jai, 2004 incident response & computer forensics chapter 5 live data collection from windows...

34
Jai, 2004 Incident Response & Computer Forensics Chapter 5 Live Data Collection from Windows System formation Networking Security and Assurance Lab tional Chung Cheng University

Post on 21-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Jai, 2004

Incident Response & Computer Forensics

Chapter 5

Live Data Collection from Windows System

Information Networking Security and Assurance LabNational Chung Cheng University

Outline

PrefaceCreating a Response ToolkitStoring Information Obtained during the

Initial ResponseObtaining Volatile DataPerforming an In-Depth Live Response

Information Networking Security and Assurance LabNational Chung Cheng University

Outline

PrefaceCreating a Response ToolkitStoring Information Obtained during the

Initial ResponseObtaining Volatile DataPerforming an In-Depth Live Response

Information Networking Security and Assurance LabNational Chung Cheng University

Preface

The goal of an initial response: Confirm there is an incident Retrieve the system’s volatile data

OS: Windows NT/2000/XP

Information Networking Security and Assurance LabNational Chung Cheng University

Outline

PrefaceCreating a Response ToolkitStoring Information Obtained during the

Initial ResponseObtaining Volatile DataPerforming an In-Depth Live Response

Information Networking Security and Assurance LabNational Chung Cheng University

Preface

Don’t affecting any potential evidence Prepare a complete response toolkit

A live investigation is not the time to create or test your toolkit for the first time!!!

Information Networking Security and Assurance LabNational Chung Cheng University

cmd.exe The command prompt for Windows NT/2000/XP

Built in

PsLoggedOn A utility that shows all users connected locally and remotely

www.foundstone.com

rasusers Show which users have remote-access privilege on the target system

NT Resource Kit (NTRK)

netstat Enumerate all listening ports and all current connections to those ports

Built in

Fport Enumerate all processes that opened any TCP/IP ports on a windows NT/2000/XP

www.foundstone.com

Pslist Enumerate all running processes on the target system

www.foundstone.com

ListDLLs List all running processes (command-line argument, DLLs)

www.foundstone.com

nbtstat List the recent NetBIOS connections for approximately the last 10 mins

Built in

arp Show the MAC addresses of the systems that the target system has been communicating

Built in

kill Terminate a process NTRK

md5sum Create MD5 hashes for a given file

www.cygwin.com

rmtshare Dsiplay the shares accessible on a remote machine

NTRK

netcat Create a communication channel between two different systems

www.atstake.com/research/tools/network_utilities

cryptcat Create an encrypted channel of communication

http://Sourceforge.net/projects/cryptcat

PsLogList Dump the contents of the event logs

www.foundstone.com

ipconfig Display interface configuration information

Built in

PsInfo Collect information about the local system built

www.foundstone.com

PsFile Show files that are opened remotely

www.foundstone.com

PsService Show information about current processes and threads

www.foundstone.com

auditpol Display the current security audit settings

NTRK

doskey Display the command history for an open cmd.exe shell

Built in

Preparing the Toolkit

Label the response toolkit media Case number Time and date Name of the investigator who created the

response media Name of the investigator using the response

media

Information Networking Security and Assurance LabNational Chung Cheng University

Preparing the toolkit

Check for dependencies with Filemon Determine which DLLs and files your response t

ools depend on

Create a checksum for the response toolkit md5sum

Write-protect any toolkit floppies

Information Networking Security and Assurance LabNational Chung Cheng University

Outline

PrefaceCreating a Response ToolkitStoring Information Obtained during the

Initial ResponseObtaining Volatile DataPerforming an In-Depth Live Response

Information Networking Security and Assurance LabNational Chung Cheng University

Preface

“live”: power onFour options when retrieving information fr

om a live system The hard drive of the target system In a notebook Response floppy disk or other removable media Remote forensic system using netcat or cryptca

t

Information Networking Security and Assurance LabNational Chung Cheng University

Transferring Data with netcat

Two advantage Get on and off the target system quickly Perform an offline review

Information Networking Security and Assurance LabNational Chung Cheng University

Transferring Data with netcat

NT SystemForensic System

Time

date

loggedon

fport

pslist

nbtstat -c

123

1: Run trusted commands on NT Server

2: Send output to forensics box via netcat

3: Perform off-line review md5sum output files

Transferring Data with netcat

Forensic workstation

Target system

Information Networking Security and Assurance LabNational Chung Cheng University

Encrypting Data with cryptcat

Has the same syntax and functions as the netcat command Sniffer cannot compromise the information you

