SlideShare a Scribd company logo
Confidential
Patrick Knight
Sr. Dir. Cyber Strategy and
Product Management
Confidential
Counterforensics
How Insiders Evade Forensics &
How to Reveal Their Hidden
Tracks
What is Counterforensics?
 aka - Anti-Forensics
 Derived from Counterintelligence:
“activities designed to prevent or thwart spying, intelligence
gathering, and sabotage by an enemy or other foreign entity.”
 Counterforensics
“activities designed to prevent or thwart forensics
investigations through data destruction, data and activity
concealment, deception or sabotage.”
Confidential
• Hiding/concealing
activities
• Deception
• Destroying evidence
• Sabotage
Counterforensics
Tactics
Hiding/Concealing
Activities and Data
 Steganography
 Utilize common file
formats/channels – hide in
plain sight
 File concatenation
 File/data encryption
 Encrypted comms channels
This Photo by Unknown Author is licensed under CC BY
Confidential
 Video and image files typically are large enough to carry
additional data (e.g. messages, files)
 Casual viewer will never know message/data is present
 Can transport encrypted messages/data
 Intended recipient can be difficult to identify
 Anti-virus and endpoint security typically do not scan for
hidden messages
Why Steganography?
Confidential
# ping -p feedfacedeadbeef Dest-B
# tcpdump -i eth0 host Dest-B -x
21:03:32.601102 IP Source-A > Dest-B: icmp 64: echo request seq 56
0x0000: 4500 0054 0038 4000 4001 6e1c 4655 1fe9 E..T.8@.@.n.FU..
0x0010: 4655 1fc2 0800 8120 5006 0038 e414 9942 FU......P..8...B
0x0020: 142a 0900 feed face dead beef feed face .*..............
0x0030: dead beef feed face dead beef feed face ................
0x0040: dead beef feed face dead beef feed face ................
0x0050: dead ..
 IPV4 Max Size 65535 bytes - headers = 65507 bytes for messages via ICMP
Concealed message in ICMP
Hiding Activities in Plain Sight
 Google Chrome extension -
Netflix Hangouts
 Watch Netflix at work,
while appearing to be on a
conference call
Hiding/Concealing
Activities and Data:
Encryption
 Use of non-sanctioned encryption tools
to encrypt files and data
 Use encryption tools to obscure
communications
 Tor Browser or Tor proxy
 Command line tools: OpenSSL, cryptcat
Destroying Evidence
• Deleting files
• Deleting records
• Overwrite/wipe files
• Overwrite/wipe selective records/data
• Overwrite/wipe entire disks/external
media
Deceptive Tactics
 Alter timestamps/timelines
 Alter logs or other data
 Obfuscation of data, URLs, commands, etc.
 C:>cmd.exe /c c^^a^^l^^c^^.^^e^^x^^e
 Stolen credential use
Destroying Evidence
 Deleting data
 Deleting browser history - incognito
mode
 Disk and data wiping
Deleting Alone May Not Destroy the
Data
 Filesystems usually free the location of a deleted file, but do not overwrite/destro
 Email servers typically free the location of a deleted email, but do not
overwrite/destroy
 Secure deletion can include:
 Overwriting/wiping one or more times
 Defragmenting
 Overwriting/wiping all free and slack space
 Webmail and SaaS products are typically under the control of the service provider
Data Wiping Tools
 Sdelete
 KillDisk
 BCWipe
 Darik’s Boot and Nuke (DBAN)
 Format.exe (Windows tool)
 Secure Eraser
 100’s more…
Sabotage
 Denial Of Service (DOS)
 Intentional malware/ransomware infection
 Logic/time bombs
What can you do?
 Visibility into activities when they happen
 Full crime scene playback
 Alert on suspicious activities
 malicious application use
 suspect website access
 Tor Browser activity
What can you do?
 Block access to unwanted sites and network
applications
 Inventory sanctioned tools - know what is
allowed and by whom
 disk encryption
 data deletion policies
 cloud file storage
 Employee Monitoring & User Behavior
Analytics tools
User & Entity Behavioral Analytics (UEBA)
&
User Activity Monitoring (UAM)
Seeing
Exactly What Happened (UAM)
• Time-Capsule DVR video review
• See all onscreen actions
• Play it back like your DVR
• Export as BMP, JPG or AVI
Video Playback
Confidential
The Global Leader
Technology Financial Health
8
out of 10
7
out of 10
6
out of 10
in 110+ countries
In 3,000+ enterprises & thousands of SMBs
DeployedThe Biggest & Best
use Veriato
Confidential
Thank You!
pknight@Veriato.com

