Israel Aladejebi Computer Forensics Century College Information Technology Department



Similar documents
Ethical Hacking Course Layout

Network Attacks and Defenses

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Build Your Own Security Lab

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

CRYPTUS DIPLOMA IN IT SECURITY

Vulnerability Assessment and Penetration Testing

CEH Version8 Course Outline

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Unix/Linux Forensics 1

Certified Ethical Hacker (CEH)

Learn Ethical Hacking, Become a Pentester

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)

Audience. Pre-Requisites

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)


Professional Penetration Testing Techniques and Vulnerability Assessment ...

SONDRA SCHNEIDER JOHN NUNES

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004

Penetration Testing with Kali Linux

Network Forensics: Log Analysis

information security and its Describe what drives the need for information security.

CYBERTRON NETWORK SOLUTIONS

Network/Internet Forensic and Intrusion Log Analysis

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Open Source and Incident Response

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

SCP - Strategic Infrastructure Security

CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006

FSP-201: Ethical Hacking & IT Security

Malicious Network Traffic Analysis

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

INFORMATION SECURITY TRAINING

Assessing Network Security

Stop that Big Hack Attack Protecting Your Network from Hackers.

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Introduction Open Source Security Tools for Information Technology Professionals

Web App Security Audit Services

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Some Tools for Computer Security Incident Response Team (CSIRT)

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

INFORMATION SECURITY TRAINING CATALOG (2015)

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Detailed Description about course module wise:

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Security: Attack and Defense

Description: Objective: Attending students will learn:

Open Source Security Tools for Information Technology Professionals

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

Creation of Pentesting Labs

Certified Penetration Testing Specialist

Course Title: Penetration Testing: Security Analysis

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

[CEH]: Ethical Hacking and Countermeasures

CS5008: Internet Computing

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

EC-Council Certified Security Analyst (ECSA)

Linux Network Security

Attack Frameworks and Tools

Network Security and Firewall 1

EC Council Certified Ethical Hacker V8

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

ETHICAL HACKING. By REAL TIME FACULTY

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

CERTIFIED PENETRATION TESTING CONSULTANT

Quick Start Guide to Ethical Hacking

Guide to Computer Forensics and Investigations, Second Edition

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

EC-Council Ethical Hacking and Countermeasures

DDos. Distributed Denial of Service Attacks. by Mark Schuchter

Intruders & Intrusion Hackers Criminal groups Insiders. Detection and IDS Techniques Detection Principles Requirements Host-based Network-based

Five Steps to Improve Internal Network Security. Chattanooga ISSA

CSE331: Introduction to Networks and Security. Lecture 18 Fall 2006

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities

Security of IPv6 and DNSSEC for penetration testers

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE

Demystifying Penetration Testing

Chapter 8 Phase3: Gaining Access Using Network Attacks

Application Security Testing

Network Incident Report

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Course Content: Session 1. Ethics & Hacking

Ethical Hacking and Attack Tools

Transcription:

Israel Aladejebi Computer Forensics Century College Information Technology Department

Being able to break security doesn t make you a hacker anymore than being able to hotwire cars makes you an automotive engineer. - Eric S. Raymond

IT Department: Programs! Computer Forensics & Investigative Sciences (Newly developed Program)! Microcomputer Support Technology! Information & Telecommunication Technology

Outline! The Department in a Nutshell!Computer Forensic Program! Computer Forensics Courses!Current Challenges! Future Plan! Q and A

Computer Forensics & Investigative Technology Awards Program Awards are:! Computer Forensics & Investigative Technology AAS Degree (64 credit)! Computer Forensics & Investigative Technology Certificate (16 credit)! Computer Security & Information Assurance (16 credit)

Computer Forensics Program focus! Try-it-by-hand" approach 65% Labs, 35% Lecture! Vendor-independent lab. learn more than just how to use a tool

Computer Forensics Courses! CFIT2065 Introduction to Computer Forensics 3cr! CFIT2080 Open Source Forensics Methodology 3cr! CFIT 2070 Windows & NTFS File System Forensics 3cr! CFIT2075 Computer Investigative Law for Forensic Analysts 3cr

Computer Forensics Courses! CFIT2081 Computer & Network Hacker Security I 3cr! CFIT2082 Computer & Network Hacker Security II 3cr! CFIT2083 Secure Communication 3cr! CFIT2084 Unix Network Admin, Security and Troubleshooting! CFIT2083 Windows Security 3cr

Computer Forensics Course! CFIT2065 Introduction to Computer Forensics 3cr This course consists of a comprehensive overview of computer forensics theories, methodologies, and practices. methods to properly conduct a computer forensics investigation including ethics, tools, procedures and analysis.

