Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
76 views
DF - Techknowledge - 3 Module
Uploaded by
Jayesh Patil
AI-enhanced title
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save DF_Techknowledge_3 Module For Later
Download
Save
Save DF_Techknowledge_3 Module For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
76 views
DF - Techknowledge - 3 Module
Uploaded by
Jayesh Patil
AI-enhanced title
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save DF_Techknowledge_3 Module For Later
Carousel Previous
Carousel Next
Save
Save DF_Techknowledge_3 Module For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 37
Search
Fullscreen
Introduction to Digital Forensics 1.1 Digital Forensics Defination, Digital Forensics Goals, Digital Forensics Categories - Computer Forensics, Mobile Forensics, Network Forensics, Database Forensics Introduction to Incident - Computer Security Incident, Goals of Incident Response, CSIRT, Incident Response Methodology, Phase after detection of an incident 12 1.1 __ Digital Forensics Defi 1.1.1 Digital Forensic What is Digital Forensics? CUEDEECAIEE Digital forensic collection, preservation, analysis and presentation of computer-related evidence. It determines the past actions that have taken place on a computer system using computer forensic techniques. Digital/Computer forensics is the process of methodically examining computer media (hard disks, diskettes, tapes, etc. for evidence. 11.2 Why is Digital Forensics Important ? 1. A few criminals are becoming smarter. So data-hiding techniques which includes encryption and steganography. The evidence of criminal activity is placed in such a way where traditional Search methods cannot able to find it * Encryption : Scrambling data, for example an e-mail message, so that it cannot be readable to the interceptor. Steganography : It is nothing but hiding a message into’a larger file, typically in a photographic image or sound file.gd Ferris 12 Iiroduction to Digal Forensics ‘Computer forensics isnt just about “detective work” ‘= searching for and trying to find out information, Computer forensics i also worried with “5 Senstve data handling responsibly and confidentially «¢ Taking precautions to not null Findings by corupting data “+ _Tokng precautions to make certain the integrity of the information. ‘© Staying within the reguation and guidelines of evidence, 1.1.3 Digital Forensic Process Steps cy os the process of aga forensics For forensic investigation there are following four common steps 1 Colecton 2. Examination 3. Analysis: Reporting ‘ig. 12.1: The forensic process 2. Collection = This i the fst phase in forensic process. In this phase data i identified, labelled ‘and recorded and gathering the data and physical evidence related to the incident being fnvested is done. Simultaneous integrity ofthe chain of custody is also preserved. 2 Examination : In this phase trom the collected dota identity ond extract the pertinent Information, using proper forensic tools and techniquet and also maintain integrity of the evidence. 3. Analysis In this phase results ofthe examination phase are analyzed. From the analysis useful ‘answers to the questions are generated which are presented in the previous phases. Most probably the case gets solved inthis phase. 4. Reporting: In the reporting phase the results ofthe araysi are done, which containe ‘+ The information pertinent tothe case ‘Actions that have been accomplished actions lef to be pectormed. ‘Moves left to-be performed. _Acvcated enhancement to processes and too. i? 1 gta! Forensics MU) 13 Irtrodition 0 (1.2 _ Digital Forensics Gost ee The following are the primary goals of employing digital forensics It aids in the recovery, analysis, and preservation of computer and associated materials 19 ‘ordet forthe investigating agency to submit them as evidence in a court of law the reason forthe crime and tha identity of the primary perpetrator. 0 Maids in determining ‘0 Cresting processes at a suspected crime scene to guarantee that the digital evidence gathered is not tainted, Data colection and duplication: Recovering lost fles and partitions from digital media In order to extract and evaluate evidence: ‘lows you to rapidly discover evidence and evaluate the possible impact of harmful action on the vitim Creating @ computer forensic report that provides 2 comprehensive report on the investigative process. © Keeping the evidence safe by adhering tothe chain of custody. 13° Digital Forensics Categories - Computer Forensics, Mobile Forensics, Network Forensics, Database Forensics 1. Computer Forensles : Tis computer forensics deals with computers embedded Systems and static memories ike USB drives. Extensive range of information from logs to exigina files on drive canbe investigated in computer forensics. 2. Mobile Forensics : As mobile phones began to become ubiquitous in the near the beginning, aught, this category emerged. Mobile forensics is used to recover data from the mobile ences. A mobile device Is generally defined as one with 2 built-in communication systom (GSM or SMS) and location information through GPS; however, mebile devices aso include cameras and US8 dives. I mainly deals wth the examination and analysis of motile devices. nips to reteve phone and SIM contac, call ogs, incoming, and outgoing SMS, MMS, Audio, vdeo, etc. 3. Network Forenses: Network forensics a sub-branch of digital forensics. Network forensics is related to monitoring, capture, storing and analysis of network activities to discover the source of security attacks, intrusions or other problem incidents. ie. worms, virus oF malware attack, abnormal network trafic and security breachesIntroduction to Incident 2.4.1 Computer Security Incident Computer security Incident is any inlaw, unauthorized Computer system or a computer network. Such an acti ae 1. Theft of the Tade secrets Email spam or harassment Embezzlement ‘Unauthorized of unlawful intrusions into computing 5. Denial-of-sarvice (005) attack © Bitortion 2 Any unlawful action when the evidence of such ac y lence of such action may be stored ‘exemple fraud, threats, and traditional crimes an 8. Possession or dissemination of child iid pornography, 142 Goals of incident Response ‘The goals ofthe incident Response ate as follons 1. To prevent a daconnected, no cohesive response. Coniirs or dispels whether an incier happened Promotes gat ring of ac rate itormaven, Establishes controls for proper reieval and handling of evidence Protects pivacy rights established by law and policy Minimizes damage to business and network operations 4 5 6 7 ‘Aliows for criminal or civil acton against culprits. gta Forensics MU) ovges accurate reports and useful recommendations provides quik detection nd containment and compromise of proprietary data. ion's reputation and assets: 410, Minimizes exposure 11. Protects your organiza 12. Educates senior management. ction and/or prevention of such incidents in the future, 433, Promates quick dete ee . son canes ben asd te Compu Seis RePone or nee pain f (CSIRT) willbe staffed. Lager businesses ‘with adequate resources may be able t0 assign pat ‘on a full-time basis. However, more often than not, sees ta have citer responsi in adion 10 25 coir ‘employees to crsis response tasks businesses wil be forced to use emg incident resporsa Personnel in the internal CSIRT are classified into three QroURs © Core team 5 Technical upon © Organisational support «Each member of the CSIRT is responsible for a certain duty. t requires more than just assigning employees and developing a policy and procedure document to build this capacity within an ‘vganietion An effectve CSIR, ke any big project venture, needs a significant amount Of effort. There ere dstnet duties and responsibilities for each of the CSIRT categories. This verse gicup of individuals is intended to give direction and support during a wide range of tuations, fom minor to disastrous 4.5.1 The CSIRT Core Team ‘The CSIRT core team is made up of people whe either work Full-time in incident response oF take on incident response tasks on the side. The core team is frequently made up of people assigned to the information security team. Other companies can benefit from individuals with Incident response experience. Some of the responsibilities that can be included in the core team are 2 follows: 1. The incident response coordinator The incidest response coordinator is often the Chief Secuity Officer (CSO), Chiet ‘formation Securty Officer (CISO), oF Information Security Officer ($0), as that individual 's often in charge of the overall security of the organization's information. Other organisations may appoint @ single person to act as the incident response coordinator. SeSees ee aro Fores 7 tnvodcton to Dita Forensics 3. CSIRT Analyst(s) © CSIRT Analysts are CSIRT professionals who have little exposure to or experience with Digital Forensics (MU 16 “The incident response coordinator isin charge of managing the CSIRT before, during, and “after an event In terms Of preparation, the incident response coordinator wil ensure that ny CSIRT plans ot procedures are evaluated on a reguar basis and modified as appropriate. Furthermore the indent response coordinator i in charge of ensuring that the CSIRT team is property trained, as well as overseeing testing and trining for CSIRT employees "= During an event, the incident response coordinator is in charge of ensuring effective incident response end remediation and guiding the team through the full incident response process. Coordination of the CSIRT with senior leadership is one of the most citical of these duties during an event. With the stakes of a data breach so high, top Jeadeship, such as the CEO, will want to be kept up to date on crucial event