More Related Content

Similar to Veriato Counterforensics Webinar: How Insiders Evade Forensics and How to Reveal Their Hidden Tracks

InsiderThreat-2016NDITS
InsiderThreat-2016NDITSInsiderThreat-2016NDITS
InsiderThreat-2016NDITSMike Saunders
 
OWASP_Training.pptx
OWASP_Training.pptxOWASP_Training.pptx
OWASP_Training.pptx
Pradip Bhattarai
 
Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatMike Saunders
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionNicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss PreventionNicholas Davis
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionNicholas Davis
 
Database Security Presentation Why database Security is important
Database Security Presentation Why database Security is importantDatabase Security Presentation Why database Security is important
Database Security Presentation Why database Security is important
Kamruzzamansohel2
 
SCB 2013 DLP, công nghệ, và phương pháp triển khai
SCB 2013  DLP, công nghệ, và phương pháp triển khaiSCB 2013  DLP, công nghệ, và phương pháp triển khai
SCB 2013 DLP, công nghệ, và phương pháp triển khaiSecurity Bootcamp
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
APNIC
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
alex hincapie
 
Latihan9 comp-forensic-bab6
Latihan9 comp-forensic-bab6Latihan9 comp-forensic-bab6
Latihan9 comp-forensic-bab6sabtolinux
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
Ernest Staats
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
Ruban Deventhiran
 
Architecting for Security Resilience
Architecting for Security ResilienceArchitecting for Security Resilience
Architecting for Security Resilience
Joel Aleburu
 
Data security
Data securityData security
Data security
sbmiller87
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
Dhananjay Aloorkar
 
Digital forensics.abdallah
Digital forensics.abdallahDigital forensics.abdallah
Digital forensics.abdallah
ahmad abdelhafeez
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Abdallah Hodieb
 
Data protection in Practice
Data protection in PracticeData protection in Practice
Data protection in Practice
Tomppa Järvinen
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
Lalit Garg
 

Similar to Veriato Counterforensics Webinar: How Insiders Evade Forensics and How to Reveal Their Hidden Tracks (20)

InsiderThreat-2016NDITS
InsiderThreat-2016NDITSInsiderThreat-2016NDITS
InsiderThreat-2016NDITS
 
OWASP_Training.pptx
OWASP_Training.pptxOWASP_Training.pptx
OWASP_Training.pptx
 
Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-Threat
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
Database Security Presentation Why database Security is important
Database Security Presentation Why database Security is importantDatabase Security Presentation Why database Security is important
Database Security Presentation Why database Security is important
 
SCB 2013 DLP, công nghệ, và phương pháp triển khai
SCB 2013  DLP, công nghệ, và phương pháp triển khaiSCB 2013  DLP, công nghệ, và phương pháp triển khai
SCB 2013 DLP, công nghệ, và phương pháp triển khai
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
 
Latihan9 comp-forensic-bab6
Latihan9 comp-forensic-bab6Latihan9 comp-forensic-bab6
Latihan9 comp-forensic-bab6
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
 
Architecting for Security Resilience
Architecting for Security ResilienceArchitecting for Security Resilience
Architecting for Security Resilience
 
Data security
Data securityData security
Data security
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
Digital forensics.abdallah
Digital forensics.abdallahDigital forensics.abdallah
Digital forensics.abdallah
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Data protection in Practice
Data protection in PracticeData protection in Practice
Data protection in Practice
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 