CFIT2080 Open Source Forensics Methodology 3cr Students will use Linux tools to analyze multiple OS image to perform investigations. This course begins with file system fundamentals but moves rapidly to using advanced toolkits to perform a forensic audit of suspect systems. Forensic analysis is performed on gathered evidence contained in "disk images". Using a disk image of a computer involved in an actual forensic case, students will apply what they learn in class by investigating the incident in a hands-on setting

CFIT 2070 Windows & NTFS File System Forensics 3cr Recover a Rootkit From An SMB Attack Using A Hexeditor Perform Hardware and Network Identification on a live system Use dd for Windows to Obtain Images Perform Imaging of Memory on a live system Using Automated Toolkits To Collect Information From Windows Based Systems Image an NTFS/FAT file system over File Sharing Enabled Computers Using dd Using Autopsy, Foremost, and The Sleuth Kit to Examine NTFS/FAT Image

CFIT2081 Computer & Network Hacker Security I 3cr! Reconnaissance What Does Your Network Reveal? Are You Leaking Too Much Information? Using Whois Lookups, ARIN, RIPE and APNIC Domain Name System Harvesting Data Gathering from Job Postings, Web Sites and Government Databases! Scanning The Art of War Driving to Locate Unsecure Wireless LANs War Dialing for Renegade Modems Port Scanning: Traditional, Stealth and Blind Scanning Active and Passive Operating System Fingerprinting Firewalking to Determine Firewall Filtering Rules Vulnerability Scanning Using Nessus and Other Tools CGI Scanning with Whisker! Intrusion Detection System Evasion Foiling IDS at the Network Level: Fragmentation and Other Tricks Foiling IDS at the Application Level: Exploiting the Rich Syntax of Computer Languages Using Fragroute, Fragrouter and Whisker IDS Evasion Tactics! Hands-on Exercises with the Following Tools: NetStumbler for Wireless LAN Discovery Nmap Port Scanner and Operating System Fingerprinting Tool Nessus Vulnerability Scanner Enum for Extracting Windows Data Through Null Sessions

CFIT2081 Computer & Network Hacker Security I 3cr! Network-Level Attacks Session Hijacking: From Telnet to SSL and SSH Person-in-the-Middle Attacks Passive Sniffing! Gathering and Parsing Packets Active Sniffing: ARP Cache Poisoning and DNS Injection DNS Cache Poisoning: Redirecting Traffic on the Internet Using and Abusing Netcat, Including Backdoors and Nasty Relays IP Address Spoofing Variations! Operating System and Application-Level Attacks Buffer Overflows in Depth The MetaSploit Exploitation Framework and Perl Exploit Library Format String Attacks! Netcat: The Attacker's Best Friend Using Netcat to transfer files, create backdoors, and shovel shell Netcat relays to obscure the source of an attack Replay attacks using Netcat! Hands-on Exercises with the Following Tools: Sniffers, Including Tcpdump Sniffer Detection Tools, Including ifconfig, ifstatus, and promiscdetect Netcat for transferring files, creating backdoors, and setting up relays Format String Vulnerabilities in Windows

CFIT2082 Computer & Network Hacker Security II 3cr! Password Cracking Password Cracking with John the Ripper Analysis of Worm Trends From 1999-2005 Password Cracking With L0phtCrack and John the Ripper! Web Application Attacks Account Harvesting SQL Injection: Manipulating Back-end Databases Session Cloning: Grabbing Other Users' Web Sessions Cross-Site Scripting! Denial of Service Attacks Distributed Denial of Service: Pulsing Zombies and Reflected Attacks Local Denial of Service SYN Floods and Smurf Attacks: DoS Building Blocks! Hands-on Exercises with the Following Tools: John the Ripper password cracker Web application attack tools, including Achilles