information. It isthe role ofthe incident response coordinator to keep senior leadership up to date on all incident-relsted actions, Finally, the incident response coordinator is responsible for ‘ensuring that the event is correctly recorded and that reports of CSIRT activities are given {0 the relevant internal ard external stakeholders at the conclusion of an incident. In “addon, all CSIRT operations are thoroughly debriefed, and lessons gained are integrated Inno the CSIRT Pian, 2. CSIRT Senior Analyst(s) ‘* SIRT Senior Analyst have significant training and expertise in incident response as wel ss related capabilities such ax digital forensics or network data inspection. They frequently have several years of incdent response expertse as a consultant or as part of an ‘organisation CSIRT. During the incident response process's preparation phase. they are Ivolved in ensuring that they have the appropriate skis and training to adress their Lnvque positon in the CSIR. They ae aso frequent instructed to help in the evaluation ‘and evsion of incident response plans + Finally, experienced analysts are frequently involved in the training of junior members of the team. Once an event has been detected, senior analysts will colaborate with other CCSIRT members to gather and evaluate evidence, diect containment efors, and aid other Sta with clean-up After an event, top analysts will engure that both they and other staf ‘property document the occurence. This wil entad preparing reports for internal and ‘extemal stakeholders. They wil also ensure that any evidence is preserved or destroyed in accordance with the incident response strategy incident response operations. They frequently have only one or two years of incident response experience. As a result, they can engage in a range of tasks, some of which are directed by senior analysts. Analysts’ skils will be developed through training and ‘exercises throughout the preparation period ‘= They may also be involved in incident response plan evaluations and uparades: They will be charged for acquiring evidence from possibly hacked hosts, network devices, OF diferent log sources during an event. Analysts wil also particinate in evidence analysis and will support other team members with remedial efforts 4. Security operations centre analyst Larger companies may have a 24/7 Security Operations Center (SOC) monitoring capacity in- house or hired. When it comes to incident identification and alerting, analysts assigned to the SOC ae frequently the point person. As @ consequence, having @ SOC analyst on the team allows them to be taught on methodologies and respond to a possible security issue practically immediately 5. TT Security Engineer / Analyst(s) + Depending on the organization's 2¢, there may be employees particularly assigned with the deployment, maintenance, and monitoring of security-related software such a6 anti- virus or hardware such a5 firewalls or SIEM systems. When an issue has been detected, having immediate access to these devices is important. Personnel assigned to these tasks: vill frequently have a direct part inthe whole incident response process. The IT Security Engineer or Analyst will frequently be responsible for a substantial portion of the incident response process's preparation. + They il be the key resource for ensuring that security apps and devices are correctly set to siete tema issues and thatthe devices property log information so that events ‘may be reconstucted. They wil be entrusted with monitoring security systems for saditonal signs of hese conduct during an event. They wil alo help the other CSIRT ‘members gather proof from the security equipment. Finally following an event, there People wil be charged with setting security devices to watch for suspicious behaviour in oder to confi that remediation operations hve removed malicious acthity from compromised systems.Wout ris 0) es eS 15.2 Technical Support Personnel Technical support employees are those inside the company that do not have CSIRT activities ag Parvof ther day-to-day operations but have knowedge or access to systems and proceduts thet tay be impacted by an event. For example, the CSIRT may need to hite a server administrator to help the core team colect evidence from serves such as memory grabs or logs. Ones accomplished the server administrator's job is complete and they may no! be involved in the event. agp. The following are some of the people that can help the CSIRT during an incident: AL Network Architect/Administrator : Network infrastructure is frequently involved in incidents This covers router, switch, and other network hardware and sofware assauits. The Network ‘Architect or Administrators citical for understanding typical and abnormal behaviour of thesa devices, 25 well ar recognising anomalous network trafic. In events invoiving network Infrasnucture, these support staff can help acquire network evidence such as access logs or packet captures 2. Server Administrator : Threat actors trequenty target network systems that hold vital or sensitive data. Domain contrliers fe servers, and database servers are common high-value Targets, Log files from these systems can be obtained with the assistance of server administrators. Ifthe server administrators) are alo in charge of active divectory structure management. they may be able to assist with detecting new user accounts of making ‘modifications to existing user or administrator accounts, 3. Application support : Threat actors frequently attack web apps. Some securty breaches are caused by coding flaws that enable for attacks such 3 SQL injection or security misconfigurations. As a result of having application support stft a part of the CSIRT, direct Information about application assaults is possible, These experts are frequently able to spot ‘code modifications or validate vulnerablites found during an examination into 2 posse application attack. 44. Desktop Support : Desktop support workers are frequently invohed in the maintenance of ‘ontros such as data loss prevention and anti-virus on desktop computers. In the case of an Incident, they can aid in delivering log files and other evidence to the CSIRT. During the incidents remeciation phase, they may also be in charge of cleaning up affected systems. 5. Help desk : When it comes to recognising an issue, help desk staff are the proverbial canary the coal mine, depending on the company. When a user detects the fist symptoms of @ malware infection or other harmful behaviour, they are frequently the fst peopie contacted, AS 2 result help desk staff should be included in CSIRT response training as wel 36 ther involvement in incident identification and escalation protocols. In the case of 2 g® ‘occurrence, they may also aid in locating ather impacted personnel, introduction to Digital Foreesics Dioital Forensics (MU) 19 [53 Organizational Support Personnel ; jvisational members thet shouldbe included in the CSIRT should be included outside ae ‘non-technical concerns that na help witha variety of ofthe technical area Organizational people can i : jed by CSIRT cote and technical support personnel. These include navigating tt ae nat handle ae a ‘of the organisational support individuals who should be included in a CSIRT Plan are as. pds ses nota od ns yn es dae Ger poebemeiapemicens anne Sr eee vse tech fri ene oy ae ee Sceceee on cy acer ee nue soa saa a apeso Gnas ores cor a Soe ee th ae se Seema awe renee aes eal ee 2 Human resources : Employees or contractors are responsible for many incidents that occur in businesses. The CSIRT may be called in to examine acts ranging from fraud to large-scale data theft. 1 an employee or contractor is the subject of the inquiry, the human resources: ‘department can asistin verfying thatthe CSIRTs operations are in accordance with applicable labour ans and corporate regulations. I an employee or contractor isto be terminated, the CSIRT can work with human resources te ensure that al necessary documentation on the event 's completed, reducing the possbity of wrongful termination claim. Marketing/communications : fan incident, such as a Denial-ol-Service attack or data breach, ‘may have a negative impact on external diets or customers, the marketing or communications ‘department can assist in crating the appropriate message to assuage fears and efisure that ‘hose extemal entities are receiving the best information possible. When looking back at Previous data breaches, there was a reaction against those businesses that tried to keep the {22 to themselves ae did not notify customers. Having a good communications plan in place 2nd Putting it into action eary can go 2 long way toward calming any possible consumer or ‘ent negative reactions facties The CSIRT may requ access to places after hours oF for an extended period of Sree lactis cepartment can asi the CSRT in acquiing the appropiate acess a soon, irene nie Sectional, elites may have access to era meeting places forthe CSIRT to use inthe cove ofa lng-term cis that necessitates dedicated workspoce and infrastructure, eeWoigtal Forensics WW) 110 Introduction to Digital Forens Corporate sbcurty: The CSIRT may be called in to deal with an organization’ theft of net tops and digital material is quite prevalent to corporate security, They track employee and ote resources or other technotogies. Theft of la Survellance footage from entrances and exts is frequently avaiable may also keep access badge and visitor records for the CSIRT to personnel movement within the site. This alos fr the reconstruction of events before a theft or other conditions that led up tothe incident y 15.4 External Resources part of a broader attack on 2 numberof similar businesses. Relationships with other organisations and agencies can help the