using memory dumps in digital forensics
|
|
|
- Maude Pearson
- 10 years ago
- Views:
Transcription
1 SAM STOVER AND MATT DICKERSON using memory dumps in digital forensics Stover is an independent security researcher with experience in network- and host-based forensics. Matt Dickerson works as a network security engineer for LMIT. He tests malicious software for detectability at the host and network level. [email protected] AS WITH ANY TECHNOLOGY DESIGNED to detect malicious activity (e.g., intrusion detection, burglar alarms, etc.), digital media investigation is a constant struggle to keep up. Common tools such as EnCase, The Coroners Toolkit (TCT), and The Sleuth Kit (TSK) have limitations that crackers are taking advantage of. While these tools have become adept at finding evidence on a non-volatile storage device such as a hard drive that has been physically removed (i.e., a dead analysis), volatile information, specifically memory, is much more difficult to investigate. However, there is a remarkable amount of data present in memory to date there is no way to implement a process/activity on a computer without leaving a footprint in memory. For example, a cracker compromises a server, installs a rootkit, then secure-deletes unnecessary files (i.e., via SRM or PGP Shred) from the hard drive. At this point, if the power cord is yanked and the hard drive imaged, evidence of the rootkit will be that much harder to find with the aforementioned tools. This article will attempt to give an admin faced with a potential rootkit, live investigative methods that could be undertaken prior to a dead analysis. Keep in mind that dead analysis in this case means powering off the machine (either cleanly or by yanking the power cord) and imaging the hard drive. We ll be imaging memory and analyzing it offline, but the target system will not be powered off. Note that the authors are not promoting a deviation from a dead analysis. Offline hard drive searches are still the number one way to find evidence. However, as previously stated, there are circumstances where the hard drive doesn t contain the evidence you are looking for. In those cases, here are two methods you can use to examine volatile data. UNIX UNIX offers fairly straightforward memory access via the /proc virtual file system, and /proc/kcore allows inventive strings-ing, such as the following hack ;LO GIN: DECEMBER 2005 USING MEMORY DUMPS IN DIGITAL FORENSICS 43
2 which generically lists all loaded kernel modules (LKMs) in Linux (tested 2.4 kernel only): #! /usr/bin/perl use strict; use warnings; open(fh, strings /proc/kcore ) die Could not open /proc/kcore for reading ; my %data; while (<FH>) { next unless / insmod/ && /_S.text/; next if /\// /\ /; my $raw = (split / insmod_/, $_)[1]; my $module = (split /_S\./,$raw)[0]; $data{ $module }++; } for my $key (keys %data) { print $key, \n ; } While this is a primitive method to list loaded modules, it also lists hidden LKMs such as Team Teso s adore (compare the output with Linux lsmod the differences are hidden modules). Hacks like this can provide a UNIX system administrator with a quick first pass to determine if the machine in question has an LKM rootkit. Windows memory is handled by the OS in a fashion that does not lend itself to live analysis per se, but one technique that works rather well is the capability of the Helix LiveCD ( to do a live capture of physical memory. This is accomplished by using a trusted dd executable on the CD, and the resulting file can be analyzed on a separate machine. For this investigation, we used the HackerDefender rootkit ( and the Optix back door ( as the targets of our examples. A dd image of the physical memory was taken prior to the loading of each tool, then immediately after. The images were then compared via hex/binary editor to determine if either tool had left any residue in memory. While it would be impossible for a second investigator to analyze the live machine at a later time and obtain an exact copy of the dd image collected (i.e., identical md5sums), if the acquisition process is not found to be faulty, both defense and prosecution could analyze the