forensic analysis : using tsk and volatility

17
Forensic Analysis : using TSK and Volatility

Upload: necia

Post on 23-Feb-2016

62 views

Category:

Documents


1 download

DESCRIPTION

Forensic Analysis : using TSK and Volatility. A bit about Me. Mark Bennett Work for Check Point Software. Incident Response/Forensics for Health Care Firewalls Malware analysis Intrusion Prevention HR/Legal Watching over the enterprise SANS Instructor http://www.sans.org - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Forensic  Analysis  : using TSK and Volatility

Forensic Analysis :using TSK and Volatility

Page 2: Forensic  Analysis  : using TSK and Volatility

A bit about Me• Mark Bennett

• Work for Check Point Software.

• Incident Response/Forensics for Health Care– Firewalls– Malware analysis– Intrusion Prevention– HR/Legal– Watching over the enterprise

• SANS Instructor– http://www.sans.org– http://www.darknet-consulting.com– http://www.pauldotcom.com

Page 3: Forensic  Analysis  : using TSK and Volatility

Agenda• Metasploit

– How to use it– What can you do with it

• Making Forensic copies– Copying memory– Copy Hard drive

• Timeline analysis– How to create– How to read

• Memory analysis– Strings– Volatility

• See it live• Wrap up

Page 4: Forensic  Analysis  : using TSK and Volatility
Page 5: Forensic  Analysis  : using TSK and Volatility

Metasploit

Page 6: Forensic  Analysis  : using TSK and Volatility

Metasploit – cont.

Page 7: Forensic  Analysis  : using TSK and Volatility

Mandiant Memoryze

Page 8: Forensic  Analysis  : using TSK and Volatility

Using dd for bit-by-bit copies

Page 9: Forensic  Analysis  : using TSK and Volatility

fls - bodyfile

Page 10: Forensic  Analysis  : using TSK and Volatility

mactime - timeline

Page 11: Forensic  Analysis  : using TSK and Volatility

Timeline Analysis

Page 12: Forensic  Analysis  : using TSK and Volatility

Memory Analysis

Page 13: Forensic  Analysis  : using TSK and Volatility

Volatility – memory analysis

Page 14: Forensic  Analysis  : using TSK and Volatility

Live Demo

Let’s Do it for Real!!!

Page 15: Forensic  Analysis  : using TSK and Volatility

Questions/Comments

??????????????????????????????????

Page 16: Forensic  Analysis  : using TSK and Volatility

Wrap UP

• Mark Bennett– http://www.sans.org/mentor

• 508 Advanced Forensic Analysis• 408 Windows Forensics• 504 Incident Response

– http://www.darknet-consulting.com– http://www.pauldotcom.com– Hack Labs – Metasploit

• Be good, be safe, if you are going to hack, hack legally and responsibly – I’m Out!

Page 17: Forensic  Analysis  : using TSK and Volatility

THANK YOU FOR ATTENDING