2013 Open Source Digital Forensics Conference



Similar documents
EVTXtract. Recovering EVTX Records from Unallocated Space PRESENTED BY: Willi Ballenthin OCT 6, Mandiant Corporation. All rights reserved.

A Day in the Life of a Cyber Tool Developer

PTK Forensics. Dario Forte, Founder and Ceo DFLabs. The Sleuth Kit and Open Source Digital Forensics Conference

Advanced Registry Forensics with Registry Decoder. Dr. Vico Marziale Sleuth Kit and Open Source Digital Forensics Conference /03/2012

TZWorks Windows Event Log Viewer (evtx_view) Users Guide

Comprehensive Advanced Threat Defense

LEVERAGING PROACTIVE DEFENSE TO DEFEAT MODERN ADVERSARIES. Jared Greenhill RSA Incident Response. September 17 th, 2015

EnCase 7 - Basic + Intermediate Topics

Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats

A White Paper from AccessData Group. Cerberus. Malware Triage and Analysis

CHAD TILBURY.

Hunting for Indicators of Compromise

Redline Users Guide. Version 1.12

Persistence Mechanisms as Indicators of Compromise

Network Payload Analysis for Advanced Persistent Threats Charles Smutz, Lockheed Martin CIRT

Comparative Analysis of Free IT Monitoring Platforms. Review of SolarWinds, CA Technologies, and Nagios IT monitoring platforms

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

Advanced Digital Forensics ITP 475 (4 Units)

Incident Response and Computer Forensics

WHEN THE HUNTER BECOMES THE HUNTED HUNTING DOWN BOTNETS USING NETWORK TRAFFIC ANALYSIS

Hyperoo 2 User Guide. Hyperoo 2 User Guide

Digital Forensic Techniques

CASE STUDY USING ECAT AND SA. Running Circles Around Traditional IR Teams

Fight fire with fire when protecting sensitive data

GOOGLE DESKTOP FORENSICS WIN!

Offensive & Defensive & Forensic Techniques for Determining Web User Iden<ty

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Windows 7 Forensic Analysis. H. Carvey Chief Forensics Scientist, ASI

Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)

Data Domain Profiling and Data Masking for Hadoop

Toad for Oracle 8.6 SQL Tuning

Sniper Forensics v3.0 Hunt

Who DIT It? Detecting and Mitigating Privilege Escalation Attacks on the Active Directory Data Store

Search and Destroy the Unknown FROM MALWARE ANALYSIS TO INDICATIONS OF COMPROMISE

Events Forensic Tools for Microsoft Windows

Detecting Malware With Memory Forensics. Hal Pomeranz SANS Institute

PLATFORA INTERACTIVE, IN-MEMORY BUSINESS INTELLIGENCE FOR HADOOP

One-Man Shop. How to build a functional security program with limited resources DEF CON 22

Data Mining in Incident Response Challenges and Opportunities

Analyzing HTTP/HTTPS Traffic Logs

Effective Java Programming. measurement as the basis

The Meaning. Linkfiles In Forensic Examinations

Vistara Lifecycle Management

APPLICATION PROGRAMMING INTERFACE

Evidentiary Integrity for Incident Response (EIIR)

Automating the Computer Forensic Triage Process With MantaRay

CloudAmp Analytics Dashboards. Documentation

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Forensics Book 2: Investigating Hard Disk and File and Operating Systems. Chapter 5: Windows Forensics II

Chronon: A modern alternative to Log Files

Breach Found. Did It Hurt?

MassTransit vs. FTP Comparison

Performance monitoring at CERN openlab. July 20 th 2012 Andrzej Nowak, CERN openlab

VBAK Agent 64-bit for Windows Version Release Notes 30 th March 2007

Operating Systems Forensics

Threat Intelligence for Dummies. Karen Scarfone Scarfone Cybersecurity

XpoLog Center Suite Data Sheet

Automated Identification and Reconstruction of YouTube Video Access

Using MySQL for Big Data Advantage Integrate for Insight Sastry Vedantam

OS KERNEL MALWARE DETECTION USING KERNEL CRIME DATA MINING

Cloudera Manager Training: Hands-On Exercises

Recovering and Analyzing Deleted Registry Files

Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

The Value of Physical Memory for Incident Response

Best Practices for Integrating NetVanta UC Server with Microsoft Exchange Server

A Tutorial Introduc/on to Big Data. Hands On Data Analy/cs over EMR. Robert Grossman University of Chicago Open Data Group

Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo

WINDOWS AZURE DATA MANAGEMENT AND BUSINESS ANALYTICS

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

SiteCelerate white paper

Towards Elastic Application Model for Augmenting Computing Capabilities of Mobile Platforms. Mobilware 2010

Data Hiding Techniques

INET INTEROPERABILITY TOOLS

TNT SOFTWARE White Paper Series

Redline User Guide. Release 1.14

Cyber Watch. Written by Peter Buxbaum

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

RSA SecurID Ready Implementation Guide

INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.

Solera Networks, A Blue Coat Company SOLERA NETWORKS BIG DATA SECURITY ANALYTICS

10 Ways to Not Get Caught Hacking On Your Mac

HyperQ Remote Office White Paper

Extending Security Analytics to support Operational Efficiency. John A. Greco Deloitte & Touche LLP Cyber Risk Services

TSM for Advanced Copy Services: Today and Tomorrow

Detect & Investigate Threats. OVERVIEW

Nexus Professional Whitepaper. Repository Management: Stages of Adoption

How To Use Powerhell For Security Research

Acronis Recovery TM for Microsoft Exchange TM

Is security awareness a waste of time?