CSIRT share inteligence and resources inthe case ofan incident. Among these resources are the folowing 1. High Technology Crime Investigation Association (HTCIA) : The HTCIA is a worldwide ‘organisation of professionals and students dedicated to the investigation of high-tech crime Resources range from digital forensics techniques to enterprise-ievel data that might assist (SIRT staff with new approaches and procedures, 2. tnfraGard = The Federal Bureau of Investigation has established a private-public collaboration simed at networking and information sharing for CSIRT and infomation security practitoners in the United States. This colaboration enables CSIRT members to share infomation about ‘ends and discuss previous investigations. | Lawenforcement: There hes been an exponential increas in cyber-related criminal ats 1s 2 result, several law enforcement agencies have strengthened their capabiities 10 investigate cyercime. Leadership of the CSIRT should establish relationships with agencies that have cybercime iwestigation skll. Law enforcement agencies can give insight into specific teats or crimes that ere being perpetrated, 2¢ well as providing CSIRTS with any {ofoxmation that is of concer to ther. ‘4. Vendors :In the case ofan incident, extemal vendors can be used, and wnat they can ge {requentiy based on the specific in of business in which the company hes engaged ther. Fer ‘example, an organization's IPS/IDS solution provider may be able to assist inthe creation of bespoke alerting and blocking rules to aid in the identification and containment of malicaus acthiy, Threat inteligence vendors can also give recommendations on harmful befacut indications. Fnaly, some companies will need to employ vendors who specialise in a cea Incident resporse expertise, such as reverse engineering malware, if such capabilis ‘outside an organization's competence. Incident Ré iceted troubles like any complex solve the incident problem. In this, ‘to components and test the inputs ity incidents a lem. Black box approach is used to problem of incident resolution in computer secu engineering pro aperoach divide the large and outputs of each component Fi, 1.61 lstrates our approach to incident response, - wot fo co) aL troduction to Digital FOFENSIES gt Foren7 We dIcial Forensics aauy 12 srroduction to Dial Forenieg tion to Digital Forensics gal Forensics (MU) 333 Introduction to Digi Tou methodology, there are seven important components of incident response To meet the challenges a document SG PreciderR broperetion; In tis phase acions are taken to prepare the orpeiateyll _quvatesthe hil responce sep and the CSIRT before an incident occu, Inia Responee stops © Detection of incidents In this chase potential computer security incident is klentie, Re, © Keitel responce : In this phase an ina investigation is performed, The basic deta ‘gag! Sumounding the incident are recorded. The incident response team is assembled and 2 individuals who need to know about the incident are notified : ‘tal Ino One Pont al © Formulate recponse strategy : In this phase best response is determined and the om pone management approval is taken based on the resus of al the known facts. What types of a inistrative, oF other actions are appropriate to take are dete Pena vl, criminal, administrat ther act ‘appropriate to take are determined, Den ‘based on the conclusions got from the investigation, T ‘© Investigate the incident : In this phase thorough collection of data, To determine what Incident happened. when it happened. who did i, and now it can be prevented in the hiture is poem reviewed from the collected data L © Reporting: In this phase information is accurately reported about the investigation in a | feos ‘manner useful to decision makers. "© Resolution : In this phase security measures are employed. For any problem procedural } Fee i ‘changes, record lessons leamed, and develop long-term fixes are denied | ‘scala ai mombore 1.7__ Phase after Detection of an Incident 3 ig. 17.1 :Initial response Phases The phase after detection of the Incident is intial Response whichis depicted in Fig. 1.74. Ths cee Section discusses the activities of the inital response which is the phase afer detection of an Obtaining Preliminary Information incident. tn this section we wil see what actions the organiza ‘computer security incident will take after detecting the ‘The ital steps of any investigation are to get enough data to decide a proper response. That 's the objective of the inital resnonse stage. Your organization's initial response ought to Initial Response Phase Incorporate exercises, fot example the accompanying 1. Receiving the inital notification of an incident. When computer secunty incident occurred the organization wil face many chatenges. So thet ic Recording the details ater the in nm {© need of process that supports the falloing ‘ing the detals after the intial notification Assembling the CRT. Pesforming traditional iwestigatve steps. ; Conducting interviews Determining whether the incident is highlighted. tiication ofthe participants required to assemble your SIRT Sabet te eee a ites se nSSS | Wop eis my 1 Fesicen coll oe ce - inane Documenting Steps to Take 2 a taken. By ‘e The members of the CSIRT use the checklist to address the technical details surrounding ‘exact number: attads MN have an the incident. I is important for the CSIRT members to personally respond to obtain and umber ofthe kind of attacks that happen, thir recurence, the harm brought about by they "aaa a Clonee attacks, and te impacts these atacs had on your organization. Such measurements ae base tg Te inita response checks is used to address the folowing issues: ‘measuring the return on irvestment (ROH fr having a foralzed incident response program, ‘9 Make and model ofthe relevant systems) 1. Establishing an incident notification procedure ‘The other reason for the initial response stage is to document steps that should be Fecording the subtle elements of an incident in a composed manner. your orgarization wi System deta To fabricate a strong incident response program participation of every one of your employees 16 required. h your organization incident response ought to be everybody's top prio, is - v hd eye ee peor 0 The systems primary user. fundamental t0 build up 2 notification technique for cients to report potential computer ‘Security incidents. As a major aspect of your current security awareness © Operating system. © System administrator forthe system(s). rogram, you ought to achise the end clients of how to report incidents (by telephone, email, intranet site, or other 2 Network address or IP address ofthe relevant systems. System). Ukewise, think about making as a computer secuity anareness notice that has the © Thesystems network name. Saltable instrument to report a potential computer secunty incident. Making the incident © Whether there 2 modem connection to the systems). ‘esponse handle lear to cients will maintain a strategic distance from confusion. ‘© Critical information that may have resided on the systems). 2. Recording the details after initial detection © Incident containment. To develop an organized incident response program chectits are required, So intial response Wether the en ip Bees Ra checklists thereto record the deta after the initial notification ofan incident © Whether network monitoring f required or being conducted, Initial Response Checklists : : © Whether the system is stil connected to the Intemel/network: if not, who authorized ‘The intial response checklist is a mechanism of recording the circumstances surrounding & the removal of the system from the network and when i ill be put Back onfine. cent_The initial response checkist is divided into two separate points Whether bay sn sl cae ga 2 General information| b. More specific details ‘Whether there is @ requirement to keep knowledge of the incident on a “need-to- know ati, © Whether any remeclal steps have been taken so far (euch as packet fitering, new \ ‘& General Information | ‘access contol sts, new firewall ules, of some other countermeasure). } ‘Genera Information does not contain more technical information, This information is used to © Whether the nomaton clected s beng stored protected tamper-proof s ‘respond the end usr the following information ‘© Date the incident was detected, © Preliminary investigation. F ‘Contact information ofthe person completing the form. © TheIP addresses invclved in the indent. Contact information of the person who detected the incident. © Whether ay investigative steps or actions have already been taken, ise of echt *® Whether a forescdupication ofthe pertnan ystems needs tobe made ora logical £96 of the relevant system wil do. Se ei0a Foes 04 Case Notes ‘Chechists are too complicate. The alternative to checklist is case notes. Case notes is ‘documentation which records the steps that are taken duting your incident response proces This is the duty of the member of CSIRT to maintain wel-written notes of the deta surrounding ofthe incident. 