exact same dd image were this evidence to go to court. dd images can be imported into any number of forensic analysis tools, but to demonstrate that any admin can do a cursory examination, the bvi hex editor ( was used. Any hex editor with basic search capability should be sufficient to do a quick analysis of a memory dump image file. HackerDefender A Windows 2000 Advanced Server SP4 system was booted up, and the Helix CD inserted. The main Helix screen appeared automatically, and the Live Acquisition option was chosen. The amount of time it takes to dd is dependent upon how much memory you have. This particular system only had 256M, and it took just under six minutes. Once the imaging completed successfully, we installed HackerDefender (HD). One nice feature of HD is that it automatically hides the directory it was installed from, so you know it is working properly. Once we saw the folder disappear from Explorer we reran the memory dump, and six minutes later we had two dd images to compare. 44 ;LO GIN: V OL. 30, NO. 6
3 Our theory was that there would not be any evidence of HD in memory in the pristine baseline image, which turned out to be accurate. We searched for the strings hxdef and HXDEF and found nothing. Upon examining the image with HD loaded into memory, we found rather different results. The first hit shows the location of the HD executable, plus the excerpt powerful NT rootkit, which is from the HXDEF100.INI file: 0112E F C 20 4E F 6F 74 powerful NT root 0112E620 6B kit.hxd Service 0112E FF 01 0F E F F E A 5C 54 4F 4F 4C 5A 5F 7E 32 5C G:\TOOLZ_~2\HXDE 0112E C E F\HXDEF100.EXE.. This finding is notable for two reasons. First, since we did not view the HXDEF100.INI file, nor was that excerpt found in the baseline image, it seems logical that this is a remnant from loading the rootkit into memory. Second, the full path of the installation executable we used to install HD was G:\toolz_win\HXDEF\hxdef100.exe, most of which is clearly present in the block shown. In this experiment, both Optix and HD were installed from a USB drive, to limit the footprint on the hard drive. In a real-world scenario, an investigator would know that the G: drive corresponds to a USB drive, which would indicate that the attacker had physical access to the machine. Physical vs. remote access is a rather important piece of information, and it is highly unlikely that this path would be found in an examination of the hard drive alone. Continuing the search, we find another excerpt from the HXDEF100.INI file, as well as mention of the HD driver hxdefdrv.sys. (Note that only the ASCII portion of the output will be shown in the rest of the examples.)...erdrv100..d: riv>erfilenam/e= hxdefdrv.sys.....>v ic:ed escr<ip:t ion=powerful NT rootkit..dri<ve \rn:ame=hackerde fend... There were numerous other findings for the strings HXDEF and hxdef, some of which were exact duplicates of what we ve shown here, the rest similar. There is enough evidence in the image file to indicate that the contents of memory can be a useful place to look when suspicious of a rootkit. In fact, some of the evidence would never be found in a dead analysis of this system. Optix Back doors differ from rootkits and in fact are usually designed to work in conjunction with a rootkit. For example, most back doors do not hide files that is the responsibility of the rootkit. What back-door programs do very well is open a port, giving an attacker easy return access. Optix is no different in this regard, and must be loaded into memory in order to function. ;LO GIN: DECEMBER 2005 USING MEMORY DUMPS IN DIGITAL FORENSICS 45
