live data collection_from_windows_system

34
Jai, 2004 Incident Response & Computer Forensics Chapter 5 Live Data Collection from Windows System Information Networking Security and Assurance Lab National Chung Cheng University

Upload: maceni-muse

Post on 14-Jul-2015

200 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Live data collection_from_windows_system

Jai, 2004

Incident Response & Computer Forensics

Chapter 5

Live Data Collection from Windows System

Information Networking Security and Assurance LabNational Chung Cheng University

Page 2: Live data collection_from_windows_system

Outline

PrefaceCreating a Response ToolkitStoring Information Obtained during the

Initial ResponseObtaining Volatile DataPerforming an In-Depth Live Response

Information Networking Security and Assurance LabNational Chung Cheng University

Page 3: Live data collection_from_windows_system

Outline

PrefaceCreating a Response ToolkitStoring Information Obtained during the

Initial ResponseObtaining Volatile DataPerforming an In-Depth Live Response

Information Networking Security and Assurance LabNational Chung Cheng University

Page 4: Live data collection_from_windows_system

Preface

The goal of an initial response: Confirm there is an incident Retrieve the system’s volatile data

OS: Windows NT/2000/XP

Information Networking Security and Assurance LabNational Chung Cheng University

Page 5: Live data collection_from_windows_system

Outline

PrefaceCreating a Response ToolkitStoring Information Obtained during the

Initial ResponseObtaining Volatile DataPerforming an In-Depth Live Response

Information Networking Security and Assurance LabNational Chung Cheng University

Page 6: Live data collection_from_windows_system

Preface

Don’t affecting any potential evidence Prepare a complete response toolkit

A live investigation is not the time to create or test your toolkit for the first time!!!

Information Networking Security and Assurance LabNational Chung Cheng University

Page 7: Live data collection_from_windows_system

cmd.exe The command prompt for Windows NT/2000/XP

Built in

PsLoggedOn A utility that shows all users connected locally and remotely

www.foundstone.com

rasusers Show which users have remote-access privilege on the target system

NT Resource Kit (NTRK)

netstat Enumerate all listening ports and all current connections to those ports

Built in

Fport Enumerate all processes that opened any TCP/IP ports on a windows NT/2000/XP

www.foundstone.com

Pslist Enumerate all running processes on the target system

www.foundstone.com

ListDLLs List all running processes (command-line argument, DLLs)

www.foundstone.com

nbtstat List the recent NetBIOS connections for approximately the last 10 mins

Built in

arp Show the MAC addresses of the systems that the target system has been communicating

Built in

kill Terminate a process NTRK

Page 8: Live data collection_from_windows_system

md5sum Create MD5 hashes for a given file

www.cygwin.com

rmtshare Dsiplay the shares accessible on a remote machine

NTRK

netcat Create a communication channel between two different systems

www.atstake.com/research/tools/network_utilities

cryptcat Create an encrypted channel of communication

http://Sourceforge.net/projects/cryptcat

PsLogList Dump the contents of the event logs

www.foundstone.com

ipconfig Display interface configuration information

Built in

PsInfo Collect information about the local system built

www.foundstone.com

PsFile Show files that are opened remotely

www.foundstone.com

PsService Show information about current processes and threads

www.foundstone.com

auditpol Display the current security audit settings

NTRK

doskey Display the command history for an open cmd.exe shell

Built in

Page 9: Live data collection_from_windows_system

Preparing the Toolkit

Label the response toolkit media Case number Time and date Name of the investigator who created the

response media Name of the investigator using the response

media

Information Networking Security and Assurance LabNational Chung Cheng University

Page 10: Live data collection_from_windows_system

Preparing the toolkit

Check for dependencies with Filemon Determine which DLLs and files your response

tools depend on

Create a checksum for the response toolkit md5sum

Write-protect any toolkit floppies

Information Networking Security and Assurance LabNational Chung Cheng University

Page 11: Live data collection_from_windows_system
Page 12: Live data collection_from_windows_system

Outline

PrefaceCreating a Response ToolkitStoring Information Obtained during the

Initial ResponseObtaining Volatile DataPerforming an In-Depth Live Response

Information Networking Security and Assurance LabNational Chung Cheng University

Page 13: Live data collection_from_windows_system

Preface

“live”: power onFour options when retrieving information

from a live system The hard drive of the target system In a notebook Response floppy disk or other removable media Remote forensic system using netcat or

cryptcat

Information Networking Security and Assurance LabNational Chung Cheng University

Page 14: Live data collection_from_windows_system

Transferring Data with netcat

Two advantage Get on and off the target system quickly Perform an offline review

Information Networking Security and Assurance LabNational Chung Cheng University

Page 15: Live data collection_from_windows_system

Transferring Data with netcat

NT SystemForensic System

Time

date

loggedon

fport

pslist

nbtstat -c

123

1: Run trusted commands on NT Server

2: Send output to forensics box via netcat

3: Perform off-line review md5sum output files

Page 16: Live data collection_from_windows_system

Transferring Data with netcat

Forensic workstation

Target system

Information Networking Security and Assurance LabNational Chung Cheng University

Page 17: Live data collection_from_windows_system

Encrypting Data with cryptcat

Has the same syntax and functions as the netcat command Sniffer cannot compromise the information you

