jai, 2004 incident response & computer forensics chapter 5 live data collection from windows...
Post on 21-Dec-2015
215 views
TRANSCRIPT
Jai, 2004
Incident Response & Computer Forensics
Chapter 5
Live Data Collection from Windows System
Information Networking Security and Assurance LabNational Chung Cheng University
Outline
PrefaceCreating a Response ToolkitStoring Information Obtained during the
Initial ResponseObtaining Volatile DataPerforming an In-Depth Live Response
Information Networking Security and Assurance LabNational Chung Cheng University
Outline
PrefaceCreating a Response ToolkitStoring Information Obtained during the
Initial ResponseObtaining Volatile DataPerforming an In-Depth Live Response
Information Networking Security and Assurance LabNational Chung Cheng University
Preface
The goal of an initial response: Confirm there is an incident Retrieve the system’s volatile data
OS: Windows NT/2000/XP
Information Networking Security and Assurance LabNational Chung Cheng University
Outline
PrefaceCreating a Response ToolkitStoring Information Obtained during the
Initial ResponseObtaining Volatile DataPerforming an In-Depth Live Response
Information Networking Security and Assurance LabNational Chung Cheng University
Preface
Don’t affecting any potential evidence Prepare a complete response toolkit
A live investigation is not the time to create or test your toolkit for the first time!!!
Information Networking Security and Assurance LabNational Chung Cheng University
cmd.exe The command prompt for Windows NT/2000/XP
Built in
PsLoggedOn A utility that shows all users connected locally and remotely
www.foundstone.com
rasusers Show which users have remote-access privilege on the target system
NT Resource Kit (NTRK)
netstat Enumerate all listening ports and all current connections to those ports
Built in
Fport Enumerate all processes that opened any TCP/IP ports on a windows NT/2000/XP
www.foundstone.com
Pslist Enumerate all running processes on the target system
www.foundstone.com
ListDLLs List all running processes (command-line argument, DLLs)
www.foundstone.com
nbtstat List the recent NetBIOS connections for approximately the last 10 mins
Built in
arp Show the MAC addresses of the systems that the target system has been communicating
Built in
kill Terminate a process NTRK
md5sum Create MD5 hashes for a given file
www.cygwin.com
rmtshare Dsiplay the shares accessible on a remote machine
NTRK
netcat Create a communication channel between two different systems
www.atstake.com/research/tools/network_utilities
cryptcat Create an encrypted channel of communication
http://Sourceforge.net/projects/cryptcat
PsLogList Dump the contents of the event logs
www.foundstone.com
ipconfig Display interface configuration information
Built in
PsInfo Collect information about the local system built
www.foundstone.com
PsFile Show files that are opened remotely
www.foundstone.com
PsService Show information about current processes and threads
www.foundstone.com
auditpol Display the current security audit settings
NTRK
doskey Display the command history for an open cmd.exe shell
Built in
Preparing the Toolkit
Label the response toolkit media Case number Time and date Name of the investigator who created the
response media Name of the investigator using the response
media
Information Networking Security and Assurance LabNational Chung Cheng University
Preparing the toolkit
Check for dependencies with Filemon Determine which DLLs and files your response t
ools depend on
Create a checksum for the response toolkit md5sum
Write-protect any toolkit floppies
Information Networking Security and Assurance LabNational Chung Cheng University
Outline
PrefaceCreating a Response ToolkitStoring Information Obtained during the
Initial ResponseObtaining Volatile DataPerforming an In-Depth Live Response
Information Networking Security and Assurance LabNational Chung Cheng University
Preface
“live”: power onFour options when retrieving information fr
om a live system The hard drive of the target system In a notebook Response floppy disk or other removable media Remote forensic system using netcat or cryptca
t
Information Networking Security and Assurance LabNational Chung Cheng University
Transferring Data with netcat
Two advantage Get on and off the target system quickly Perform an offline review
Information Networking Security and Assurance LabNational Chung Cheng University
Transferring Data with netcat
NT SystemForensic System
Time
date
loggedon
fport