4 Our hypothesis, identical to that for HD, was that we would find no evidence of Optix in the baseline image. This was confirmed; there were no hits when searching for the strings optix and OPTIX in the baseline image, as there were after the tool was loaded. As with HD, the Optix image showed the path for the installation executable: \0.toolz_win.TOO LZ_~ uw0.optix undete.optixu~1. Again, it is important to note that this important piece of evidence would probably not be found in a dead analysis. Further findings were even more interesting than HD, as Optix is a bit more invasive out of the box. Another hit on this image showed an HTTP GET request to an IRC server, with embedded information advertising that this machine is infected: GET /wwp/msg/1,,,00.html?uin= &Name=Joe+ Bloggs+is+online +from+optix+pro+ v1.0.%0aip:+[ ]%0AP ort:+3410%0apwd: +<NO+PASSWORD>%0 AUserName:+Admin istrator%0aconne ctiontype:+unkno wn%0a%0a&send=ye s HTTP/1.1..Host : web.icq.com..c onnection: Keep- Alive... This type of entry and certain variants were very common in this memory dump. A more complete example, and possibly the most interesting find, starts at byte offset 015B77B0 and ends at offset 015B7B30. Since this block is so large, we ll focus on the individual pieces broken into text format. This is an intact HTTP return code 302 from an Apache Web server, stating that the document requested is located at a different URL, but was found: HTTP/ Found Date: Thu, 22 Sep :29:50 GMT Server: Apache The document requested was popup.php, which was passed arguments to announce that Joe Bloggs has connected to via Optix. The administrator account is to be used for return access to the back-doored system (which has an IP address of ), and there is no password required to make a connection: Location: Joe+Bloggs+is+online+from+Optix+Pro+v1.0.%250AIP:+%5b %5d%250APort:+3410%250APwd:+%3cNO+ PASSWORD%3e%250AUserName:+Administrator%250A ConnectionType:+Unknown%250A%250A&Send=yes 46 ;LO GIN: V OL. 30, NO. 6
5 There were numerous Keep-Alive entries within the image. The next example has a spooll32.exe reference ( spooll32.exe is the default name of the Optix server executable): Spooll32.exe.poo `...`...GET /wwp/msg/1,,,00. html?uin= &Name=Joe+Blog gs+is+online+fro m+optix+pro+v1.0 <remainder of Keep-Alive snipped for brevity> The last search hit was found entirely by accident, as it contains neither the optix nor OPTIX strings. It does, however, give an address (joe@ hotmail.com) and lists a different URL than we ve seen before ( com... Optix Pro v1.0.. <snipped for brevity>... nycgihost.com/cg i-bin/subseven.c gi... <snipped for brevity>......action=l og&ip=[ipaddress ]&port=[serverpo RT]&id=[VICTIMNA ME]&win=[WINUSER NAME]&rpass=[SER VERPASSWORD]&con nection=[connect IONTYPE]&s7pass= [SCRIPTPASSWORD] This is interesting not only because of the different URL, but that the SubSeven back door was mentioned. This appears to be a CGI script that takes input such as IP address, port, username, password, etc., and logs it for later retrieval, as opposed to posting this information to an ICQ channel as we saw in a previous example. This is a representative sample of the findings for the strings optix and OPTIX, but a normal investigation would progress to searching for other strings, such as joe, bloggs, spooll32.exe, etc. Conclusion The point of the Helix exercise was not to demonstrate all the possible ways to find HackerDefender or Optix, but simply to show that there is value in examining physical memory before pulling the plug and imaging the hard drive for a dead analysis. Further, although not quite the same as grepping/strings-ing through /proc or kcore in *NIX, there is a method for conducting this type of search in the Windows environment. Although we have not tested to determine whether or not the techniques shown here would have an effect on the hard drive data, it would seem to be a minimal impact, if any. It is possible that the swapfile might change as a result of taking a dd image, but as long as the image is saved on a different physical device, the ;LO GIN: DECEMBER 2005 USING MEMORY DUMPS IN DIGITAL FORENSICS 47