145 Introduction to Dig Foren Incident Decloration 3. Assembling the CSIRT Severa organizations form the e CSIRTS. Some CSIRTS ae formed dyramically according parcular response to an incident, instead of an establched, cenialzed team whih ‘edited to responding to incidents. To prepare a team for a partclr incident, ora have to identi the types of sil and resources required from the rest of the ergniton ‘espond to that parecer nciden. There sno need to go through notation procedues increase ofa Its important to understand that the reported activity is computer security incident, Hf you come across a suspicious activity which presents an incident but you are not sur ‘about it then consider it ae an incident unit is proven To avoid spending time on no incident. there are afew questions that can be considered (© Was there a scheduled system or network outage that caused resources to be unawilable during the time the incident was reported? ‘© Was there an unscheduled and unreported outage of a network service provider that Caused resources 10 be unavailable during the time the suspected incident mas reported? ‘© Was the affected system recently upgraded, patched, reconfigured, oF otherwise modified in sucha way as to cause the suspicious acthity that was reported? ‘0 Was testing being performed on the network that would lock out accounts or cause resources to be unavaiible? © For insider incidents, are there any justications forthe actions an employee has {ken that remove or lessen the suspicions? 1h case when incident i occur and you are not able to tell it immediately at this time ‘assgn the incident a case or incident number, making 2 real incident. wont investigating, ident untd a certain incident cecurred. Preparing the CSIRT requit ital Forensics (MU) >. Determining increase procedures b. Implementing naification procedures i ‘scoping an incident and gathering the proper resources, including assigning a team leader and the technical stat Determining Escalation Procedures “There is no need of absolute response for every incident with an international CSIRT mobilized for he worst-case scenario, An assurance is required whether the incident handle at local evel cet ihe corporate level I there is an irvclvement ofthe internal employes inthe inant — ten it will damage only local business unit. It dows not include theft of trade secrets or disclose the data of cent which handled at loa evel. ousicer i involved inthe incident then affect ripe locationg, sts be handed atthe corporate level Implementing Notification Procedures +The ergarzation must central point of contact for al detected or suspected incidents ‘Make this point of contact 2 permanent member of CSIRT who is well versed in your ‘organization's acceleration and notification procedures. ns +The pons of cont for organization's SIT individual shouldbe set up much sooner than an incident happens. Maintain this information in notification checklist The ratication checks contin the informtion required to contact ll the team members. ‘The CRT members must have fo know at what time use the recorded conte information receded organization's notation chcit and when to not the proper people an ongoing inccent. Internal investigations often require diverse rules of notification than Cerna security incidents yu rotty mximum people about the interna investigation te thee ate hinges tate subject of mvesigntion wl nd he/she the ene tan invention Notation should vole ony people tat © Need te know about ne ivesigaton. © Can really help with the investigation. © Wi not be conse. paced r otherwise hinder the investigation. © Ae not dear end ofthe suspect. ‘Scoping an Incident and Assembling the Appropriate Resources Incident response neds quick decsions, andthe speed at which you act 1 easton tine and mone a wala elects on is reputation, When you fist step isto determine the specialist required for the work. The nur Opes On the tan cepend on thee factor :138 Invoduction o Digtl Foren, Digital Forensics (MU) ‘© Howmany workstations involved in the incident ? ‘= How many operating systems involved in the incident? ‘+ How many systems that are involved, vulnerable, or exploited ? ‘+ Timeframe in which the investigation needs to be performed Potential exposure or profile of the case ‘© Your organization's desire fora big or small investigative team, ‘© Whether or not litigation is probable? ‘© Whether itis an internal investigation? ‘+ Whether the subject of the investigation is aware of the investigation? 4. Assigning a Team Leader (Organizations must have to select @ team leader because all computer related investigations require professional: who understand technical aspects of the incident as woll as the Investigative process for computer security incidents. To ensure that you have ‘effective team leader, you should select someone who can perform the following tasks ‘© Manage the organization's CSIRT during the entre response process. ‘© Manage the interview process when talking to witnesses, system administators, end users, legal counsel, managers, and others + Provide status reports and communicate effectively to management on the progress of the response. ‘= Ensure that best practices and proper response techniques are used. © Provide overall anahsis ofthe incident Protect the evidence gathered during the investigation in @ manner consistent with yout levdence guidelines and instructions. ‘smaller organizations that cannot hav need to request support from other business units and create 2 CSIRT com} appropriate technical advisors dindesstand the details ofthe systems and the technologies involved in the investigation. These introduction to Digital Forensics Wy vig Forensics MU) 1g E ‘Assigning Technical Staff 1 full-time CSIRT need to assign technical staff. There is 2 posed of the ‘The technical advisors are employees oF contractors: WhO, people want to possess the following characteristics knowledge of Complete operating sytem. ‘Ability to review logs, aude tals and other trace evidence and to clearly report findings, Knowledge of proper evidence-handing techniques. Ability o perform proper damage assessments. Abit to assist in determining the scope of an incident [Ability to determine the nature of the incident and identify the specific technical detalls ‘that suppor their conclusions. ‘Abily to make recommendations of how to remedy the situation. Capacity to meintain the perspective that technological evidence including audit trails, logs core dumps, or Ive data callection may be critical to resolve the incident. Documentation skis to record all investigative Steps clearly and concisely. Ability to suppor the team leader. Ability o perform interviews when needed. (Once the CSIRT or investigative team & assembled, you are ready to begin the Investigation. 5. Performing traditional investigative steps 5 ‘he imestigaton phase Ives determining the surounding ofan incident inthe frm of who, what hen, wher, how. Thar ae wo waye fo simply a technica investigation isto Civ he evidence you colet nto tre categorie: ; + Host-based evidence: For the host bated evidence data \s collected from Windows or Unicmachines oom the device actly cred nthe cnt Network-based evidence : Network-based evidence fs coléited from routes, 105 network monitors. It ‘may be possible that some network node, not immediately involved in ‘the incident. ) Take responsibilty for verifying the chain of custody of evdence. Perform forensic duplication and analysis if necessary. “Compile, manage, and present the investigative report and offer recommendations 12 the legal issues and corporate polices. unbiased vestigation with no conflict of interest,jal data that contributes to the cas ‘eample motive Intent and ot some other digital evidence. t also consists of othe “information gathered from the people. This is when you gather personnel files, int employees interview incident witnesses, interview character witnesses, ond document the Information gathered Other information can include voicemail systems, time cards, card ‘wipe data, physical secuty logs, vdeo camera tapes, employee records telephone call logs and tax logs 6 Conducting interviews ‘When your CSIRT come across of a suspected incdent, the fist step is to start asking the { questions tke what who, when, where, and how’. These questions helps you to determine some facts surrounding the incident, for example the location of relevant systems, administrative contacts, what may have occured ‘may be no answer for some questions but if you gather more answers it helps to assess the Situation Some few important questions to ask while forming your inital aecumptione about an + What happened? ‘+ When did it happen? + What systems ae elevant/compromised/nvolved? + Who may have dove it? ‘+ Who uses the afected/relevant ystems? + What actions have already been taten? + Whats the corporate poicy on such an incident? nes Getting Contact information ; {ind users may provide pertinent information when he During the interview collect each individuals information like Full name, Job ttle, Company describe anomalous behaviour on the system in a helpful ‘ame, Phone number, Email address. This identifying data is citical if you need to 2. Formulating : « - 4 response strategy % ___ thet People for actions information. When you prepare your report, you should include __ tecontat information foreach person who provided you with information Imterviewing System Aaminstrators = art ceien wis the system administrator oF the «TRS 5 tse when noticaion ofthe suspeced Incident comes + Have you noticed any recent inappropriate activity? «How many of them have administrator access to the systarn? «+ Which applications provide lated acces on the system? ‘+ What are the logging capabilities ofthe network and «+ What saety measures for security ofthe system are taken? Managers regulary have advantageous bits of knowledge into ‘caused by security incidents interviewing manager is often critical involved with the security indent and what damage was truly «ample questions for managers: ‘+s there anything particularly sensitive about the data and ap ‘+ -Are there any personne! issues of which we should be aware? + Wes eny type of penetition testing authorized forthe system + What is the worst case scenario that can play out based on « incident? when ete it may be possible that therePipe rete 2 Introduction to Digital Foren folloning are some common factors yc For determining your response strategy i consider. | + Doesyour organization have a formal/public posture on responding to attacks that it mut adhere to in order to appear consstent to customers and the media? 