Log Management Solution for IT Big Data

PowerShell. It s time to own. David Kennedy (ReL1K) Josh Kelley (Winfang) Twitter: dave_rel1k

Transcription:

4 TH ANNUAL OSDF 2013 Open Source Digital Forensics Conference Doing More with Less Willi Ballenthin Consultant MANDIANT

Introduc4on: Willi Ballenthin Professionally Incident response Malware analysis MANDIANT Personally: Programming Running NYC, USA Contact: @williballenthin 2

Enterprise- grade Incident Response Effec3ve enterprise- scale IR must be intelligence- driven You cannot keep up with an agacker if you deep- dive everything Closing the door on first introduclons probably won t get you anywhere They can tunnel faster than you can image Manual review does not scale across an enterprise Codify knowledge Distribute jobs and queries across the environment Go hunlng (with a plan) 3

Enterprise- grade Incident Response Funnel the ini3al analysis results into the intel cycle Analysis of a box should yield aclonable intelligence It may help paint a picture It must help you be in a beger place tomorrow Understand scope of compromise Know how to find evil elsewhere 4

Enterprise- grade Incident Response Funnel the ini3al analysis results into the intel cycle QuesLons to answer: Network, host indicators? InfecLon vector? Compromised accounts? Malware & persistence? Timeframe? Is more analysis needed? 5

Enterprise- grade Incident Response Triage analysis should not take too long Prepare for dozens or hundreds of compromised boxes Your Lme is valuable, and Lme is of the essence Answer queslons and move along Upshot: recognize pagerns across hosts Bad indicators are verbalm features of a binary (but they re cheap & cost effeclve) Great indicators describe pagerns and generalize well Only humans can do this (scriplng can help) 6

Enterprise- grade Incident Response Enterprise tools or prepara3on are required Have a remote forensic access route ready Agent- based systems can be a great start Custom solulons work too, just make sure they are be maintained Acquire data, analyze, and move along! You don t want to wait for images Respond while agackers are slll on the system 7

Hacking (in the RMS sense) Lets brainstorm a balanced set of data to collect for triage Desirables: High bang for the buck Low resource requirements Bandwidth Storage Worry Pareto principle 8

Hacking (in the RMS sense) Lets brainstorm a balanced set of data to collect for triage Class Data Resources Req d Completeness File System MFT 50 MB OK ConfiguraLon Registry Hives 20 MB Good Logs EVT/EVTX 50 MB? OK Memory??? 9

These formats compress very well In compressed 75MB, you can capture the triage data for a typical workstalon 10

MFT Analysis What to do with an MFT file? AnalyzeMFT.py Sanderson Forensics MFTView (not OSS) TZWorks nkswalk (not OSS) MFT tools descending from INDXParse Pure Python Backed by module MFT.py for easy reuse hgps://github.com/williballenthin/indxparse 11

MFT Analysis list_mu.py MFT Lmelining ullity Concise code: around 200 lines Supports $SI, mullple $FN, resident INDX records Constant memory usage How? Each record has an $FN agribute with a name. The $FN agribute has a link to the parent record. Iterate the records and walk up the parent links. 12

13 list_mk.py

MFT Analysis MFTView.py Unoriginal name, sorry. Pure Python InteracLve inspeclon of a file system using only an MFT Some features Integrated INDX record parsing Strings, hex view Data extraclon and cluster run calculalons 14

MFTView.py Explore a NTFS file system from just the MFT 15

16 MFTView.py Metadata

17 MFTView.py Resident Data

18 MFTView.py Non- Resident Data

19 MFTView.py INDX Records

20 MFTView.py Strings

MFT Analysis get_file_info.py Check the MFT structures for intereslng files: Timeline all embedded Lmestamps Extract strings from MFT stack Review (aclve & slack) INDX records Pull out many other fields 21

get_file_info.py Page 1 of 2 22

get_file_info.py Page 2 of 2 23

MFT Analysis Workflow Naturally: start with a Lmeline Manually review entries with MFTView Always rinse and repeat 24

Registry Analysis What to do with a Registry hive? RegRipper MiTeC Windows Registry Analyzer (WRA, not OSS) Registry Decoder Registry tools included with python- registry Pure Python Backed by stable API in python- registry hgps://github.com/williballenthin/python- registry 25

regview.py Kinda like regedit.exe. Except read- only. And cross plakorm. 26

findkey.py Search keys, values, paths with various queries. 27

4meline.py Timeline Registry key modificalon Lmestamps 28

Registry Analysis Workflow Windows Registy Analysis by H. Carvey 29

Event Log Analysis What to do with Event Log files? Parse- EVTX GrokEVT libevtx Carving library used by LfLe.py Carve for Records (not files) Jeff Hamm @ SANS DFIR Summit 2012 Pure Python module Evt.py hgps://github.com/williballenthin/lfle Parsing library python- evtx Even more Python hgps://github.com/williballenthin/python- evtx 30

Event Log Analysis Sneak peek: Event Log Viewer Open source GUI for reviewing event log files! Indexed search across events MulLple views of same data (searching, filtering, sorlng) Quite slow. Lets collaborate! 31

32 Event Viewer: Overview

33 Event Viewer: Details

34 Event Viewer: Structure

35 Event Viewer: Binary

Recap In the last 30 mins, we covered: GUI MFT browser CLI MFT Lmeliner and inspector GUI Registry explorer CLI Registry Lmeliner & ulls GUI EVT(X) tool and these work great for rapid triage! 36

37 Ques4ons?

38

39

40

41