Sniper Forensics v3.0 Hunt



Similar documents
Jibran Ilyas DIRECTOR

RETHINKING CYBER SECURITY

Global Security Report 2011

WRITTEN TESTIMONY OF

Hunting for Indicators of Compromise

2012 Global Threats and Trends

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

DEF CON 19: Getting SSLizzard. Nicholas J. Percoco Trustwave SpiderLabs Paul Kehrer Trustwave SSL

CYBER SECURITY TRAINING SAFE AND SECURE

Network Security Monitoring: Looking Beyond the Network

Gaining the upper hand in today s cyber security battle

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Endpoint Threat Detection without the Pain

National Cyber Security Month 2015: Daily Security Awareness Tips

Covert Operations: Kill Chain Actions using Security Analytics

After the Attack: RSA's Security Operations Transformed

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Advanced Threat Protection with Dell SecureWorks Security Services

Comprehensive Advanced Threat Defense

Privilege Gone Wild: The State of Privileged Account Management in 2015

Digital Forensic Techniques

Incident Response. Six Best Practices for Managing Cyber Breaches.

How To Stop A Cybercriminal From Stealing A Credit Card Data From A Business Network

Getting Started Guide

Top 10 Tips to Keep Your Small Business Safe

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

As threat actors target various types of networks, companies with improperly configured network infrastructures risk the following repercussions:

Digital Evidence and Threat Intelligence

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

One-Man Shop. How to build a functional security program with limited resources DEF CON 22

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Privilege Gone Wild: The State of Privileged Account Management in 2015

Advanced Threats: The New World Order

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

Alert (TA14-212A) Backoff Point-of-Sale Malware

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Persistence Mechanisms as Indicators of Compromise

InfoSec Academy Forensics Track

A Day in the Life of a Cyber Tool Developer

Top 5 Global Bank Selects Resolution1 for Cyber Incident Response.

Whose IP Is It Anyways: Tales of IP Reputation Failures

Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats

Whitepaper. Advanced Threat Hunting with Carbon Black

InfoSec Academy Application & Secure Code Track

Computer Hacking Forensic Investigator v8

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

A NEW APPROACH TO CYBER SECURITY

Breach Found. Did It Hurt?

After the Attack. The Transformation of EMC Security Operations

Seven Simple steps. For Mobile Device Management (MDM) 1. Why MDM? Series

Agenda , Palo Alto Networks. Confidential and Proprietary.

Post-Access Cyber Defense

How can Cloud help your Security. Christophe Van Mollekot Solution Advisor Microsoft

ESG Brief. Overview by The Enterprise Strategy Group, Inc. All Rights Reserved.

Detecting Malware With Memory Forensics. Hal Pomeranz SANS Institute

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

BE SAFE ONLINE: Lesson Plan

Cognitive and Organizational Challenges of Big Data in Cyber Defense

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

2013 Open Source Digital Forensics Conference

That Point of Sale is a PoS

Doris Yang Vectra Networks, Inc. June 16, 2015 The World Ahead

Cisco Cyber Threat Defense - Visibility and Network Prevention

Defending against modern cyber threats

Building the Next Generation of Computer Security Professionals. Chris Simpson

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

SECURITY CONSIDERATIONS FOR LAW FIRMS

Uroburos Highly complex espionage software with Russian roots

SAFECode Security Development Lifecycle (SDL)

Visa Data Security Bulletin (AP)

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC

Adversary ROI: Why Spend $40B Developing It, When You Can Steal It for $1M?

Operation Liberpy : Keyloggers and information theft in Latin America

Enterprise Incident Response: Network Intrusion Case Studies and Countermeasures

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

eguide: Designing a Continuous Response Architecture Disrupting the Threat: Identify, Respond, Contain & Recover in Seconds

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

Transcription:

Sniper Forensics v3.0 Hunt Presented by: Christopher Pogue, CISSP, CEH, CREA, GFCA, QSA Managing Consultant SpiderLabs Incident Response and Digital Forensics

Who Am I? Managing Consultant for the Trustwave SpiderLabs Master s degree in Information Security Author of Unix and Linux Forensic Analysis by Syngress Author of the award winning blog, The Digital Standard Chosen as a SANS Thought Leader in 2010 Member of the USSS Electronic Crimes Task Force Speaker @ SANS DFIR `09, 10, `11, `12, The Computer Forensics Show 09 and 10, Direct Response Forum 09, SecTor `09,`10,`11,`12 USSS ECTF Miami, Dallas, The Next HOPE 10, BSIDESLV 10, DEF CON 18 & 20, LM Connect `10, GFIRST `11, `12, SecureTech `11 and Career Day at my kids school. Former US Army Signal Corps Warrant Officer

Thank You Dan Christensen! http://dcdrawings.blogspot.com/

Thank You MAJ Carole Newell I think Twitter handle: @cpbeefcake

TheDigitalStandard.Blogspot.com

Agenda Recap What is Sniper Forensics? The Evolution of Sniper Forensics What are the benefits of using Sniper Forensics? Testimonials Indicators of Compromise 1000 yard stare In the Cross Hairs Lethal Forensication Case Studies Conclusion

The Evolution of: Sniper Forensics The process of taking a targeted, deliberate approach to forensic investigations: Create an investigation plan Apply sound logic Locard s Exchange Principle Occam s Razor The Alexiou Principle Extract what needs to be extracted, nothing more Allow the data to provide the answers Report on what was done Answer the questions

