate FrameworkMohit Kanwar
 
PHPFrameworkDay 2020 - Different software evolutions from Start till Release ...
PHPFrameworkDay 2020 - Different software evolutions from Start till Release ...PHPFrameworkDay 2020 - Different software evolutions from Start till Release ...
PHPFrameworkDay 2020 - Different software evolutions from Start till Release ...Alexandr Savchenko
 
"Different software evolutions from Start till Release in PHP product" Oleksa...
"Different software evolutions from Start till Release in PHP product" Oleksa..."Different software evolutions from Start till Release in PHP product" Oleksa...
"Different software evolutions from Start till Release in PHP product" Oleksa...Fwdays
 
Thick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash CourseThick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash CourseNetSPI
 
SOLID Programming with Portable Class Libraries
SOLID Programming with Portable Class LibrariesSOLID Programming with Portable Class Libraries
SOLID Programming with Portable Class LibrariesVagif Abilov
 
Data integration with Apache Kafka
Data integration with Apache KafkaData integration with Apache Kafka
Data integration with Apache Kafkaconfluent
 
Le soluzioni tecnologiche per il Copy Data Management
Le soluzioni tecnologiche per il Copy Data ManagementLe soluzioni tecnologiche per il Copy Data Management
Le soluzioni tecnologiche per il Copy Data ManagementJürgen Ambrosi
 
MySQL in oracle_environments(Part 2): MySQL Enterprise Monitor & Oracle Enter...
MySQL in oracle_environments(Part 2): MySQL Enterprise Monitor & Oracle Enter...MySQL in oracle_environments(Part 2): MySQL Enterprise Monitor & Oracle Enter...
MySQL in oracle_environments(Part 2): MySQL Enterprise Monitor & Oracle Enter...OracleMySQL
 
AAI-2075 Evolving an IBM WebSphere Topology to Manage a Changing Workloa
AAI-2075 Evolving an IBM WebSphere Topology to Manage a Changing WorkloaAAI-2075 Evolving an IBM WebSphere Topology to Manage a Changing Workloa
AAI-2075 Evolving an IBM WebSphere Topology to Manage a Changing WorkloaWASdev Community
 
Simplify DevOps with Microservices and Mobile Backends.pptx
Simplify DevOps with Microservices and Mobile Backends.pptxSimplify DevOps with Microservices and Mobile Backends.pptx
Simplify DevOps with Microservices and Mobile Backends.pptxssuser5faa791
 
Virtualization Vs. Containers
Virtualization Vs. ContainersVirtualization Vs. Containers
Virtualization Vs. Containersactualtechmedia
 

Similar to Velociraptor - SANS Summit 2019 (20)

{code} and containers
{code} and containers{code} and containers
{code} and containers
 
01282016 Aerospike-Docker webinar
01282016 Aerospike-Docker webinar01282016 Aerospike-Docker webinar
01282016 Aerospike-Docker webinar
 
Tampere Docker meetup - Happy 5th Birthday Docker
Tampere Docker meetup - Happy 5th Birthday DockerTampere Docker meetup - Happy 5th Birthday Docker
Tampere Docker meetup - Happy 5th Birthday Docker
 
{code} and Containers - Open Source Infrastructure within Dell Technologies
{code} and Containers - Open Source Infrastructure within Dell Technologies{code} and Containers - Open Source Infrastructure within Dell Technologies
{code} and Containers - Open Source Infrastructure within Dell Technologies
 
Business and IT agility through DevOps and microservice architecture powered ...
Business and IT agility through DevOps and microservice architecture powered ...Business and IT agility through DevOps and microservice architecture powered ...
Business and IT agility through DevOps and microservice architecture powered ...
 
Docker Birthday #5 Meetup Cluj - Presentation
Docker Birthday #5 Meetup Cluj - PresentationDocker Birthday #5 Meetup Cluj - Presentation
Docker Birthday #5 Meetup Cluj - Presentation
 
Microservices
MicroservicesMicroservices
Microservices
 
Introduction to Hibernate Framework
Introduction to Hibernate FrameworkIntroduction to Hibernate Framework
Introduction to Hibernate Framework
 
PHPFrameworkDay 2020 - Different software evolutions from Start till Release ...
PHPFrameworkDay 2020 - Different software evolutions from Start till Release ...PHPFrameworkDay 2020 - Different software evolutions from Start till Release ...
PHPFrameworkDay 2020 - Different software evolutions from Start till Release ...
 