1s the suspected attack from overseas, making it more difficult to pursue technically and 1+ Are there any legal considerations that may affect the response? + Can.you rik public disclosure of the incident to chents orto the public "+ How have you enforced same incidents in the past? What is the past record/work performance ofthe individual(s) involved? + Wilthe investigation cost more than merely allowing the incisert to continue? Policy Verification Inthe iil assessment first stepe taken je to determine the existing palcy. The policy which ‘addresses the two fundamental needs of the Investigator. network monitoring and computer {forensics examination of computer systems got the highest prot, Monitoring may be limite, legally? ‘= _sthe strategy worth pursing from a cost/benefit standpoint? without appropriate policy or banners on systems, I is also necessary to make sure that ery, | ‘exsting acceptable use and consent to monitoring polices apply to your situation, | @.1 Whats Dipta Forensics? Spin tne process of hl oer. @.2 Whats Dita Forensics? @.3Wnatarere goals tia forensics? Explain Varouscatgorie cf ial fronis. Q._ Whatie Evidence? Digital Evidence, Forensics Duplication and Digital — Evidence Acquisition 2.1. Digital evidence, Typet of Digital Evidence, Challenges in acquiring Digital evidence [Admissibility of evidence, Challenges in evidence handling. Chain of Custody 22. Digital Forensics Examination Process ~ Seizure, Acquistion, Analysis, Reporting, Necessity of forensic duplication, Forensic image formats, Forensic dupiication techniques 23. Acquiting Digital Evidence - Forensic Image File Format, Acquiring Volatile Memory (Uve Acquistion), Acquiring Nerwelatile Memory (Static Acquisition), Hard Drive Imaging Risks ‘and Challenges, Network Acquistion 22 sn the various types of digtal evidence? ‘The evidence is any information of supporting value, that means which proves something oF helps to prove something relevant tothe case. The digital evidence consists of the data on a computer, images audio and video files lis & data and information of value to an investigation that is stored on an electronic device, ‘received or transmitted by an electronic machine. ‘You can acquire the evidence when data or electronic machines are seized /in custody end ‘secured for the examination. Examples of evidence are a fingerprint. DNA. files on system ete. ‘The problems in acquiring digital evidence are (2) Digital Evidences can be easily modified, damaged or destroyedDigital Evidence, Forensics Duplication and Digital — Evidence Acquisition 2.1 Digital evidence, Types of Digital Evidence, Challenges in acquiring Digital evidence, Admissibility of evidence, Challenges in evidence handling, Chain of Custody 22 Digital Forensics Examination Process - Seizure, Acquisition, Analysis, Reporting. Necessity of forensic duplication, Forensic image formats, Forensic duplication techniques, Acquiring Digital Evidence - Forensic Image File Format, Acquiring Volatile Memory (Live Acquisition), Acquiring Nonvolatile Memory (Static Acquisition), Hard Drive Imaging Risks and Challenges, Network Acquisition 2.1 Digital Evidence Q. What is Evidence? Explain the various types of di (aCe ne) * The evidence is any information of supporting value, that means which proves something or helps to prove something relevant to the case. * The digital evidence consists of the data on a computer, images audio and video files. It is a data and information of value to an investigation that is stored on an electronic device, Feceived or transmitted by an electronic machine. * You can acquire the evidence when data or electronic machines are seized /in custody and Secured for the examination. Examples of evidence are a fingerprint, DNA, files on system ete. The problems in acquiring digital evidence are {@) Digital Evidences can be easily modified, damaged or destroyed. (©) Digital Evidences are time sensitive.———— — * sics Duplt 6 Dig. Evid. Acquistion ig Evid, Forensics Dupli.B 22 dig. Bd, Foren gta Forensics MU The places from where you con phat evidence “Testimonial evidence : Testianal evidence is nothing but the statement of 3 witness External hard drives underneath oath either in court or by deposition. This sort of evidence normally Helps OF ae Sinaia 9 Pendive validates akemative types. a eee aes Demonstrative evidence : Demonstrative evidence recreates OF ‘explains the different (Ww) Thumbdrives “talk for itsel” and Is used to demonstrate and evidence. Demonstrative evidence does not Cosnd ovo I) Celipones and maitedeices i) Voie over phones te dear previous point Tis srt of evence masdmam helpful in explaining technical (6 Answering machines 9) iPods tops to ron technical audiences. (aon een 2.1.2 Challenges in Acquiring Digital Evidence fi) Digalvideoreconers Twos) «GM. igtal canes = ae Ceminal use a ately oF trtegies to thwart digital forensic investigators including destoyng P and conceaing the evidence, ane! seizing digital devices governed by diferent aws in ciferent Gor) Severs anes | sees end ration. The principal challenges that examiners have hie acquing igtal evidence are a) sites fo) Wrelss acess pint ieee (ec) Printers that butfer Fes 1 Apassword:, access-card-, oF dongle protected computer (iy Proto-copless that buffer fles (Ge) Scanners that buffer files 2 Using digital staganogrephy to hide evidence-gathering material from pian view and in plain sight in photos, movies, audio fles, and fle systems (eg, within MS Word document). (xy Faxmachines 21.1 Types of Digital Evidence £ 3. Data obscuration methods to obfuscate information and vender it uninteligible witheut the ‘he types of evidence are password 5. Secure system/volume passwords that are difficult to guess: this saves time and money. 6. Renaming files and altering ther extensions (eg, changing DOCK into DLL, which is a known 2 Decumetay adderca Windows system fle type) I “1 Atemots ta era evidence by employing varius software tools and methods to safely wipe the hard disc 8, When available, tuming off systen/application logging and clearing the web browser's history Fig. 2.1: Types of Evidence before closing it. es 4 1. Real evidence : Reel evidence are somet f Sere err retin ot een aye scarica at sh 9. gia! media that has physical ham for instance, we are unable to recover erased contents oe most powerful evidence. This evdence typical: {rom ofeling HOD before fing it ee we 10. Digital evidence is sensitive and could be lost if not handled appropriately. The media device © Sema an ew ety | hc a eo _ | Seiad oe database document etc. Cocumentaty 11, The ease with which digital evidence can be changed; for instance, if a ngeee ONT Profess ‘and therefore m trust leave it ON anc i a al feasible, acquire ts volte memory but f the computer is OFF, {eave it OFF to prevent any data from being changed. a tne eed- *) -_ = eee Fach 24 Dig. Eid, Forensics Dui & Dia. Ed. Acquistion Seapets parg oe conn See ron exase ine on CO IEE Me Be ccs oven cartier lenin Fe econ os orn x et ino ar « UE to di Be ated rater ay ented on poser pote Force scm eins dyes cre ice ita et paervtin on widence and the seizure of devices (and 2.2 Admissibility of Evidence = Evdenceislaglly admisibe if and only itt meets the following criteria (© iS presented in order to establish the facts of a case; and {© doesnot infringe on the Constitution or cther legal provisions © The goiden rule of admissibity states that any evidence that may be rolevant is admissible, but evidence that i ieievant i inadmissible As result the courts must decide whether digital evidence is relevent to the cisputed facts of the cate and iit approprate and safe to inclide in procaedings. in practise, admissibility Fefer to a series of legal tests performed by 2 judge to evaluate a piece of evidence based on the folowing criteria 1, Relevance and reliability -
Evi. ‘s _ IL is alo possible to do celective acquisition ofa certain file(s (e, acquite e-mail files only {rom the target machine or when we want to capture al photo fies existing on a suspect dive). nen dealing with some sorts of chil action, logical acquisition may be the only viable iterative (0-dscover). You may also use search terms to look for a specific keyword or seywords throughout large datasets and then only get the resus. : Digital Forensics (MU) 2.25 Dig Evi, Forensics Dupli 8. 2.11.10) Sparse Acquisition ‘This method is similar to logical acquisition in that it captures just certain files pertinent to the studied case; however, deleted data and fragments thereof are also obtained throughout the capturing process in sparse acquisition This strategy is frequently utlised when undertaking static acquisition on RAID systems or on systems where the suspect was not technically red enough to apply ecvanced antiforensic measures. sophisti ‘+ There are numerous sors of software that may perform hard disc acquisition, we will utilise FTK Imager @ free and dependable programme. 2.12 Hard Drive Imaging Risks and Challenges ‘Acquiring hard drive images is not always an easy procedure; difficulties can develop that initate the examiner or make the process more complicated and time consuming. In this section, we will discuss the most prevalent difficulties that investigetors may encounter when acquiring forensic. images. 