Sniper Forensics V2.0: Target Acquisition What do I snipe? Registry Hives SAM Security System Software NTUSER.DAT How do I actually DO that? Manually via FTK using F-Response Script it How do I interpret the data? Infiltration Aggregation Exfiltration

Sniper Forensics v3.0: Hunt Identify Indicators of Compromise (IOC) 1000 yard stare In The Cross Hairs Lethal Forensication Endgame

Benefits Don t Take My Word For it! Sniper Forensics is the only methodology worth using. That's something the monolithic driving imaging shops don't want to hear. It will beat them to them results and help to stop the bleeding faster every time. - Nicholas J. Percoco - Senior Vice President, Trustwave SpiderLabs - @c7five

Benefits Don t Take My Word For it! Sniper Forensic rocks because it's foundations lies in logic. Try it, you will thank us later! - Jibran Ilyas - Senior Security Consultant, SpiderLabs DFIR Team - @JibranIlyas

Benefits Don t Take My Word For it! Chris' Sniper Forensics Series teaches something much more important than simple technical skills. It teaches the investigative process and how to keep your eye on the ball. Too many investigators, digital or otherwise, get bogged down and sidetracked with the massive quantities of information. Chris's methodology perfectly illustrates the methods investigators should be using to limit the scope of their engagements. - Larry "Lee" Sult - Security Analyst, SpiderLabs DFIR Team - CyberFrontSecurity.blogspot.com

Benefits Don t Take My Word For it! Look, digital forensics is getting more complicated not less complicated. The old school forensics methodology does not work on mobile and embedded devices, and you re not going to image the cloud. Sniper Forensics is the embodiment of how forensic cases will be worked in the future. Know what you need to solve the case and go get it. - Grayson Lenik - Security Consultant, SpiderLabs DFIR Team - Author of the award winning blog, EyeOnForenscis - @handlefree

Benefits Don t Take My Word For it! During a major breach, there is no plan B. Chris's presentation on Sniper Forensics are the result from his time spent on the front lines in the field. If you are looking to equip your team with what they really need, Sniper Forensics details special ops TTPs that make a clear difference. - Rob Lee - Forensics Curriculum Lead, SANS Institute - @RobtLee * TTP = Tactics, Techniques, and Procedures

Indicators of Compromise What is different in the eyes of a hunter? They know what they are looking for Valuable past experience They know what it looks like when they found it They do not hesitate to pull the trigger

Indicators of Compromise

Indicators of Compromise

Indicators of Compromise

Indicators of Compromise

Indicators of Compromise

Indicators of Compromise What do all of these images have in common? Hoof print Burned Wall Bullet Cake Ball Comic Book

Indicators of Compromise To the untrained eye, they seem like one of hundreds of thousands images we see everyday. To the expert eye, they hold significant value. Hoof print Deer track Burned Wall Evidence of the use of a liquid fire accelerant Bullet.38 Caliber round Cake Ball Red Velvet cake ball with an almond bark exterior Comic Book Spiderman issue #1

1000 Yard Stare As practitioners of digital forensics, we are the expert eyes of the cyber crime world Arguably the most difficult of all forensic disciplines Constantly changing and evolving data sample Very real, very proactive adversary, with extensive resources and time Thousands of hiding places

1000 Yard Stare Study the terrain What is normal Research Experience Study the target Why is it a target? What value does the target hold? What weakness does the target possess? Study the enemy Learn his behaviors Where does he operate? How does he operate? Why does he operate?

In The Cross Hairs All malware has specific components Propagation Mechanism Aggregation Mechanism Encoding (not encryption) Exfiltration Remote Access

In The Cross Hairs How do those components work? How would a memory dumper, dump memory? Would it dump the entire contents of memory? Would it dump the memory from a specific process? How would a keylogger log keystrokes? Would log the input from a specific device? Would it gather screenshots? How would a network sniffer operate? What critical elements HAVE to be in place? How can you tell?

Lethal Forensication Indicators of Compromise All types of malware have to do three things: Live Run Generate output Once you identify what is being done and how, you can use that IOC on the current case, or future cases (ie build a database of known IOCs).

Lethal Forensication Once you know what the enemy looks like, and how he acts, it becomes exponentially easier to identify: The Likely Target The Likely means of Infiltration The Likely means of Aggregation The Likely means of Exfiltration

Case Studies What s wrong with this picture? Two processes called, OPS.exe Which one is legitimate, and which is not? How can I tell? What can I logically conclude from this finding?

Case Studies What s wrong with this picture? Two dlls called, webcheck.dll Which one is legitimate, and which is not? How can I tell? What can I logically conclude from this finding?

Case Studies What s wrong with this picture? Is svchost.exe a legitimate binary name? Is there a problem with this one? How can I tell? What can I logically conclude from this finding?

Conclusion To have the expert eyes of a hunter, you MUST: Put in the chair time What is normal What is abnormal Study your target Why are they likely a target What do they have that is worth stealing Study the enemy What are they doing How are they doing it What are the current trends Where can you foresee it going

Final Thought Is this merely a laptop? OR Is it a investigation tool in the hands of an expert?

Questions? cepogue@trustwave.com @cpbeefcake