SEC 815 Digital Forensic and Incident Response
Identifying Indicator of Compromise (IOC) on Windows
• Program is simply an executable
• Process
• Process ID
• Memory space
• Executable program
• Handles
• File descriptors in dd
• Security context
• Threads
Process vs. Program (App)
• A process is a program in execution
• A thread is a lightweight process
• A thread is usually part of a process
• Inter-Process Communication
• Communication between 2 applications
• Intra-Process Communication
• Communication between 2 open threads (e.g. tabs)
Process vs. Thread
• User mode
• Privileged mode
• Kernel mode (Windows)
• Root mode (Linux)
• Hypervisor mode – only in a virtual machine (VM) setting
Process Modes: User vs. Kernel
User Mode Kernel/Root
Mode
• Restricted hardware
access
• Dedicated memory
address space
• Need permission to
change access
privilege
• No hardware access
restriction
• Single address space
• Access privilege
change does not
require any
permission
High-Level View of Windows Processes
Windows Tools
• SysInternals Suite: TCPView and Process Explorer
Linux Tools
• Netstat –nlap
• ps –ef
• ps aux
• strings <Hendra.jpg>
Finding Malware with Process Explorer & TCP View
Install SysInternals Suite, a Microsoft set of tools
Experiment with TCPView and Process Explorer
Rerefence:
https://docs.microsoft.com/en-us/sysinternals/downloads/sysinternals-suite
Homework & Preparation for the Upcoming Lab

Identifying IOC in Windows with Security.pptx

  • 1.
    SEC 815 DigitalForensic and Incident Response Identifying Indicator of Compromise (IOC) on Windows
  • 2.
    • Program issimply an executable • Process • Process ID • Memory space • Executable program • Handles • File descriptors in dd • Security context • Threads Process vs. Program (App)
  • 3.
    • A processis a program in execution • A thread is a lightweight process • A thread is usually part of a process • Inter-Process Communication • Communication between 2 applications • Intra-Process Communication • Communication between 2 open threads (e.g. tabs) Process vs. Thread
  • 4.
    • User mode •Privileged mode • Kernel mode (Windows) • Root mode (Linux) • Hypervisor mode – only in a virtual machine (VM) setting Process Modes: User vs. Kernel
  • 5.
    User Mode Kernel/Root Mode •Restricted hardware access • Dedicated memory address space • Need permission to change access privilege • No hardware access restriction • Single address space • Access privilege change does not require any permission
  • 6.
    High-Level View ofWindows Processes
  • 7.
    Windows Tools • SysInternalsSuite: TCPView and Process Explorer Linux Tools • Netstat –nlap • ps –ef • ps aux • strings <Hendra.jpg> Finding Malware with Process Explorer & TCP View
  • 8.
    Install SysInternals Suite,a Microsoft set of tools Experiment with TCPView and Process Explorer Rerefence: https://docs.microsoft.com/en-us/sysinternals/downloads/sysinternals-suite Homework & Preparation for the Upcoming Lab