"Different software evolutions from Start till Release in PHP product" Oleksa...
"Different software evolutions from Start till Release in PHP product" Oleksa..."Different software evolutions from Start till Release in PHP product" Oleksa...
"Different software evolutions from Start till Release in PHP product" Oleksa...
 
Thick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash CourseThick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash Course
 
56k.cloud training
56k.cloud training56k.cloud training
56k.cloud training
 
SOLID Programming with Portable Class Libraries
SOLID Programming with Portable Class LibrariesSOLID Programming with Portable Class Libraries
SOLID Programming with Portable Class Libraries
 
Data integration with Apache Kafka
Data integration with Apache KafkaData integration with Apache Kafka
Data integration with Apache Kafka
 
CloudDesignPatterns
CloudDesignPatternsCloudDesignPatterns
CloudDesignPatterns
 
Le soluzioni tecnologiche per il Copy Data Management
Le soluzioni tecnologiche per il Copy Data ManagementLe soluzioni tecnologiche per il Copy Data Management
Le soluzioni tecnologiche per il Copy Data Management
 
MySQL in oracle_environments(Part 2): MySQL Enterprise Monitor & Oracle Enter...
MySQL in oracle_environments(Part 2): MySQL Enterprise Monitor & Oracle Enter...MySQL in oracle_environments(Part 2): MySQL Enterprise Monitor & Oracle Enter...
MySQL in oracle_environments(Part 2): MySQL Enterprise Monitor & Oracle Enter...
 
AAI-2075 Evolving an IBM WebSphere Topology to Manage a Changing Workloa
AAI-2075 Evolving an IBM WebSphere Topology to Manage a Changing WorkloaAAI-2075 Evolving an IBM WebSphere Topology to Manage a Changing Workloa
AAI-2075 Evolving an IBM WebSphere Topology to Manage a Changing Workloa
 
Simplify DevOps with Microservices and Mobile Backends.pptx
Simplify DevOps with Microservices and Mobile Backends.pptxSimplify DevOps with Microservices and Mobile Backends.pptx
Simplify DevOps with Microservices and Mobile Backends.pptx
 
Virtualization Vs. Containers
Virtualization Vs. ContainersVirtualization Vs. Containers
Virtualization Vs. Containers
 

More from Velocidex Enterprises

Crikeycon 2019 Velociraptor Workshop
Crikeycon 2019 Velociraptor WorkshopCrikeycon 2019 Velociraptor Workshop
Crikeycon 2019 Velociraptor WorkshopVelocidex Enterprises
 
Digital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The CloudDigital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The CloudVelocidex Enterprises
 
Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3Velocidex Enterprises
 
Digital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The CloudDigital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The CloudVelocidex Enterprises
 

More from Velocidex Enterprises (6)

Crikeycon 2019 Velociraptor Workshop
Crikeycon 2019 Velociraptor WorkshopCrikeycon 2019 Velociraptor Workshop
Crikeycon 2019 Velociraptor Workshop
 
RSA APJ Velociraptor Lab
RSA APJ Velociraptor LabRSA APJ Velociraptor Lab
RSA APJ Velociraptor Lab
 
Nzitf Velociraptor Workshop
Nzitf Velociraptor WorkshopNzitf Velociraptor Workshop
Nzitf Velociraptor Workshop
 
Digital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The CloudDigital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The Cloud
 
Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3
 
Digital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The CloudDigital Forensics and Incident Response in The Cloud
Digital Forensics and Incident Response in The Cloud
 

Recently uploaded

EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 

Recently uploaded (20)

EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 

Velociraptor - SANS Summit 2019

  • 1. Velociraptor Dig deeper. www.velocidex.com Nick Klein Director, Velocidex Enterprises nick@velocidex.com Director, Klein & Co. nick@kleinco.com.au SANS DFIR Certified Instructor Mike Cohen Director, Velocidex Enterprises mike@velocidex.com
  • 2. © Velocidex Enterprises 2019 / www.velocidex.com Who are we? Dr Michael Cohen (scudette) • Digital forensic software developer • Developer of Volatility and Rekall • Former lead developer of Grr at Google Nick Klein • Director of Klein & Co. DFIR team • SANS DFIR Certified Instructor 2
  • 3. © Velocidex Enterprises 2019 / www.velocidex.com What’s the need? • Deep visibility of endpoints is a game changer for: • digital forensic investigations • threat hunting • cyber breach response • operational security monitoring. • Few current tools offer network-wide deep forensic analysis • We’re building (and using) Velociraptor to address this 3
  • 4. © Velocidex Enterprises 2019 / www.velocidex.com Technical overview
  • 5. © Velocidex Enterprises 2019 / www.velocidex.com Velociraptor architecture 5
  • 6. © Velocidex Enterprises 2019 / www.velocidex.com Velociraptor architecture 5 Velociraptor server and GUI frontend
  • 7. © Velocidex Enterprises 2019 / www.velocidex.com Data store File store Velociraptor architecture 5 Velociraptor server and GUI frontend
  • 8. © Velocidex Enterprises 2019 / www.velocidex.com Data store File store Velociraptor architecture 5 Velociraptor server and GUI frontend
  • 9. © Velocidex Enterprises 2019 / www.velocidex.com Velociraptor Windows client Encrypted comms Data store File store Velociraptor architecture 5 Velociraptor server and GUI frontend
  • 10. © Velocidex Enterprises 2019 / www.velocidex.com Velociraptor Linux client Velociraptor Windows client Encrypted comms Data store File store Velociraptor architecture 5 Velociraptor server and GUI frontend
  • 11. © Velocidex Enterprises 2019 / www.velocidex.com Velociraptor Mac client Velociraptor Linux client Velociraptor Windows client Encrypted comms Data store File store Velociraptor architecture 5 Velociraptor server and GUI frontend
  • 12. © Velocidex Enterprises 2019 / www.velocidex.com Velociraptor Mac client Velociraptor Linux client Velociraptor Windows client Encrypted comms Data store File store Velociraptor architecture 5 Velociraptor server and GUI frontend
  • 13. © Velocidex Enterprises 2019 / www.velocidex.com Encrypted comms Velociraptor users connect to GUI frontend Velociraptor Mac client Velociraptor Linux client Velociraptor Windows client Encrypted comms Data store File store Velociraptor architecture 5 Velociraptor server and GUI frontend
  • 14. © Velocidex Enterprises 2019 / www.velocidex.com Encrypted comms Velociraptor users connect to GUI frontend Velociraptor Mac client Velociraptor Linux client Velociraptor Windows client Encrypted comms Data store File store Velociraptor architecture 5 Velociraptor server and GUI frontend
  • 15. © Velocidex Enterprises 2019 / www.velocidex.com Velociraptor architecture • A single executable (OS specific) which can be a server or a client • No libraries, no external dependencies • Server and client config files are plain text • No database – data stores and file stores are just files on disk • Velociraptor can process data on the clients and the server • You can customise many elements: • Communication ports • Executable names and locations • Data locations • Service name and descriptions 6
  • 16. © Velocidex Enterprises 2019 / www.velocidex.com Key principles • The core feature of Velociraptor is the Velociraptor Query Language (VQL) which is an expressive language providing power and flexibility • We use VQL to construct Velociraptor artefacts • Velociraptor artefacts encapsulate DFIR knowledge, so users don’t need to be DFIR experts 7 VQL queries VQL queries VQL queries VQL queries Velociraptor Artefacts Functions Plugins Used to build Used to enhance Parameter s Collect Analyse Monitor Respond Actions on endpoints
  • 17. © Velocidex Enterprises 2019 / www.velocidex.com Key principles 8 We have questions to answer
 e.g. What programs were executed? We know where to look
 e.g. shimcache, prefetch, exe’s on disk We use VQL to build Velociraptor artefacts that encapsulate this knowledge We use these same artefacts everywhere to collect, analyse and monitor endpoints We have these We need these
  • 18. Metadata for understanding purpose, functions, resources and contributors Queries can be split into sub- queries for easy understanding and modification Parameters provide easy customisation of things to look for VQL functions and plugins provide capabilities Metadata Parameters Queries
  • 19. Metadata for understanding purpose, functions, resources and contributors Queries can be split into sub- queries for easy understanding and modification Parameters provide easy customisation of things to look for VQL functions and plugins provide capabilities Metadata Parameters Queries