More from Veriato

Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your Company
Veriato
 
What do your employees do all day? - Veriato + Digital Boardwalk
What do your employees do all day? - Veriato + Digital BoardwalkWhat do your employees do all day? - Veriato + Digital Boardwalk
What do your employees do all day? - Veriato + Digital Boardwalk
Veriato
 
Extending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterExtending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office Perimeter
Veriato
 
Monitoring a hybrid workforce - veriato and prianto
Monitoring a hybrid workforce - veriato and priantoMonitoring a hybrid workforce - veriato and prianto
Monitoring a hybrid workforce - veriato and prianto
Veriato
 
Fraud Detection With User Behavior Analytics
Fraud Detection With User Behavior AnalyticsFraud Detection With User Behavior Analytics
Fraud Detection With User Behavior Analytics
Veriato
 
The Rise of Ransomware As a Service
The Rise of Ransomware As a ServiceThe Rise of Ransomware As a Service
The Rise of Ransomware As a Service
Veriato
 
Revealing the dark web
Revealing the dark webRevealing the dark web
Revealing the dark web
Veriato
 
Monitoring employees in a remote workplace
Monitoring employees in a remote workplaceMonitoring employees in a remote workplace
Monitoring employees in a remote workplace
Veriato
 
Building an insider threat program
Building an insider threat programBuilding an insider threat program
Building an insider threat program
Veriato
 
Implementing A User Activity & Behavior Monitoring Program
Implementing A User Activity & Behavior Monitoring ProgramImplementing A User Activity & Behavior Monitoring Program
Implementing A User Activity & Behavior Monitoring Program
Veriato
 

More from Veriato (10)

Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your Company
 
What do your employees do all day? - Veriato + Digital Boardwalk
What do your employees do all day? - Veriato + Digital BoardwalkWhat do your employees do all day? - Veriato + Digital Boardwalk
What do your employees do all day? - Veriato + Digital Boardwalk
 
Extending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterExtending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office Perimeter
 
Monitoring a hybrid workforce - veriato and prianto
Monitoring a hybrid workforce - veriato and priantoMonitoring a hybrid workforce - veriato and prianto
Monitoring a hybrid workforce - veriato and prianto
 
Fraud Detection With User Behavior Analytics
Fraud Detection With User Behavior AnalyticsFraud Detection With User Behavior Analytics
Fraud Detection With User Behavior Analytics
 
The Rise of Ransomware As a Service
The Rise of Ransomware As a ServiceThe Rise of Ransomware As a Service
The Rise of Ransomware As a Service
 
Revealing the dark web
Revealing the dark webRevealing the dark web
Revealing the dark web
 
Monitoring employees in a remote workplace
Monitoring employees in a remote workplaceMonitoring employees in a remote workplace
Monitoring employees in a remote workplace
 
Building an insider threat program
Building an insider threat programBuilding an insider threat program
Building an insider threat program
 
Implementing A User Activity & Behavior Monitoring Program
Implementing A User Activity & Behavior Monitoring ProgramImplementing A User Activity & Behavior Monitoring Program
Implementing A User Activity & Behavior Monitoring Program
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

Veriato Counterforensics Webinar: How Insiders Evade Forensics and How to Reveal Their Hidden Tracks

