Impact of Digital Forensics Training on Computer Incident Response Techniques



Similar documents
Incident Response and Computer Forensics

DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,

Digital Forensic Techniques

Digital Forensics. Tom Pigg Executive Director Tennessee CSEC

EnCase v7 Essential Training. Sherif Eldeeb

Digital Forensics Tutorials Acquiring an Image with FTK Imager

Practice Exercise March 7, 2016

RECOVERING FROM SHAMOON

COMPUTER FORENSICS (EFFECTIVE ) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE CATE STUDENT REPORTING PROCEDURES MANUAL)

FORENSIC ANALYSIS OF USB MEDIA EVIDENCE. Jesús Alexander García. Luis Alejandro Franco. Juan David Urrea. Carlos Alfonso Torres

Chapter 11 File and Disk Maintenance

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

Determining VHD s in Windows 7 Dustin Hurlbut

Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide

Tiburon Master Support Agreement Exhibit 6 Back Up Schedule & Procedures. General Notes on Backups

Forensically Determining the Presence and Use of Virtual Machines in Windows 7

Legal Notices. AccessData Corp.

IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a)

Computer Forensic Capabilities

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

Setting Up the EntraPass Mirror Database and Redundant Server

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner

ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT

MSc Computer Security and Forensics. Examinations for / Semester 1

Computer Hacking Forensic Investigator v8

Paraben s P2C 4.1. Release Notes

User Manual. Copyright Rogev LTD

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

Microsoft Vista: Serious Challenges for Digital Investigations

User Guide. Laplink Software, Inc. Laplink DiskImage 7 Professional. User Guide. UG-DiskImagePro-EN-7 (REV. 5/2013)

Crash Proof - Data Loss Prevention

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

IT Essentials v4.1 LI Upgrade and configure storage devices and hard drives. IT Essentials v4.1 LI Windows OS directory structures

HotelTV. Client Software Update REV A0.10 D October. Web : Mail : support@vestek.com.tr Tel :

Operating Systems Forensics

Technical Support Bulletin 1

plantemoran.com What School Personnel Administrators Need to know

USM IT Security Council Guide for Security Event Logging. Version 1.1

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

Ekran System Help File

Server & Workstation Installation of Client Profiles for Windows

Guide to Computer Forensics and Investigations, Second Edition

Incident Response and Forensics

Guidelines on Digital Forensic Procedures for OLAF Staff

Practical Application How to Use a Flash Drive

Digital Forensics, ediscovery and Electronic Evidence

Acronis Backup & Recovery 11

Charter Business Desktop Security Administrator's Guide

File System Management

Information. Product update Recovery. Asset manager. Set console address Create recovery point. Client properties

VMware Mirage Web Manager Guide

REMOTE BACKUP-WHY SO VITAL?

The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices

How To Do Digital Forensics

Change Color for Export from Light Green to Orange when it Completes with Errors (31297)

Hands-On How-To Computer Forensics Training

Security Intelligence Services. Cybersecurity training.

CrashPlan PRO Enterprise Backup

RES ONE Automation 2015 Task Overview

Land Information New Zealand (LINZ) SALT Database. Migration from original hardware to virtualised hardware: Process Documentation

USB 2.0 Flash Drive User Manual

1. Product Information

Desktop Application Virtualization and Application Streaming: Function and Security Benefits

Online Backup Client User Manual Linux

EaseUS Partition Master

Driver Updater Manual

Part Answer: D

Dacorum U3A Computer Support Group. Friday 27th March 2015

Acronis Backup & Recovery 10 Server for Windows. Installation Guide

Managing and Monitoring Windows 7 Performance Lesson 8

CYBER FORENSICS. KRISHNA SASTRY PENDYALA Cyber Forensic Division Central Forensic Science Laboratory Hyderabad.

COEN 152 / 252 Lab Exercise 1. Imaging, Hex Editors & File Types

Customer Release Notes for Xerox Integrated Fiery Color Server for the Xerox Color C75 Press, version 1.0

Acronis True Image 2015 REVIEWERS GUIDE

Computer Forensics. Securing and Analysing Digital Information

CERTIFIED DIGITAL FORENSICS EXAMINER

Where is computer forensics used?

MFR IT Technical Guides

Spyware Doctor Enterprise Technical Data Sheet

Incident Response. Six Best Practices for Managing Cyber Breaches.

RecoveryVault Express Client User Manual

Moxa Device Manager 2.0 User s Guide

Chapter 2 Array Configuration [SATA Setup Utility] This chapter explains array configurations using this array controller.

Prerequisites and Configuration Guide

Alternate Data Streams in Forensic Investigations of File Systems Backups

Making the difference between read to output, and read to copy GOING BEYOND BASIC FILE AUDITING FOR DATA PROTECTION

Manage the Endpoints. Palo Alto Networks. Advanced Endpoint Protection Administrator s Guide Version 3.1. Copyright Palo Alto Networks

IT Disaster Recovery Plan Template

CHAD TILBURY.

Transcription:

Impact of Digital Forensics Training on Computer Incident Response Techniques Valorie J. King, PhD Collegiate Associate Professor University of Maryland University College Presentation to AFCEA June 25, 2014

Introduction Valorie J. King, PhD Email: valorie.king@faculty.umuc.edu Cybersecurity / Information Assurance Program at UMUC Course Chair Cybersecurity Courses Digital Forensics Courses

Synopsis This scenario driven case will start with a review of the handling of an actual computer incident for a mission critical system that had a required Mean Time To Restart of five minutes. The presenter will then conduct a walk through of incident response techniques using digital forensics methods and tools for a similar but hypothetical incident. Throughout the demonstration, the presenter will highlight critical points where an incident responder s actions could adversely impact the identification, extraction, preservation, and interpretation of digital information during a computer incident response investigation.