1. Network attached storage (NAS) ‘= tletwork attached storage (NAS) units are becoming increasingly popular in the home; home users are increasingly adopting NAS to backup laptops. desktops, and smartphones, Jn addition to storing a large quantity of multimedia content on e centrel storage device. ‘so reslt, cquirng such devices becomes increasingly cri ‘+ NAS devices are cutfited with their own dedzated operating systems, which are typically Linux variants, To properly acquire the data on these devices (including unallocated hard rive space). you must undertake bit-by-bit acquisition, which necessitates the use of an ‘examine with Linax expertise. The sheer volume of data wil aso require tme for capture ‘and analysis. Sparse acquisition can be used to tacle this problem. : Encrypted Hard Drive ; We may find oursees in @ postion where we need to obtain a hard ‘ive when itis encrypted (FD. As we inccated in the "Acquinng Volatile Memory (ive ‘Acquistion section if the computer isi functioning when you ative atthe crime scene, you should ty 10 acquire its volatile memory a £000 as possible hecause there is a good chancea 3 en 2.26 big tid, Forensics Dull 8. Dig. Ed. Acgutg | can recover encryption keys fom if = Be ccc tr dv ac then tet fo deep ung the Drer LON Gal errer gers exces peenor dcypton sing suc ook) or st ak the har ig cannot ner forthe password posi. 4 corrupted or Physcaly Damaged Hard Dive:1 the supect hard dsc has pss damagg Jou be vate to tee is data units reared by 2 hardnare profession Fist Mag tpialed compares cn recover data om damaged hard dss forensialy modern poi labs can slo do this, However, regardless of the damage tothe questionable hard drive, yoy should not discard it instead, take ito » competent tecrican Because the date on it may be ive accuistion s not possible, your only choice’ jg recoverable & loud Data Collection : Cloud computing has revolutionised the way many IT services arg (generated, provided accessed, and managed in recent year. Cloud services, for example, ae ropidly being used by businesse: and people to eate data sharing and minimise Tl Infastucture expenses. Traditional diitl forensics practise is impractical in 2 cloud setting {ue to the neture of coud computing architecture. Because of the dynamic nature of coud) Computing and its relance on virualzation technology, as well as the distnbution of cloud Computing components (eg, servers, natworks, applications, and services) across diffrent (geographical areas, forensic examiners will face serious legal (multiple jurisdictions), technical (€9, too requied to acquie data evidence), and loaistcal chatenges. 5. Network Acquisition Network forensics foces simiar issues to cloud forensics; for example, e-rime, which invaives the use of neiworked computers, son the rise. When working on criminal cases Iiwoiving the usage of computer networks, you should expect to confront the folloning | challenges 2 2 forensic exper. © You wil aimost always need to collect and evaluate enormous amounts of data (eu Acquistion: of redundant srry of independent ciscs [RAID], which involves two ot move. hnard dives), Yeti md ci sis eee cn be +e eae cn be sen sco dot dase “: ‘inthe target network aa There wil be ergniceonl sues Thee st imposed by the corporations which request investigation; for example, you cannot a "buses Stop © specific service because itis crucial for A Digital Forensics (MU) 2:27 Dig. Fu, Forensics Dupk. 8 Dig. Evid Acquisition ‘The presence of different jurisdictions may present dificultes; for example, there have been instances where e storage server was located in Europe but the investigation or the ‘breach was conducted in New York. How will you addres this legally? Other legal issues crise when different jurisdictions impose different privacy regulations; for exemple, in @ network breach, prvete information (such as information about customers. partners, Of employees) may be exposed to the examiner, and auch data may be protected by different privacy regulations 6. Forensic Tool Limitation : Some acquisition tools are incapable of acquiring foulty sectors from an HDD. Bad sectors should be recorded because they can conceal incriminating information. For this issue, alvaye contult a professional examiner and tool documentation. Using the Raw file format may result in not collecting faulty sectors from a questionable HDD, which should also be considered. 7. Other Challenges : Steganography (data concealing). covert channe's, antiforensics methods, and assaulting the forensics tools itself are all probleme when gathering digital evidence, 01 a2 as a4 as ae a7 0.10 an a2 Cory ane \Wrat is Eviionce 7 Expat vaso types of tal evidence. \Wral ao he chatengesin asxsting Digtl even? Wet is Evidence? Explain he Admit 0 Evcence \Wrat ae the Challenges in Evidence Handing? Wt srt note on Chin of Cust ‘plan n deta Digtal Forensic Examination Proves. What the Necoeity of ForesieDupoaton? xpi the Forensic image oma plan in dtl forensic cupeatontchnaues. "xplan mporareso! oer dpc ad ts meth abo sts some duptcaton tool Detinsforenis cptcato? How you wire eons dpi ofa hard ve? plan ho toa ia dence xplan voile deta cotecton for winds sytem, Explain howto acquire Non-woae Mem) (State Araueton), 2.18 _ What aro the Hard Dive Imaging Risks and Challenges?Forensics Investigation oak 3.1_ Analyzing Hard Drive Forensic Images Baa 3.1 Analyzing Hard Drive Forensic Images, Analyzing RAM Forensic Image, Investigating Routers 32. Malware Analysis - Mabvare, Viruses, Worms, Essential skils and tools for Malware ‘Analysis, List of Malware Analysis Tools and Techniques “The hard drive is the most common type of data storage used in @ computer system it holds ‘the majority of computer users’ and organisations’ data When a hard drive becomes involved ina legal investigation, it should be legally abtained, as we saw in the previous chapter, and reviewed for information that can aid in the resolution of the incident “Today's hard drives are huge and frequently contain a massive amount of data its the forensic ‘examiners job to explore ths data and connect the dats in order to solve a crime or explain hat happened during en occurrence. We wil lea how to mount and analyse collected hard isc forensics images using various tools, with an emphasis on open source and free technologies. Arsenal Image Mounter ‘Arsenal Image Mounter is a tree and open source opplication. It can mount forensic images as whole dses (actual SCSI drives) on Windows, allowing investigators to view image contents asf ‘they were browsing any directory of files. While the free version may mount any forensic picture, the premium version includes more functionality | | me saris ps ome Wee onan ‘Moyne age 9 wale dak rica Moca wb wt ‘rage (Couto Botan mas a ona at ages enema Sosa se: ($12 5 pot a ancom det grat Wado. Veh ek nag coma Sgt sway sempre wens oe pare (nga on mat removable’ it See Fig, 2.1.1: Image mounting options: select “Read only” to avoid ‘writing data tothe questionable image This application supports forensic photos inthe Raw and EnCase file formats 5 wel a al fle systerns used by the Windows operating system such as NTFS and FATS2. 1 is quite simple to use this tool : go to htpsi/arsenareconcomy and dovnload the programme to your PC. Because Arsenal Image Mounier is portable programme. simpy runt tnd then click the "Mount Image” button in the main programme window to choose the image fle; the viilty wil then prompt you for mount choices. Check the fst checkbox, "Read onl” fad then click the "OK" button, ‘The forensic image will now be mounted in Windows as 3 vrual dive accessible wa Windons file explorer) as if were a local drive.paras ES 4 pos sar supports mounting CD images InSO mounted into RAM). AFF, Raw, split Raw, and supported. 4 fotos mci ae pogmome {ey ce nde rion 62064 2: tate pore nt sae nyo nuts any ter Windows oa fren drve mages es lca! Windows dives: OSFMount alg format. B ao allows you to make RAM discs (a dige Encase are among the picture file forma 3, _Ahor the software has successfully launched, click the “Mount new" button: a new box will open allowing you to select the image fle and configure other mount options. OSFMount ‘wil mount the mage as read-only by defeut, and you can view it through Windows File Explorer jst ice any other local drive 2:13 Autopsy Autopsy is 2 graphical user Interface (GUD programme that provides quick access to the Comanche tools and C library found in the Sleuth Kit and other digital forensics tool. The Seeuth Kit’ tools, 2¢ well as other digital forensics tools will enable Autopsy to automete many, ‘Of the forensics analyss tasks required in most investigations, such as reccvering deleted files ‘najsing Windows reoisty, ivestigating e-mal messages. investigating unallocated ise Space, and many more, Autopsy includes tools that assist examiners in being more productive throughout their analysis work ‘Autopsy is a strong forensic pltiorn utiised by thousands of users worldwide: it has active wolunteeasistance as well es commercial support for premium users. Customized modules (Guibbed "ingest modules" by Autopsy) written in Python Uython) or Java can be added 10 Be Uti bbe added to the 32 Analysing RAM Forenciclmage We have already shown how to acqu Steoiy shown how to acauire RAM memory using four tools: the acquire forensic a ee ‘Belkasoh Evidence Center, and X-Ways Forensics, 3 me have tno relable and and popular free tools: Redline from Volatility Foundation, We'l begin with Redline - bigital Forensics (MU) 34 Forensics Redline : FireEye provides the forensics community with two well-known free forensic tools for conducting digital forensics imestigations 1. Memoryze : This is 9 command-line tool for imaging and analysing physical memory. It can perform advanced memory analysis while the computer is stil functioning, in addition to acquiring RAM snapshots. Memoryze can aso examine memory image fils acquired with it or any other forensic software (OD-format). When the forensic image is acquired by the Memoryze too! itso the analysis wil yield more thorough results. Redline : This is 2 Windows software that investigates harmful artefacts in Windows physical ‘memory. With Redline, you can + Capture memory pictures, running processes, opened files, and registy data with Redline, + Fier (narrow) results based on a variety of predetermined criteria (for example, @ timetrame of compromise events when it began, which fle: were touched, and how long the compromise sustained) andor fiter known valid data based on precompiled MDS hash values of well-known files Capturing a RAM Memory Using Redline ‘We cust fist dawnioed Redline before we can utilis it to record memory. 