  • 1. Confidential Patrick Knight Sr. Dir. Cyber Strategy and Product Management
  • 2. Confidential Counterforensics How Insiders Evade Forensics & How to Reveal Their Hidden Tracks
  • 3. What is Counterforensics?  aka - Anti-Forensics  Derived from Counterintelligence: “activities designed to prevent or thwart spying, intelligence gathering, and sabotage by an enemy or other foreign entity.”  Counterforensics “activities designed to prevent or thwart forensics investigations through data destruction, data and activity concealment, deception or sabotage.”
  • 4. Confidential • Hiding/concealing activities • Deception • Destroying evidence • Sabotage Counterforensics Tactics
  • 5. Hiding/Concealing Activities and Data  Steganography  Utilize common file formats/channels – hide in plain sight  File concatenation  File/data encryption  Encrypted comms channels This Photo by Unknown Author is licensed under CC BY
  • 6. Confidential  Video and image files typically are large enough to carry additional data (e.g. messages, files)  Casual viewer will never know message/data is present  Can transport encrypted messages/data  Intended recipient can be difficult to identify  Anti-virus and endpoint security typically do not scan for hidden messages Why Steganography?
  • 7. Confidential # ping -p feedfacedeadbeef Dest-B # tcpdump -i eth0 host Dest-B -x 21:03:32.601102 IP Source-A > Dest-B: icmp 64: echo request seq 56 0x0000: 4500 0054 0038 4000 4001 6e1c 4655 1fe9 E..T.8@.@.n.FU.. 0x0010: 4655 1fc2 0800 8120 5006 0038 e414 9942 FU......P..8...B 0x0020: 142a 0900 feed face dead beef feed face .*.............. 0x0030: dead beef feed face dead beef feed face ................ 0x0040: dead beef feed face dead beef feed face ................ 0x0050: dead ..  IPV4 Max Size 65535 bytes - headers = 65507 bytes for messages via ICMP Concealed message in ICMP
  • 8. Hiding Activities in Plain Sight  Google Chrome extension - Netflix Hangouts  Watch Netflix at work, while appearing to be on a conference call
  • 9. Hiding/Concealing Activities and Data: Encryption  Use of non-sanctioned encryption tools to encrypt files and data  Use encryption tools to obscure communications  Tor Browser or Tor proxy  Command line tools: OpenSSL, cryptcat
  • 10. Destroying Evidence • Deleting files • Deleting records • Overwrite/wipe files • Overwrite/wipe selective records/data • Overwrite/wipe entire disks/external media
  • 11. Deceptive Tactics  Alter timestamps/timelines  Alter logs or other data  Obfuscation of data, URLs, commands, etc.  C:>cmd.exe /c c^^a^^l^^c^^.^^e^^x^^e  Stolen credential use
  • 12. Destroying Evidence  Deleting data  Deleting browser history - incognito mode  Disk and data wiping
  • 13. Deleting Alone May Not Destroy the Data  Filesystems usually free the location of a deleted file, but do not overwrite/destro  Email servers typically free the location of a deleted email, but do not overwrite/destroy  Secure deletion can include:  Overwriting/wiping one or more times  Defragmenting  Overwriting/wiping all free and slack space  Webmail and SaaS products are typically under the control of the service provider
  • 14. Data Wiping Tools  Sdelete  KillDisk  BCWipe  Darik’s Boot and Nuke (DBAN)  Format.exe (Windows tool)  Secure Eraser  100’s more…
  • 15. Sabotage  Denial Of Service (DOS)  Intentional malware/ransomware infection  Logic/time bombs
  • 16. What can you do?  Visibility into activities when they happen  Full crime scene playback  Alert on suspicious activities  malicious application use  suspect website access  Tor Browser activity
  • 17. What can you do?  Block access to unwanted sites and network applications  Inventory sanctioned tools - know what is allowed and by whom  disk encryption  data deletion policies  cloud file storage  Employee Monitoring & User Behavior Analytics tools
  • 18. User & Entity Behavioral Analytics (UEBA) & User Activity Monitoring (UAM)
  • 19. Seeing Exactly What Happened (UAM) • Time-Capsule DVR video review • See all onscreen actions • Play it back like your DVR • Export as BMP, JPG or AVI Video Playback
  • 20. Confidential The Global Leader Technology Financial Health 8 out of 10 7 out of 10 6 out of 10 in 110+ countries In 3,000+ enterprises & thousands of SMBs DeployedThe Biggest & Best use Veriato

Editor's Notes

  1. With Veriato’s Cerebral. It’s an end to end, integrated, insider threat intelligence platform.
  2. Cerebral’s eyes on glass technology gives you immediate visibility, so you know exactly what’s going on. If the alert comes in at 9:35 am, security can immediately go back in time and cue up video of Joey’s screen from 30 minutes before the alert and watch everything he does. Is he just working on a big report or is he encrypting the data and hiding it in a PowerPoint presentation? Do you give him a raise for working hard… or call HR and the police? Now you know exactly what to do within minutes!