The System Secure Environment / Classified Mission Real-time Operating System Custom Software w/ OS modifications Hot Swap Computers (A & B) Operator Console Disk Farm (300 MB per hard drive) High Speed Custom Processing Hardware Installed in computer back plane

The Incident Actually, a series of incidents having increasing frequency over a 12 month period My involvement Began approximately 6 months after first incident Onsite Support Engineer (Software) Initial tasking write SW to recover data from hard disk(s) after system crash Impossible to complete due to software architecture (register pointer to linked list overwritten by HW interrupt vector)

The Investigation Phase I Read Custom Software (Code & Design Documents) Analyze Memory Dump Tapes Search for evidence of causation Phase II (permission was very hard to get!) Analyze Operator and Maintenance Documentation Observe Operations from OPS Floor Phase III Implemented new Incident Response Procedures Analyze Operator Captured Register Values & PC

Incident Response Procedure New Incident Response Procedure Written by SW Engineer Operations resisted additional record keeping requirements Additional Information in Operator Log Reports Date/Time of HW Maintenance Date/Time of Incidents + System ID (A or B) Document Control # for Dump Tape Added later: HALT address (PC) & Register Values

Analysis of Incident Reports Patterns / Trends: none found UNTIL operators started recording Register Values at time of halt (obtained through front panel) Eureka Moment: Register Values including PC were static Halt location was inside memory allocated to Hardware Interrupt Driver for operator console Error causing halt: Keyboard input error

The Causes Operator Console ADM-3a terminal device Integrated Display & Keyboard Serial Device Incorrect Error Handling Custom Driver Software SW Engineer coded in a halt instead of ignoring the error

The Culprits Software Engineers Hardware Operators

The Outcome(s) Halt instruction replaced with return from interrupt No attribution / responsibility could be assigned (despite the coder s name being present in the comments for the HALT code). Operators unhappy at blame for food caused hardware failure. Bottom Line: Unhappy customer, Unhappy managers

The What If? What if the halt instruction had been deliberately placed in the code? Forensic Issues Loose configuration control on software Inconsistent recording of site info (operator logs) No chain of custody on dump tapes (evidence) No forensic training for incident responders

What have we learned about Incident Response? FAST FORWARD 30+ YEARS

We do things differently now http://csrc.nist.gov/publications/nistpubs/800-86/sp800-86.pdf

Educating Incident Responders apply rules and guidelines as they pertain to the acquisition, handling, and storage of digital artifacts establish a digital forensic workstation for the purpose of collecting and analyzing data select and apply the most appropriate methodology to extract data based on circumstances and reassemble artifacts from data fragments analyze and interpret data collected and report outcomes in accordance with incident response handling guidelines

Hands-on Project Scenario Key employee resigned unexpectedly (by voicemail) Contract with security incident reporting clauses & requirements Resignation of key personnel is a reportable security incident

Hands-on Project Scenario Initial Investigation Office search turned up one USB Employee s company laptop -- missing Employee s workstation -- missing sent to IT service center earlier in the week to be wiped and reimaged due to infection by a particularly nasty rootkit Phase I: Threshold Assessment of USB Phase II: Full Assessment of files from workstation

Hands-On Incident Response Project Forensic Images provided to students USB from employee s office Windows 7 Workstation Files from IT Service Center s Backup/Restore (USB) User Profile (Folders & Files) Internet Explorer Cache Files Email (saved as text and as eml) Documents Zip Archives User Registry Files

Chain of Custody

Sample Chain of Custody

Forensic Tools Encase Forensic Toolkit FTK FTK Image Password Recovery Toolkit (PRTK) Registry Viewer WinHex (Specialist)

Forensic Tools

Forensic Tools

Basic Analysis Techniques

Basic Analysis Techniques Examine deleted files & folders

Analysis Techniques Indicator that Linux was used to delete folders & files

Analysis Techniques

Contraband Found

User Profile Analysis

Short Cut Files (System Usage)

Short Cut Files (System Usage)

Registry Analysis (System Usage)

Registry Entries = Attribution (?)

Registry Keys hold Internet Usage Information

Registry Keys (Internet Traces)

Registry = When (?)

Keyword Searching (WinHex)

Keyword Search Results

Deeper Analysis

Deeper Analysis

Deeper Analysis

Deeper Analysis

Exporting to Excel for Analysis

WHO DID WHAT TO WHOM?

Presumption of Innocence Attribution is difficult to prove An account login does not establish responsibility Insider Threat External Threat Data can be faked Inconsistencies are important cues / clues

Finding Inconsistencies Anomalies Analysis What should NOT be in the files Meta data for versions / dates that do not fit the timeline Fonts that do not belong Timeline Analysis NTFS Logical Sequence Numbers Files created on HD after last shutdown

SUMMARY

Incident Response Timelines Procedures Methods Personnel Tools

Bottom Line If you do not collect the forensic image at the time of the incident, you will not have reliable and trustworthy data for later analysis and determination of who did what to whom. If you do not have trained personnel with access to appropriate tools, the after-action review will not have the data necessary to make informed decisions and respond appropriately to threats. Presumption of Innocence is not optional.