1. Go to wwnnfreye.com/serices/reewareredinehtmt fil out 2 quick registration form, and the dowload link willbe sent tothe e-mail address you specify. 2. Install the programme on your Windows system in the same way that you would ary other \Wincows application, Reine fs compatible with practically all versions of Windows, including ‘Windows xP, Windows Vista, Windows 7, Windows 8 (32 and 64 bit and Windows 10. 3. Run the application to bring up the main window. Select “Create a Comprehensive Collector” from the “Collect Data" box. + Before we proceed, lt us provide a brief overview of the choices accessible when utising Recline to collect (capture) data from a questionable Windows PC. j + Recline has thre different sorts of collectors: ‘© Standard Collector: This le collects the least quantity of data (mainly process and Yoaded driver information). © Comprehensive Collector : Ths type collects the majority of the data required by Redline dusing the analysis process. This sort of collcton is highly suggested, and it ‘is what we wil use inthis experiment : © TOC Search Collector : This type collects only data that corresponds to specific Indicators of Compromise COCs) “ae= °° :_ Forensics Instat Fig, 322 shows the Configure the Standard and Comprebensive Collectors in Redline; keep in ‘mind that both collectors share the same panel but have distinct inital setings- 5. The Redline Colector script (accesible trough "Edt Your Seri’) incudes memory disc ‘gstem, network and other options pre-selected. You can change these settings in any collector type For example, the comprehensive collection type (which we chose for this ‘exarple) has most options checked by default so you may leave the defauit settings alone. 1 File Enumeration 1) include Active Files (Raw Onb) (Include Deleted Files (Raw Oni) ©) Parse NTFS INDX Butters (Raw Only) me % araoeEnvopy W anaye te Anomates 7 tmumerte moots Z emmerte pons 14 In our example, wet select “Comprehensive Collector," and then dick it to open the collector ©) Very Digital Signatures strings Ifouratn box By chosing “Eh your sit" you can configure whut you wart te capture] || ncde Dvectores a | ¥ Get Resources neon a5 the option "Acie Memory Picture to sca the trget memeny mage yousta the option “Acquire Memory Ptr’ to acquie the target memory mag |) wos isa (oes | | Ei suaase — Disk Enumeration eee | fee volumes enews <¢—{Edit Collector Settings | | Jee arcane rs | View and modiy collector sating in Reding 6, From the collector setup window, ck "Browse" under “Save Your Collection To" and navigate 1 an empty directory to save this collector. Fr example, we wil sve on 2 USS thumb dive ‘and use it later to obtain @ memery image from the suspect machine: To begin iting te Redine calector, cick "OK" When. Redline complete the olecton, a siGres popup. Wit Span elsseyseitueay information on how to use the cateor to eeque memory data om patente eecied computers. Fig.223Forensics Investigation 1 mur catectt pacage crete nd ned elation you tec 2.0m he machin you want 10 str the Raeinetbe spt preteaiy fom SLI Teas engTs Sie tre ores Tre net ete he Cott 0 yu congue eS 5 a cevea Sexuomn ayers ey tine You ane st ‘TeThesSceun came ostyensensona Antpssencnd et) wate [et anayscsemcnmens te cane oe he Anyone fee : ‘Spe Dery conan Pra sage copy these racine cn be found ie acabon you spre. mee eae Fig. 3.24 Redline showing collector instructions ater creating It © Now that ne've built cur collector, let's look at how we can utilis it to collect memory images 1. Navigate to the directory where you saved your newly generated collector and copy the entre folder to 2 USB Hach drive 2. insert the USB thumb drive int the target computer. 3._ Run the collector by running the script "RunRediineAucitbst” inthe cl [eetecee @772018 838.4 simieese Am 772018838 A0 <7rr0..40 An 77010839 Am evsu208 4227 2a. Document Forensics vestigation 4. The collector should start collecting data by displaying @ CMD window, and it should save the data to 2 folder named ‘SessionsAnayssSesionin the seme directory. When you run the srt, a new Analysis Session folder is crested (AnaysisSession2, AnaysisSession3, ete). 5. When the Collector has finshed collecting, the CMD window should dose without displaying any notice. Now, navigate ta the Analysis Session folder, where you'll see an ‘Audits folder and an AnalyssSessiont mans fle. » Collector > Sessions > AnaisisSesiont Wit Foronsics (MU) 2 tame Datemodifed Type ‘Sze Acs 8/31/2018 3:30AM _File folder ‘Anaiysissenionimans __&31/2018330AM _ Mandiant Analysis File 1 Now that we have questionable machine volatility data (along with other important data such 4s Prefetch folder information), we can begin the analysis process with Redline Memory Forensics Using Redline Follow these procedures to evaluate memory data gathered by the Redline collector 1. Copy the Sessions folder from the Collector folder to the forensic system where the analysis wil be performed. OF course, Redline must be installed fist on this PC. Navigate to Sessions AnalysisSessiont (there may be more than one analysis session if you run the collector multiple times) and you will notice an Audits folder and an AnalysisSessionl.mens file, 3. Double-click the ‘AnalysisSessiondLmans' file to launch Redline. This imports the data into Redline automatically 4 Data import into Reine wil take some tne (fom minutes to hous) depending on the size of the captured memory image and the ype of acquired memory operating systern 5. The Redline enelyss session window will pen once the data has fished loading into the new analysis session, Redline eategorses data and displays them on the left side of the Analysis Data frame © You can begin your investigations ine variety of ways for example, we wil choose the option am Ivestigaing a Host Based on an External Investigative Lead” 7. A new window will open: dick any data type in the “Analysis Osta" (number 1) pane to see all relevant obtained data onthe right pane. The centre pane allows you to apply fiers (number 2) to the data to limit the number of results retumed, while the third pane displays the sum of fitered information based on what a user has selected in pane 2.: — a << Be tempat rca am —. a ee —_ Staceealegme Ba nr caseny pacoges sich Kal incl Vly, nevenness this programme i Ge appar on Weds worsaion (as 2 standalone porate eppicaton) The most Gest versions 26, whch mey be downloaded from worw.olttyioundaton 07/26 3.3 _ Investigating Routers ower: roe is aso important in the indident, Routes lacks in data storage. Routers are the Spreads forthe attackers at he time of newark penetration Routers store the information le Toiing table, password and network ock information. Ths information is used by attacker ta attack the network aswell s by investigators 331 Obtaining Volatile Data Prior to Powering Down rl a [a _ Eigen he steps n oster investigation, a, “= Every Gime Fraty alvays obtain the volatile inthe response process. Memory contains some information and it may be possible that information in the memory is important for the investigation, so that information should be saved before powering down the router. As we kom that routers have les deta storage capacity so the information in the memory is very important. "© Non-volatle random-accest memory (NVRAM) stores the router configuration. When we: ‘reboot or poner down the router there are chances of losing the system state information ia ‘memory ie current routing tabes, listening servicer and curent passwords. The tps cise nth secon are kcssed in th secon xe ically inportn for outers tat have been Stes 9 1 Establishing 2 Router ‘Connection is necessary before doing anything. Accessing routet ‘rom the console port isthe best way. Whenever router connection is established at that ‘outer connection is shed att —_— 332 Of incident suspected, based on responses for the different incident types which involved the routers including how to Idantify ‘allaborating evidence, The types of incidents that involve routers areas follows tl Forensics (MU) 10 Determine the routers uptime, which is nothing but the time that the system has been online since the last reboot can alto be important. Determine the listening sockets, where we come to know that which ports ae listening con the router. Use an external port scanner to determine which services are running on the router. We can also examine the configuration file which covers all aspects of the routers configuration, ‘save the Router Configuration, Router configuration information is stored in single fle in NVRAM. When the router boots it uses ths stored configuration I fs possible to change the configuration ofthe router without modifying the configuration file stored in NVRAM. ‘You should save the configuration that is n RAM as wel asthe configuration in NVRAM 1. Review the routing table, the routing table contains the blueprint of how the router forwards packets. If an atacker does the changes to the routing table then the attacker ako change the packets sending location, Manipulating the routing table is @ primary reason for compromising 2 router. Static routes, which are within the configuration file; are ‘ako visible to attacker, s0 the attacker can change the routs. check interface configurations, the information of every routers interface which Is available in configuration file should be checked 9. View the ARP (Address Resolution Protocol) Cache, The ARPmaps IP addresses and media access contro (MAC) addresses. Many times it happens thet attacker spoof IP and. MAC addresses to evade security controls, such as access contro ists (ACLs) firewall ules cor itch port assignments. So, the ARP cache can be useful when investigating attacks of thece types. The ARP cache Is €95) to destroy and easy to 528, Finding the Proof ‘sat fist we have collected and saved the evidences, now the next step depends on the tyPe your inital investigation done. So, itis necessary to check the Direct compromise Routing table manipulation ‘Theft of information Denial of service na 2