  • 20. Metadata for understanding purpose, functions, resources and contributors Queries can be split into sub- queries for easy understanding and modification Parameters provide easy customisation of things to look for VQL functions and plugins provide capabilities Metadata Parameters Queries
  • 21. Metadata for understanding purpose, functions, resources and contributors Queries can be split into sub- queries for easy understanding and modification Parameters provide easy customisation of things to look for VQL functions and plugins provide capabilities Metadata Parameters Queries
  • 22. Metadata for understanding purpose, functions, resources and contributors Queries can be split into sub- queries for easy understanding and modification Parameters provide easy customisation of things to look for VQL functions and plugins provide capabilities Metadata Parameters Queries
  • 23. Metadata for understanding purpose, functions, resources and contributors Queries can be split into sub- queries for easy understanding and modification Parameters provide easy customisation of things to look for VQL functions and plugins provide capabilities Metadata Parameters Queries
  • 24. Metadata for understanding purpose, functions, resources and contributors Queries can be split into sub- queries for easy understanding and modification Parameters provide easy customisation of things to look for VQL functions and plugins provide capabilities Metadata Parameters Queries
  • 27.
  • 28.
  • 29. © Velocidex Enterprises 2019 / www.velocidex.com Setup
  • 31. Server setup Start the config generator
  • 32. Server setup Start the config generator
  • 33. Server setup Start the config generator
  • 34. Server setup Start the config generator Answer the questions
  • 35. Server setup Start the config generator Answer the questions
  • 36. Server setup Start the config generator Server and client config files are created Answer the questions
  • 37. Server setup Start the config generator Server and client config files are created Answer the questions
  • 38. Server setup Start the config generator Server and client config files are created Answer the questions
  • 39. Server setup Start the config generator Server and client config files are created Answer the questions
  • 40. Server setup Start the config generator Server and client config files are created Answer the questions Start the server
  • 41. Server setup Start the config generator Server and client config files are created Answer the questions Start the server
  • 42. Server setup Start the config generator Server and client config files are created Answer the questions Start the server
  • 43. Server setup Start the config generator Server and client config files are created Answer the questions
  • 44. Server setup Start the config generator Server and client config files are created Answer the questions
  • 45. Use your deployment method of choice. Recommend a signed MSI for Windows. Client deployment 14
  • 46. Clients have a persistent connection to the server. They’re awaiting your commands. You’re ready to go 15
  • 47. © Velocidex Enterprises 2019 / www.velocidex.com Scenerio: Data collection
  • 48. • File system via OS • File system via raw access • Windows Registry • Collected artefacts Browse remote computers 17
  • 49. • File system via OS • File system via raw access • Windows Registry • Collected artefacts Browse remote computers 17
  • 50. • File system via OS • File system via raw access • Windows Registry • Collected artefacts Browse remote computers 17
  • 51. • File system via OS • File system via raw access • Windows Registry • Collected artefacts Browse remote computers 17
  • 52. 18 We can collect all user hives from a single computer with a VQL artefact. This simple VQL artefact enumerates all users, then collects all their user hives. Collecting evidence from a single endpoint
  • 53. 18 We can collect all user hives from a single computer with a VQL artefact. This simple VQL artefact enumerates all users, then collects all their user hives. Collecting evidence from a single endpoint
  • 59. Any artifact that can be collected on a single computer, can be hunted across the network
  • 60. Extending collection across the network 22 • A hunt can cover a group of clients, or the whole network • A hunt will continue running until it expires, or is stopped • As new machines appear, they automatically join the hunt
  • 61. Extending collection across the network 22 • A hunt can cover a group of clients, or the whole network • A hunt will continue running until it expires, or is stopped • As new machines appear, they automatically join the hunt
  • 62. © Velocidex Enterprises 2019 / www.velocidex.com Scenario: Finding files
  • 63. The file finder artefact • Use raw NTFS access to bypass file system locks • Use wildcards to ‘glob’ over directories • Use Yara to search the contents of files • Filter by modified or created dates • Upload matching files to the server for further analysis. • A great starting point for making your own collection artefacts.
  • 64. © Velocidex Enterprises 2019 / www.velocidex.com Scenario: Hunt for forensic evidence