CFIT2082 Computer & Network Hacker Security II 3cr! Maintaining Access Backdoors: Using QAZ, Tini, and Other Popular Beasts Trojan Horse Backdoors: A Nasty Combo Application-level Trojan Horse Backdoor Suites (VNC, SubSeven, etc.) Rootkits: Substituting Binary Executables with Nasty Variations Kernel-level Rootkits: Attacking the Heart of the Operating System (Adore, the Super User Control Kit, and KIS)! Covering the Tracks File and Directory Camouflage and Hiding Log File Editing on Windows and Unix Accounting Entry Editing: UTMP, WTMP, Shell Histories, etc. Covert Channels Over HTTP, ICMP, TCP and Other Protocols Sniffing Backdoors and How They Can Really Mess Up Your Investigations Unless You Are Aware of Them Steganography: Hiding Data in Images, Music, Binaries, or Any Other File Type

Uh Oh. You ve been compromised!

Step 1: Collect the Evidence Create a Investigative Log. Document EVERYTHING. Make an image of the harddisks at that point in time. Ghost/mirror entire drive, or dd partition(s) to image(s) dd if=/dev/hda1 of=/var/case01.dd md5sum drive/image and document time, date and checksum (and possible digitally sign results) date > case01.evidence.seal md5sum case01.dd >> case01.evidence.seal gpg clearsign case01.evidence.seal

Sample Evidence Seal cat case01.evidence.seal.asc -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Sun Dec 7 10:39:20 PST 2003 c20308685946b3d567f06d2c45e53904 case01.dd -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (MingW32) id8dbqe/03xj/vfbhj3gxvmranf+aj9hyhxkkukt jlzwjjj3btrbzhyxgwcfsyyc jlnk6kexgfiwrbdo6x0g9dc= =gqel -----END PGP SIGNATURE-----

Step 2: Secure the Evidence NEVER work on the original evidence. Work on the copy. Secure the original with checksum (or better yet an evidence seal) in a safe or evidence locker that only trusted people have access to. To maintain evidence chain you should document who has accessed the evidence, when they accessed it, and why AT ALL TIMES. Physical security measures should ensure accountability. (ie CCTV to safe/locker) These procedures are not about paranoia, its about evidence integrity if needed in a criminal case

Step 3: Prep Analysis Machine Boot into your favorite Linux OS with all the right tools, which we will list later) Mount copy of evidence into filesystem READ ONLY: mount o ro,loop,nodev,noexec case01.dd /mnt/evidence

Step 4: Create Timeline Capture drive s forensic data grave-robber c /mnt/evidence m \ d /var/investigations/case01 o LINUX2 Extract deleted inode (mod/access/change) times ils case01.dd ils2mac > case01.ilsbody Combine evidence for timeline conversion cat case01.ilsbody body > case01.evidence Generate Timeline mactime p /mnt/evidence/etc/passwd \ g /mnt/evidence/etc/group -b case01.evidence \ 11/28/2003 > case01.timeline

Step 5: Begin Analysis At this point what happens is dependant on the investigation. The timeline file will show modify, access, and changed actions at given times, and in sequence. With patience, you should be able to trace exactly what went on

Tools to use during Analysis istat Display all known info about an inode istat case01.dd 12345 dcat Display chunks of a block of forensic data dcat h case01.dd 65432 icat Access a block of forensic data by inode icat case01.dd 12345 > file unrm Recover a block of forensic data unrm case01.dd startblock-endblock > filedump hexdump Dump data in hexadecimal hexdump C file

References / More Information The Coroner's Toolkit http://www.porcupine.org/forensics/tct.html File System Analysis Techniques http://www.sleuthkit.org/sleuthkit/docs/ref_fs.html Autopsy http://www.sleuthkit.org/autopsy/download.php Good Forensic Analysis of HoneyNet Project Attack http://project.honeynet.org/challenge/results/dittrich/ evidence.txt Good Practice Guide for Computer based Electronic Evidence http://www.nhtcu.org/acpo%20guide%20v3.0.pdf Knoppix-STD http://www.knoppix-std.org

Kopp Technology Center Laboratory Initiative-$10M! 3-Advisory Committees! December 12, 2004 Convergence Summit! Presidents Technology Steering Committee! Phased Implementation! Orientation of Convergence- Technology Industry Support Training Center Partnerships

Current Challenges! Textbook! Faculty

Future Plans! PDA/Mobil Forensics Course! Partnerships with Business and Industry! Internship Partnerships with Students

Q & A