You might also like
New - Lab Manual 4 - Malware Hunting - Updated2022 - V2
PDF
No ratings yet
New - Lab Manual 4 - Malware Hunting - Updated2022 - V2
14 pages
DCN Lab Manual
PDF
100% (1)
DCN Lab Manual
34 pages
1 Lexial Analysis
PDF
No ratings yet
1 Lexial Analysis
24 pages
DF Notes Sem8 Comps BW
PDF
No ratings yet
DF Notes Sem8 Comps BW
83 pages
Artificial Intelligence MCSE-003
PDF
No ratings yet
Artificial Intelligence MCSE-003
223 pages
LPUNIT1 ppt1
PDF
No ratings yet
LPUNIT1 ppt1
41 pages
(TechNeo) Cyber Security and Digital Forensics U1-2 (2019 Pattern)
PDF
No ratings yet
(TechNeo) Cyber Security and Digital Forensics U1-2 (2019 Pattern)
66 pages
CH 1
PDF
No ratings yet
CH 1
29 pages
DBMS Lab Manual
PDF
No ratings yet
DBMS Lab Manual
155 pages
DF Module 3
PDF
No ratings yet
DF Module 3
29 pages
Assignment
PDF
No ratings yet
Assignment
10 pages
BCS - Compiler Construction - Notes
PDF
No ratings yet
BCS - Compiler Construction - Notes
60 pages
Patrick Henry Winston - Artificial Intelligence-Addison-Wesley Pub. Co (1992) - Optimize
PDF
No ratings yet
Patrick Henry Winston - Artificial Intelligence-Addison-Wesley Pub. Co (1992) - Optimize
765 pages
Gujarat Technological University: Prerequisite
PDF
No ratings yet
Gujarat Technological University: Prerequisite
5 pages
Module-3: Device Configuration
PDF
No ratings yet
Module-3: Device Configuration
22 pages
Dbms Textbook
PDF
No ratings yet
Dbms Textbook
109 pages
DF Module 2
PDF
No ratings yet
DF Module 2
44 pages
DC Toppers Solution
PDF
No ratings yet
DC Toppers Solution
92 pages
Sample 19608
PDF
No ratings yet
Sample 19608
16 pages
Nptel AI Week 1
PDF
100% (1)
Nptel AI Week 1
83 pages
CF LAB Manual FINAL
PDF
No ratings yet
CF LAB Manual FINAL
66 pages
Unit 1
PDF
No ratings yet
Unit 1
77 pages
AI and Ar Presentation
PDF
No ratings yet
AI and Ar Presentation
17 pages
Practical On RDBMS
PDF
No ratings yet
Practical On RDBMS
58 pages
Compiler Design
PDF
100% (1)
Compiler Design
2 pages
21AD3202 - Natural LanguageProcessing-Record
PDF
No ratings yet
21AD3202 - Natural LanguageProcessing-Record
64 pages
Unit 3
PDF
No ratings yet
Unit 3
77 pages
Advanced Databases - Unit - V - PPT
PDF
No ratings yet
Advanced Databases - Unit - V - PPT
71 pages
Compiler Design 6th Sem CSE Csvtu
PDF
No ratings yet
Compiler Design 6th Sem CSE Csvtu
136 pages
AI Quick Guide
PDF
No ratings yet
AI Quick Guide
67 pages
Module 4
PDF
No ratings yet
Module 4
63 pages
TYCS_SEM_VI_CLOUD_WS_FINAL
PDF
No ratings yet
TYCS_SEM_VI_CLOUD_WS_FINAL
103 pages
Compiler Design - (Book) .PDF 160
PDF
No ratings yet
Compiler Design - (Book) .PDF 160
165 pages
CS8492-Database Management Systems-UNIT 5
PDF
100% (1)
CS8492-Database Management Systems-UNIT 5
20 pages
CN Decode PDF
PDF
No ratings yet
CN Decode PDF
173 pages
AI Seminar Karthik
PDF
100% (1)
AI Seminar Karthik
31 pages
Compiler Design Unit 2
PDF
No ratings yet
Compiler Design Unit 2
44 pages
Automata Theory Solved Mcqs
PDF
No ratings yet
Automata Theory Solved Mcqs
18 pages
Lab Manual
PDF
No ratings yet
Lab Manual
44 pages
BCT Techknowledge Want All Subjects Notes Pls
PDF
No ratings yet
BCT Techknowledge Want All Subjects Notes Pls
193 pages
NLP Semester 7
PDF
No ratings yet
NLP Semester 7
1,072 pages
Compiler Design
PDF
No ratings yet
Compiler Design
130 pages
Cloud Computing Unit-1 Notes
PDF
No ratings yet
Cloud Computing Unit-1 Notes
12 pages
Blood Group Detection Using Fingerprint
PDF
No ratings yet
Blood Group Detection Using Fingerprint
14 pages
Raspberry Pi Int
PDF
No ratings yet
Raspberry Pi Int
95 pages
Compiler Design
PDF
0% (1)
Compiler Design
563 pages
Ccs Module 123 Mu Cloud Computing Sem 7
PDF
No ratings yet
Ccs Module 123 Mu Cloud Computing Sem 7
100 pages
What Is Serial Computing?: Traditionally, Software Has Been Written For Serial Computation
PDF
No ratings yet
What Is Serial Computing?: Traditionally, Software Has Been Written For Serial Computation
22 pages
CS3551 Unit 2-Part1
PDF
No ratings yet
CS3551 Unit 2-Part1
34 pages
CCS335-Cloud-Computing-QB - Unit 3, 4 & 5
PDF
No ratings yet
CCS335-Cloud-Computing-QB - Unit 3, 4 & 5
57 pages
Ece443 - Wireless Sensor Networks Course Information Sheet: Electronics and Communication Engineering Department
PDF
No ratings yet
Ece443 - Wireless Sensor Networks Course Information Sheet: Electronics and Communication Engineering Department
10 pages
Cs3551 Distributed Computing
PDF
No ratings yet
Cs3551 Distributed Computing
2 pages
Ccs335 Cloud Computing Lab Manual
PDF
No ratings yet
Ccs335 Cloud Computing Lab Manual
95 pages
Speech Recognition Full Report
PDF
No ratings yet
Speech Recognition Full Report
11 pages
CC Unit-5
PDF
No ratings yet
CC Unit-5
19 pages
Unit 3 Notes
PDF
No ratings yet
Unit 3 Notes
13 pages
Mobile Computing Notes
PDF
100% (1)
Mobile Computing Notes
12 pages
CS3451 OS unit 5 notes
PDF
No ratings yet
CS3451 OS unit 5 notes
25 pages
Dr. Phil Nyoni: Digital Forensics Lecture 1: Introduction To Forensics
PDF
No ratings yet
Dr. Phil Nyoni: Digital Forensics Lecture 1: Introduction To Forensics
40 pages
Module 01 Computer Forensics in Todays World
PDF
No ratings yet
Module 01 Computer Forensics in Todays World
62 pages
Related titles
Click to expand Related Titles
Carousel Previous
Carousel Next
New - Lab Manual 4 - Malware Hunting - Updated2022 - V2
PDF
New - Lab Manual 4 - Malware Hunting - Updated2022 - V2
DCN Lab Manual
PDF
DCN Lab Manual
1 Lexial Analysis
PDF
1 Lexial Analysis
DF Notes Sem8 Comps BW
PDF
DF Notes Sem8 Comps BW
Artificial Intelligence MCSE-003
PDF
Artificial Intelligence MCSE-003
LPUNIT1 ppt1
PDF
LPUNIT1 ppt1
(TechNeo) Cyber Security and Digital Forensics U1-2 (2019 Pattern)
PDF
(TechNeo) Cyber Security and Digital Forensics U1-2 (2019 Pattern)
CH 1
PDF
CH 1
DBMS Lab Manual
PDF
DBMS Lab Manual
DF Module 3
PDF
DF Module 3
Assignment
PDF
Assignment
BCS - Compiler Construction - Notes
PDF
BCS - Compiler Construction - Notes
Patrick Henry Winston - Artificial Intelligence-Addison-Wesley Pub. Co (1992) - Optimize
PDF
Patrick Henry Winston - Artificial Intelligence-Addison-Wesley Pub. Co (1992) - Optimize
Gujarat Technological University: Prerequisite
PDF
Gujarat Technological University: Prerequisite
Module-3: Device Configuration
PDF
Module-3: Device Configuration
Dbms Textbook
PDF
Dbms Textbook
DF Module 2
PDF
DF Module 2
DC Toppers Solution
PDF
DC Toppers Solution
Sample 19608
PDF
Sample 19608
Nptel AI Week 1
PDF
Nptel AI Week 1
CF LAB Manual FINAL
PDF
CF LAB Manual FINAL
Unit 1
PDF
Unit 1
AI and Ar Presentation
PDF
AI and Ar Presentation
Practical On RDBMS
PDF
Practical On RDBMS
Compiler Design
PDF
Compiler Design
21AD3202 - Natural LanguageProcessing-Record
PDF
21AD3202 - Natural LanguageProcessing-Record
Unit 3
PDF
Unit 3
Advanced Databases - Unit - V - PPT
PDF
Advanced Databases - Unit - V - PPT
Compiler Design 6th Sem CSE Csvtu
PDF
Compiler Design 6th Sem CSE Csvtu
AI Quick Guide
PDF
AI Quick Guide
Module 4
PDF
Module 4
TYCS_SEM_VI_CLOUD_WS_FINAL
PDF
TYCS_SEM_VI_CLOUD_WS_FINAL
Compiler Design - (Book) .PDF 160
PDF
Compiler Design - (Book) .PDF 160
CS8492-Database Management Systems-UNIT 5
PDF
CS8492-Database Management Systems-UNIT 5
CN Decode PDF
PDF
CN Decode PDF
AI Seminar Karthik
PDF
AI Seminar Karthik
Compiler Design Unit 2
PDF
Compiler Design Unit 2
Automata Theory Solved Mcqs
PDF
Automata Theory Solved Mcqs
Lab Manual
PDF
Lab Manual
BCT Techknowledge Want All Subjects Notes Pls
PDF
BCT Techknowledge Want All Subjects Notes Pls
NLP Semester 7
PDF
NLP Semester 7
Compiler Design
PDF
Compiler Design
Cloud Computing Unit-1 Notes
PDF
Cloud Computing Unit-1 Notes
Blood Group Detection Using Fingerprint
PDF
Blood Group Detection Using Fingerprint
Raspberry Pi Int
PDF
Raspberry Pi Int
Compiler Design
PDF
Compiler Design
Ccs Module 123 Mu Cloud Computing Sem 7
PDF
Ccs Module 123 Mu Cloud Computing Sem 7
What Is Serial Computing?: Traditionally, Software Has Been Written For Serial Computation
PDF
What Is Serial Computing?: Traditionally, Software Has Been Written For Serial Computation
CS3551 Unit 2-Part1
PDF
CS3551 Unit 2-Part1
CCS335-Cloud-Computing-QB - Unit 3, 4 & 5
PDF
CCS335-Cloud-Computing-QB - Unit 3, 4 & 5
Ece443 - Wireless Sensor Networks Course Information Sheet: Electronics and Communication Engineering Department
PDF
Ece443 - Wireless Sensor Networks Course Information Sheet: Electronics and Communication Engineering Department
Cs3551 Distributed Computing
PDF
Cs3551 Distributed Computing
Ccs335 Cloud Computing Lab Manual
PDF
Ccs335 Cloud Computing Lab Manual
Speech Recognition Full Report
PDF
Speech Recognition Full Report
CC Unit-5
PDF
CC Unit-5
Unit 3 Notes
PDF
Unit 3 Notes
Mobile Computing Notes
PDF
Mobile Computing Notes
CS3451 OS unit 5 notes
PDF
CS3451 OS unit 5 notes
Dr. Phil Nyoni: Digital Forensics Lecture 1: Introduction To Forensics
PDF
Dr. Phil Nyoni: Digital Forensics Lecture 1: Introduction To Forensics
Module 01 Computer Forensics in Todays World
PDF
Module 01 Computer Forensics in Todays World