obtain Eliminates the risk of contamination or injection

of data

Two-man integrity rule

Information Networking Security and Assurance LabNational Chung Cheng University

Outline

PrefaceCreating a Response ToolkitStoring Information Obtained during the

Initial ResponseObtaining Volatile DataPerforming an In-Depth Live Response

Information Networking Security and Assurance LabNational Chung Cheng University

Preface

At minimum, volatile data prior to forensic duplication System date and time A list of the users who are currently logged on Time/date stamps for the entire file system A list of the currently running processes A list of the currently open sockets The applications listening on open sockets A list of the systems that have current or had

recent connections to the systemInformation Networking Security and Assurance LabNational Chung Cheng University

Organizing and Documenting Your Investigation

Start Time Command Line Trusted Untrusted MD5 Sum of Output

Comments

12:15:22 type lmhosts | nc 192.168.0.1 2222

X 3d2e531d.6553ee93e0890091.3857eef3

12:15:27 pslist | nc 192.168.0.1 2222

X 1ded672ba8b2ebf5beef672201003fe8

12:15:32 netstat –an | nc 192.168.0.1 2222

X 52285a23111332453efe292343857eef3

Information Networking Security and Assurance LabNational Chung Cheng University

Collecting Volatile Data

Top-ten list of the steps to use for data collection Execute a trusted cmd.exe Record the system time and date Determine who is logged in to the system (and r

emote-access users, if applicable) PsLoggedOn rasusers

Record modification, creation, and access times of all files

dir /?

Collecting Volatile Data

Determine open ports netstat

List applications associated with open ports Fport

• winpop.exeNetbus trojan• windll.exeGirlFriend trojan

List all running processes Pslist

List current and recent connections netstat arp nbtstat

Collecting Volatile Data

Record the system time and date Sandwich your data-retrieval commands between tim

e and date commands Document the commands used during initial res

ponse doskey /history

Scripting your initial response

Information Networking Security and Assurance LabNational Chung Cheng University

Outline

PrefaceCreating a Response ToolkitStoring Information Obtained during the

Initial ResponseObtaining Volatile DataPerforming an In-Depth Live Response

Preface

Find evidence and properly remove rogue programs without disrupting any services

Information Networking Security and Assurance LabNational Chung Cheng University

Creating an In-Depth Response Toolkit

auditpol Determin the audit policy on a system

NTRK

reg Dump specific information (keys) within the NT/2000 Registry

NTRK

regdump Dump the Registry as a text file NTRK

pwdump3e Dump the SAM database so that the passwords can be cracked

www.polivec.com/pwdump3.html

NTLast Monitor successful and failed logons to a system

www.foundstone.com

Sfind Detect files hidden within NTFS file streams

www.foundstone.com

Afind Search a file system to determine files accessed during specific timeframes

www.foundstone.com

dumpel Dump the NT/2000 event logs NTRK

Collecting Live Response Data

Two key sources of evidence on Windows NT/2000 The event logs The Registry

Four approach to obtain quite a bit of information Review the event logs Review the Registry Obtain system passwords Dump system RAM

Review the event logs

auditpolNTLastdumpel

Information Networking Security and Assurance LabNational Chung Cheng University

Successful logonsInformation Networking Security and Assurance LabNational Chung Cheng University

Enumerate failed console logons

Information Networking Security and Assurance LabNational Chung Cheng University

List all successful logons from remote systems

Information Networking Security and Assurance LabNational Chung Cheng University

Review the Registry

regdump Create an enormous text file of the Registry

reg query Extract just the Registry key values of interest

Information Networking Security and Assurance LabNational Chung Cheng University

Obtaining System Passwords

pwdump3e Dump the passwords from the Security

Accounts Manager (SAM) database

Information Networking Security and Assurance LabNational Chung Cheng University

Dumping System RAM

userdump.exe (MS OEM Support Tools)Two types of memory

User mode (application) memory Full-system memory

Information Networking Security and Assurance LabNational Chung Cheng University