6 modification of the suspect hard drive should be minimal. If courtroom evidence is of the utmost concern, law enforcement may be involved, which could preclude any type of live analysis. If this is not the case, and a quick live analysis is possible, it seems remiss not to examine /proc (*NIX) or take an image of the physical memory for later examination (Windows). Are the techniques shown here silver bullets to all rootkit and back-door contaminations? Of course not. They are simply methods that should not be overlooked when you suspect malicious activity. A caveat: in using these methods, as with most forensics and/or incident response, you have to know what you are looking for. The authors were fortunate in this case to know what programs were loaded, and so had a head start on what strings to search for. In the wild, this will probably not be the case, unless intrusion detection system (IDS), firewall, syslog, etc., events provide insight into the type of attack performed. It is quite plain in the Windows memory dump, however, that certain strings might be common to any back door or rootkit. For example, any back door looking to connect to an ICQ server or Web server might put the string icq or http into memory Unicode notwithstanding. Further complicating matters, the test system was a virgin install, so the contents of memory were significantly more static than, say. a corporate server. Also keep in mind that the authors are not lawyers or law enforcement personnel. Always assume that any investigation could ultimately end up in court, and verify that live analysis of the potential system is acceptable before trying these techniques. REFERENCES Michael Ford s Linux Memory Forensics ( sam0403e/0403e.htm) covers Linux memory forensics using methods analogous to those in this article. Adore at PacketStorm: Helix by e-fense: Hacker Defender by rootkit.com: Optix by Evil Eye Software: 48 ;LO GIN: V OL. 30, NO. 6
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
Worms, Trojan Horses and Root Kits
Worms, Trojan Horses and Root Kits Worms A worm is a type of Virus that is capable of spreading and replicating itself autonomously over the internet. Famous Worms Morris Internet worm (1988) Currently:
Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com
Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices
Unix/Linux Forensics 1
Unix/Linux Forensics 1 Simple Linux Commands date display the date ls list the files in the current directory more display files one screen at a time cat display the contents of a file wc displays lines,
UNMASKCONTENT: THE CASE STUDY
DIGITONTO LLC. UNMASKCONTENT: THE CASE STUDY The mystery UnmaskContent.com v1.0 Contents I. CASE 1: Malware Alert... 2 a. Scenario... 2 b. Data Collection... 2 c. Data Aggregation... 3 d. Data Enumeration...
Computing forensics: a live analysis
April 18th, 2005 1 2 3 Objectives Evidence acquisition Recovery and examination of suspect digital evidence (think Warrick Brown on CSI) Hardware: servers, workstations, laptops, PDAs, mobiles, cameras
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)
s Unix Definition of : Computer Coherent application of a methodical investigatory techniques to solve crime cases. Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM) s Unix
E-Commerce for IT Advanced. Louis Aguila & Matt Burt
Advanced Louis Aguila & Matt Burt Class Objectives To explore Microsoft Internet Information Services (IIS) use and troubleshooting Basic E-Commerce site setup in IIS Use of Application Pools and settings
Digital Forensics Tutorials Acquiring an Image with Kali dcfldd
Digital Forensics Tutorials Acquiring an Image with Kali dcfldd Explanation Section Disk Imaging Definition Disk images are used to transfer a hard drive s contents for various reasons. A disk image can
Security Incident Investigation
Security Incident Investigation Mingchao Ma STFC RAL, UK HEPSYSMAN Workshop 10 th June 2010 Overview Security incident handling lifecycle Based on NIST SP800-61rev1 recommendation http://csrc.nist.gov/publications/nistpubs/800-61-rev1/sp800-61rev1.pdf
Desktop : Ubuntu 10.04 Desktop, Ubuntu 12.04 Desktop Server : RedHat EL 5, RedHat EL 6, Ubuntu 10.04 Server, Ubuntu 12.04 Server, CentOS 5, CentOS 6
201 Datavoice House, PO Box 267, Stellenbosch, 7599 16 Elektron Avenue, Technopark, Tel: +27 218886500 Stellenbosch, 7600 Fax: +27 218886502 Adept Internet (Pty) Ltd. Reg. no: 1984/01310/07 VAT No: 4620143786
Chapter 2 Editor s Note:
[Editor s Note: The following content was excerpted from the free ebook The Tips and Tricks Guide to Securing Windows Server 2003 (Realtimepublishers.com) written by Roberta Bragg and available at http://www.netiq.com/offers/ebooks.]
IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection
IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection Description Lab flow At the end of this lab, you should be able to Discover how to harness the power and capabilities
Network Incident Report
To submit copies of this form via facsimile, please FAX to 202-406-9233. Network Incident Report United States Secret Service Financial Crimes Division Electronic Crimes Branch Telephone: 202-406-5850
Forensic Acquisition and Analysis of VMware Virtual Hard Disks
Forensic Acquisition and Analysis of VMware Virtual Hard Disks Manish Hirwani, Yin Pan, Bill Stackpole and Daryl Johnson Networking, Security and Systems Administration Rochester Institute of Technology
Digital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix
Honeynet2_bookTOC.fm Page vii Monday, May 3, 2004 12:00 PM Contents Preface Foreword xix xxvii P ART I THE HONEYNET 1 Chapter 1 The Beginning 3 The Honeynet Project 3 The Information Security Environment
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
The Value of Physical Memory for Incident Response
The Value of Physical Memory for Incident Response MCSI 3604 Fair Oaks Blvd Suite 250 Sacramento, CA 95864 www.mcsi.mantech.com 2003-2015 ManTech Cyber Solutions International, All Rights Reserved. Physical
Incident Response: Live Forensics and Investigations
Chapter 5 Incident Response: Live Forensics and Investigations Solutions in this chapter: Postmortem versus Live Forensics Today s Live Methods Case Study: Live versus Postmortem Computer Analysis for
Detecting Malware With Memory Forensics. Hal Pomeranz SANS Institute
Detecting Malware With Memory Forensics Hal Pomeranz SANS Institute Why Memory Forensics? Everything in the OS traverses RAM Processes and threads Malware (including rootkit technologies) Network sockets,
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Remote Unix Lab Environment (RULE)
Remote Unix Lab Environment (RULE) Kris Mitchell [email protected] Introducing RULE RULE provides an alternative way to teach Unix! Increase student exposure to Unix! Do it cost effectively http://caia.swin.edu.au
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
Trend Micro OfficeScan 11.0. Best Practice Guide for Malware
Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
Advanced Registry Forensics with Registry Decoder. Dr. Vico Marziale Sleuth Kit and Open Source Digital Forensics Conference 2012 10/03/2012
Advanced Registry Forensics with Registry Decoder Dr. Vico Marziale Sleuth Kit and Open Source Digital Forensics Conference 2012 10/03/2012 Who am I? Senior Security Researcher @ DFS Published Researcher
Nixu SNS Security White Paper May 2007 Version 1.2
1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle
Cleartext Passwords in Linux Memory
Cleartext Passwords in Linux Memory Sherri Davidoff [email protected] July 26, 2008 Abstract Upon examination, the memory of a popular Linux distribution contained many cleartext passwords, including login,
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
Malware Analysis Quiz 6
Malware Analysis Quiz 6 1. Are these files packed? If so, which packer? The file is not packed, as running the command strings shelll reveals a number of interesting character sequences, such as: irc.ircnet.net
Best Practice Configurations for OfficeScan (OSCE) 10.6
Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan
Security Evaluation CLX.Sentinel
Security Evaluation CLX.Sentinel October 15th, 2009 Walter Sprenger [email protected] Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel.+41 55-214 41 60 Fax+41 55-214 41
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION
" - * INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION CHRIS PROSISE KEVIN MANDIA McGraw-Hill /Osborne New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul
Physical Memory Standard Operating Procedures
MORGAN STANLEY Physical Memory Standard Operating Procedures HBGary Memory Forensic Tools Phil Wallisch 5/11/2010 This document details the procedures that Morgan Stanley CERT will perform to acquire and
Chapter 11 Phase 5: Covering Tracks and Hiding
Chapter 11 Phase 5: Covering Tracks and Hiding Attrition Web Site Contains an archive of Web vandalism attacks http://www.attrition.org/mirror/attrition Most attackers, however, wish to keep low profile
Chapter 14 Analyzing Network Traffic. Ed Crowley
Chapter 14 Analyzing Network Traffic Ed Crowley 10 Topics Finding Network Based Evidence Network Analysis Tools Ethereal Reassembling Sessions Using Wireshark Network Monitoring Intro Once full content
CHAD TILBURY. [email protected]. http://forensicmethods.com @chadtilbury