obtain Eliminates the risk of contamination or injection

of data

Two-man integrity rule

Information Networking Security and Assurance LabNational Chung Cheng University

Page 18: Live data collection_from_windows_system

Outline

PrefaceCreating a Response ToolkitStoring Information Obtained during the

Initial ResponseObtaining Volatile DataPerforming an In-Depth Live Response

Information Networking Security and Assurance LabNational Chung Cheng University

Page 19: Live data collection_from_windows_system

Preface

At minimum, volatile data prior to forensic duplication System date and time A list of the users who are currently logged on Time/date stamps for the entire file system A list of the currently running processes A list of the currently open sockets The applications listening on open sockets A list of the systems that have current or had

recent connections to the systemInformation Networking Security and Assurance LabNational Chung Cheng University

Page 20: Live data collection_from_windows_system

Organizing and Documenting Your Investigation

Start Time Command Line Trusted Untrusted MD5 Sum of Output

Comments

12:15:22 type lmhosts | nc 192.168.0.1 2222

X 3d2e531d.6553ee93e0890091.3857eef3

12:15:27 pslist | nc 192.168.0.1 2222

X 1ded672ba8b2ebf5beef672201003fe8

12:15:32 netstat –an | nc 192.168.0.1 2222

X 52285a23111332453efe292343857eef3

Information Networking Security and Assurance LabNational Chung Cheng University

Page 21: Live data collection_from_windows_system

Collecting Volatile Data

Top-ten list of the steps to use for data collection Execute a trusted cmd.exe Record the system time and date Determine who is logged in to the system (and

remote-access users, if applicable) PsLoggedOn rasusers

Record modification, creation, and access times of all files

dir /?

Page 22: Live data collection_from_windows_system

Collecting Volatile Data

Determine open ports netstat

List applications associated with open ports Fport

• winpop.exeNetbus trojan• windll.exeGirlFriend trojan

List all running processes Pslist

List current and recent connections netstat arp nbtstat

Page 23: Live data collection_from_windows_system

Collecting Volatile Data

Record the system time and date Sandwich your data-retrieval commands between

time and date commands

Document the commands used during initial response

doskey /history

Scripting your initial response

Information Networking Security and Assurance LabNational Chung Cheng University

Page 24: Live data collection_from_windows_system

Outline

PrefaceCreating a Response ToolkitStoring Information Obtained during the

Initial ResponseObtaining Volatile DataPerforming an In-Depth Live Response

Page 25: Live data collection_from_windows_system

Preface

Find evidence and properly remove rogue programs without disrupting any services

Information Networking Security and Assurance LabNational Chung Cheng University

Page 26: Live data collection_from_windows_system

Creating an In-Depth Response Toolkit

auditpol Determin the audit policy on a system

NTRK

reg Dump specific information (keys) within the NT/2000 Registry

NTRK

regdump Dump the Registry as a text file NTRK

pwdump3e Dump the SAM database so that the passwords can be cracked

www.polivec.com/pwdump3.html

NTLast Monitor successful and failed logons to a system

www.foundstone.com

Sfind Detect files hidden within NTFS file streams

www.foundstone.com

Afind Search a file system to determine files accessed during specific timeframes

www.foundstone.com

dumpel Dump the NT/2000 event logs NTRK

Page 27: Live data collection_from_windows_system

Collecting Live Response Data

Two key sources of evidence on Windows NT/2000 The event logs The Registry

Four approach to obtain quite a bit of information Review the event logs Review the Registry Obtain system passwords Dump system RAM

Page 28: Live data collection_from_windows_system

Review the event logs

auditpolNTLastdumpel

Information Networking Security and Assurance LabNational Chung Cheng University

Page 29: Live data collection_from_windows_system

Successful logonsInformation Networking Security and Assurance LabNational Chung Cheng University

Page 30: Live data collection_from_windows_system

Enumerate failed console logons

Information Networking Security and Assurance LabNational Chung Cheng University

Page 31: Live data collection_from_windows_system

List all successful logons from remote systems

Information Networking Security and Assurance LabNational Chung Cheng University

Page 32: Live data collection_from_windows_system

Review the Registry

regdump Create an enormous text file of the Registry

reg query Extract just the Registry key values of interest

Information Networking Security and Assurance LabNational Chung Cheng University

Page 33: Live data collection_from_windows_system

Obtaining System Passwords

pwdump3e Dump the passwords from the Security

Accounts Manager (SAM) database

Information Networking Security and Assurance LabNational Chung Cheng University

Page 34: Live data collection_from_windows_system

Dumping System RAM

userdump.exe (MS OEM Support Tools)Two types of memory

User mode (application) memory Full-system memory

Information Networking Security and Assurance LabNational Chung Cheng University