  • 65. © Velocidex Enterprises 2019 / www.velocidex.com Hunt for use of SysInternals tools • Some attackers use SysInternals tools • These require accepting a EULA on first use • This modifies a key in the user’s Registry • This Registry key can be a great malicious indicator
  • 66. © Velocidex Enterprises 2019 / www.velocidex.com This dodgy user has run PsExec and SDelete
  • 67. © Velocidex Enterprises 2019 / www.velocidex.com This dodgy user has run PsExec and SDelete
  • 68.
  • 69.
  • 70. © Velocidex Enterprises 2019 / www.velocidex.com We have an artefact for that too UserAssist Timeline RecentApps AppCompatCach e * artefacts build upon each
 other
  • 71.
  • 73. Lateral movement - WMI On source computer On destination computer
  • 74.
  • 75. © Velocidex Enterprises 2019 / www.velocidex.com Scenario: Hunt for specific IOCs
  • 76.
  • 77.
  • 78. © Velocidex Enterprises 2019 / www.velocidex.com Scenario: Hunt for shadow IT
  • 82. Turn hunting into monitoring
  • 83. © Velocidex Enterprises 2019 / www.velocidex.com Event artifacts are never-ending VQL queries that watch for events on clients and stream those events to the server when they occur
  • 84. © Velocidex Enterprises 2019 / www.velocidex.com Scenario: Monitor DNS on the endpoints
  • 85. © Velocidex Enterprises 2019 / www.velocidex.com Monitor DNS on the endpoints • DNS is an excellent network indicator ☺ • But many organisations still don’t log DNS ☹ • Logging on internal DNS or network gateway is limited ☹ • Velociraptor can monitor DNS at the endpoint ☺
  • 87. © Velocidex Enterprises 2019 / www.velocidex.com Scenario: Monitoring USB devices
  • 88. © Velocidex Enterprises 2019 / www.velocidex.com Monitoring USB devices • USB drives are a constant threat: • Can introduce malware • Commonly used to exfiltrate confidential documents • Forensic analysis of USB usage has blind spots • Velociraptor provides artefacts that can watch for USB drive insertion and take various actions
  • 89.
  • 90.
  • 91.
  • 92. © Velocidex Enterprises 2019 / www.velocidex.com Server event artefacts
  • 93. © Velocidex Enterprises 2019 / www.velocidex.com Server event artifacts are similar to the client event artifacts, except they run on the server
  • 94. © Velocidex Enterprises 2019 / www.velocidex.com Scenario: Monitoring for encoded PowerShell
  • 95. © Velocidex Enterprises 2019 / www.velocidex.com Monitor for encoded PowerShell • PowerShell encoded commands are easy to decode individually, but harder at scale • By default, Velociraptor watches all endpoint process execution and sends logs to the server • When the server sees PowerShell, it can check for encoded commands and decodes them automatically
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 102. © Velocidex Enterprises 2019 / www.velocidex.com Scenario: Monitor for service creation and automatically sandbox the executable
  • 103.
  • 104.
  • 105.
  • 106. Function to submit file to online sandbox
  • 107. Function to submit file to online sandbox Connect to Velociraptor API
  • 108. Function to submit file to online sandbox Connect to Velociraptor API Monitors files uploaded to server
  • 109. Function to submit file to online sandbox Connect to Velociraptor API Monitors files uploaded to server Submit each uploaded file to online sandbbox
  • 110.
  • 111.
  • 113. Event triggers the action Which submits the executable
  • 114. Turn monitoring into responding
  • 115. © Velocidex Enterprises 2019 / www.velocidex.com Scenario: Block PsExec remoting
  • 116. © Velocidex Enterprises 2019 / www.velocidex.com
  • 117. © Velocidex Enterprises 2019 / www.velocidex.com
  • 118. © Velocidex Enterprises 2019 / www.velocidex.com
  • 119. © Velocidex Enterprises 2019 / www.velocidex.com Note: this is a race condition
  • 120. © Velocidex Enterprises 2019 / www.velocidex.com So, what do you want to find?
  • 121. © Velocidex Enterprises 2019 / www.velocidex.com Where to from here? Velociraptor is a work in progress – please be patient • Our development roadmap includes: • Sysmon integration • Better presentation of results • Improving the user interface • Expanding the artefact library • Further documentation • More artefact parsers • A true kernel driver for Windows
  • 122. © Velocidex Enterprises 2019 / www.velocidex.com Where to from here? Velociraptor is a work in progress – please be patient • Our development roadmap includes: • Sysmon integration • Better presentation of results • Improving the user interface • Expanding the artefact library • Further documentation • More artefact parsers • A true kernel driver for Windows
  • 123. © Velocidex Enterprises 2019 / www.velocidex.com Where can you start? • Visit www.velocidex.com for links to docs and downloads • Download the latest release • RTFM ☺ • Setup a test deployment • Send us your ideas and input • Contribute back to the project
  • 124. www.velocidex.com Thanks Nick Klein Director, Velocidex Enterprises nick@velocidex.com Director, Klein & Co. nick@kleinco.com.au SANS DFIR Certified Instructor Mike Cohen Director, Velocidex Enterprises mike@velocidex.com