CHAD TILBURY [email protected] 0 Former: Special Agent with US Air Force Office of Special Investigations 0 Current: Incident Response and Computer Forensics Consultant 0 Over 12 years in the trenches
How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip
Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
X-Ways Capture. The program executes the following steps unless you specify a different procedure in the configuration file:
Executive Summary X-Ways Capture Specialized computer forensics tool for the evidence collection phase of a forensic investigation that captures Windows and Linux live systems. X-Ways Capture employs various
Network Forensics: Log Analysis
Network Forensics: Analysis Richard Baskerville Agenda P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Two Important Terms PPromiscuous Mode
Implementation of Web Application Firewall
Implementation of Web Application Firewall OuTian 1 Introduction Abstract Web 層 應 用 程 式 之 攻 擊 日 趨 嚴 重, 而 國 內 多 數 企 業 仍 不 知 該 如 何 以 資 安 設 備 阻 擋, 仍 在 採 購 傳 統 的 Firewall/IPS,
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and
Volume SYSLOG JUNCTION. User s Guide. User s Guide
Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages
Open Source Security Tool Overview
Open Source Security Tool Overview Presented by Kitch Spicer & Douglas Couch Security Engineers for ITaP 1 Introduction Vulnerability Testing Network Security Passive Network Detection Firewalls Anti-virus/Anti-malware
Traditional Rootkits Lrk4 & KNARK
Traditional Rootkits Lrk4 & KNARK Based on a paper by John Levine & Julian Grizzard http://users.ece.gatech.edu/~owen/research/conference%20publications/rookit_southeastcon2003.pdf ECE 4883 Internetwork
Threat Events: Software Attacks (cont.)
ROOTKIT stealthy software with root/administrator privileges aims to modify the operation of the OS in order to facilitate a nonstandard or unauthorized functions unlike virus, rootkit s goal is not to
Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation
Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation R. K. Cunningham, R. P. Lippmann, D. J. Fried, S. L. Garfinkel, I. Graf, K. R. Kendall,
Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science
A Seminar report On Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science SUBMITTED TO: www.studymafia.org SUBMITTED BY: www.studymafia.org
Information Security Threat Trends
Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: [email protected] 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing
Fall. Forensic Examination of Encrypted Systems Matthew Postinger COSC 374
Fall 2011 Forensic Examination of Encrypted Systems Matthew Postinger COSC 374 Table of Contents Abstract... 3 File System Encryption... 3 Windows EFS... 3 Apple FileVault... 4 Full Disk Encryption...
Project 2: Firewall Design (Phase I)
Project 2: Firewall Design (Phase I) CS 161 - Joseph/Tygar November 12, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Computer Networks & Computer Security
Computer Networks & Computer Security Software Engineering 4C03 Project Report Hackers: Detection and Prevention Prof.: Dr. Kartik Krishnan Due Date: March 29 th, 2004 Modified: April 7 th, 2004 Std Name:
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers Brian Carrier Research Scientist @stake Abstract This paper uses the theory of abstraction layers to describe the purpose
USM IT Security Council Guide for Security Event Logging. Version 1.1
USM IT Security Council Guide for Security Event Logging Version 1.1 23 November 2010 1. General As outlined in the USM Security Guidelines, sections IV.3 and IV.4: IV.3. Institutions must maintain appropriate
Capturing a Forensic Image. By Justin C. Klein Keane <[email protected]> 12 February, 2013
Capturing a Forensic Image By Justin C. Klein Keane 12 February, 2013 Before you Begin The first step in capturing a forensic image is making an initial determination as to the
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.
CCM 4350 Week 11 Security Architecture and Engineering Guest Lecturer: Mr Louis Slabbert School of Science and Technology CCM4350_CNSec 1 Web Server Security The Web is the most visible part of the net
Introduction to BitLocker FVE
Introduction to BitLocker FVE (Understanding the Steps Required to enable BitLocker) Exploration of Windows 7 Advanced Forensic Topics Day 3 What is BitLocker? BitLocker Drive Encryption is a full disk
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 40 Firewalls and Intrusion
2! Bit-stream copy. Acquisition and Tools. Planning Your Investigation. Understanding Bit-Stream Copies. Bit-stream Copies (contd.