pslist
nbtstat -c
123
1: Run trusted commands on NT Server
2: Send output to forensics box via netcat
3: Perform off-line review md5sum output files
Transferring Data with netcat
Forensic workstation
Target system
Information Networking Security and Assurance LabNational Chung Cheng University
Encrypting Data with cryptcat
Has the same syntax and functions as the netcat command Sniffer cannot compromise the information you
obtain Eliminates the risk of contamination or injection
of data
Two-man integrity rule
Information Networking Security and Assurance LabNational Chung Cheng University
Outline
PrefaceCreating a Response ToolkitStoring Information Obtained during the
Initial ResponseObtaining Volatile DataPerforming an In-Depth Live Response
Information Networking Security and Assurance LabNational Chung Cheng University
Preface
At minimum, volatile data prior to forensic duplication System date and time A list of the users who are currently logged on Time/date stamps for the entire file system A list of the currently running processes A list of the currently open sockets The applications listening on open sockets A list of the systems that have current or had
recent connections to the systemInformation Networking Security and Assurance LabNational Chung Cheng University
Organizing and Documenting Your Investigation
Start Time Command Line Trusted Untrusted MD5 Sum of Output
Comments
12:15:22 type lmhosts | nc 192.168.0.1 2222
X 3d2e531d.6553ee93e0890091.3857eef3
12:15:27 pslist | nc 192.168.0.1 2222
X 1ded672ba8b2ebf5beef672201003fe8
12:15:32 netstat –an | nc 192.168.0.1 2222
X 52285a23111332453efe292343857eef3
Information Networking Security and Assurance LabNational Chung Cheng University
Collecting Volatile Data
Top-ten list of the steps to use for data collection Execute a trusted cmd.exe Record the system time and date Determine who is logged in to the system (and r
emote-access users, if applicable) PsLoggedOn rasusers
Record modification, creation, and access times of all files
dir /?
Collecting Volatile Data
Determine open ports netstat
List applications associated with open ports Fport
• winpop.exeNetbus trojan• windll.exeGirlFriend trojan
List all running processes Pslist
List current and recent connections netstat arp nbtstat
Collecting Volatile Data
Record the system time and date Sandwich your data-retrieval commands between tim
e and date commands Document the commands used during initial res
ponse doskey /history
Scripting your initial response
Information Networking Security and Assurance LabNational Chung Cheng University
Outline
PrefaceCreating a Response ToolkitStoring Information Obtained during the
Initial ResponseObtaining Volatile DataPerforming an In-Depth Live Response
Preface
Find evidence and properly remove rogue programs without disrupting any services
Information Networking Security and Assurance LabNational Chung Cheng University
Creating an In-Depth Response Toolkit
auditpol Determin the audit policy on a system
NTRK
reg Dump specific information (keys) within the NT/2000 Registry
NTRK
regdump Dump the Registry as a text file NTRK
pwdump3e Dump the SAM database so that the passwords can be cracked
www.polivec.com/pwdump3.html
NTLast Monitor successful and failed logons to a system
www.foundstone.com
Sfind Detect files hidden within NTFS file streams
www.foundstone.com
Afind Search a file system to determine files accessed during specific timeframes
www.foundstone.com
dumpel Dump the NT/2000 event logs NTRK
Collecting Live Response Data
Two key sources of evidence on Windows NT/2000 The event logs The Registry
Four approach to obtain quite a bit of information Review the event logs Review the Registry Obtain system passwords Dump system RAM
Review the event logs
auditpolNTLastdumpel
Information Networking Security and Assurance LabNational Chung Cheng University
Enumerate failed console logons
Information Networking Security and Assurance LabNational Chung Cheng University
List all successful logons from remote systems
Information Networking Security and Assurance LabNational Chung Cheng University
Review the Registry
regdump Create an enormous text file of the Registry
reg query Extract just the Registry key values of interest
Information Networking Security and Assurance LabNational Chung Cheng University
Obtaining System Passwords
pwdump3e Dump the passwords from the Security
Accounts Manager (SAM) database
Information Networking Security and Assurance LabNational Chung Cheng University