Acquisition and Tools COMP 2555: Principles of Computer Forensics Autumn 2014 http://www.cs.du.edu/2555 1 Planning Your Investigation! A basic investigation plan should include the following activities:!
File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1
File System Forensics FAT and NTFS 1 FAT File Systems 2 File Allocation Table (FAT) File Systems Simple and common Primary file system for DOS and Windows 9x Can be used with Windows NT, 2000, and XP New
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 12 Network Forensics Objectives Understand Internet fundamentals Understand network basics Acquire data on a Linux computer Guide
Computer Forensics Tracking the Cyber vandals
Computer Forensics Tracking the Cyber vandals Martin Khoo, CISSP Assistant Director, Defence & Response Head, SingCERT Infocomm Development Authority of Singapore (IDA) BlackHat Asia 2002, Singapore Copyright
Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.
Running head: UNIT 3 RESEARCH PROJECT 1 Unit 3 Research Project Eddie S. Jackson Kaplan University IT540: Management of Information Security Kenneth L. Flick, Ph.D. 10/07/2014 UNIT 3 RESEARCH PROJECT 2
Hackers: Detection and Prevention
Computer Networks & Computer Security SE 4C03 Project Report Hackers: Detection and Prevention Due Date: March 29 th, 2005 Modified: March 28 th, 2005 Student Name: Arnold Sebastian Professor: Dr. Kartik
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
Foundstone ERS remediation System
Expediting Incident Response with Foundstone ERS Foundstone Inc. August, 2003 Enterprise Risk Solutions Platform Supports Successful Response and Remediation Introduction The Foundstone Enterprise Risk
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How Network Security Is Breached Network Security Policy
THE ROLE OF IDS & ADS IN NETWORK SECURITY
THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker
Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
0days: How hacking really works. V 1.0 Jan 29, 2005 Dave Aitel [email protected]
0days: How hacking really works V 1.0 Jan 29, 2005 Dave Aitel [email protected] Who am I? NSA->@stake->Immunity CEO of Immunity, Inc. Consulting (product assessments) Immunity CANVAS Immunity Partner's
CatDV Pro Workgroup Serve r
Architectural Overview CatDV Pro Workgroup Server Square Box Systems Ltd May 2003 The CatDV Pro client application is a standalone desktop application, providing video logging and media cataloging capability
Digital Forensics. Larry Daniel
Digital Forensics Larry Daniel Introduction A recent research report from The Yankee Group found that 67.6 percent of US households in 2002 contained at least one PC The investigators foresee three-quarters
Security Correlation Server Quick Installation Guide
orrelog Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
UNIX Computer Forensics
Honeynet2_book.fm Page 347 Thursday, April 29, 2004 11:09 AM 12 UNIX Computer Forensics Brian Carrier In the last chapter, we discussed the basics of computer forensics. In this chapter, we discuss the
How to Install Applications (APK Files) on Your Android Phone
How to Install Applications (APK Files) on Your Android Phone Overview An Android application is stored in an APK file (i.e., a file named by {Application Name}.apk). You must install the APK on your Android
FORENSIC ANALYSIS Aleš Padrta
FORENSIC ANALYSIS Aleš Padrta CESNET, CESNET-CERTS, FLAB CESNET Czech NREN operator CESNET-CERTS 2004 Established 2008 Accredited CSIRT FLAB Forensic LABoratory Established 6/2011 Support team for CESNET-CERTS
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates
An Insight into Cookie Security
An Insight into Cookie Security Today most websites and web based applications use cookies. Cookies are primarily used by the web server to track an authenticated user or other user specific details. This
Advanced Web Security, Lab
Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,
An Overview of the Bro Intrusion Detection System
An Overview of the Bro Intrusion Detection System Brian L. Tierney, Vern Paxson, James Rothfuss Lawrence Berkeley National Laboratory Typical Approach: Firewall with default deny policy A blocking router
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
