Webcast 117445
Webcast 117445
1
FOR500 WINDOWS FORENSIC ANALYSIS
Single-System Forensics & Incident Response
3
Enterprise Incident Response & Threat Hunting
Incident Responder
Enterprise Network
4
What Content to Triage Image?
Artifact • Course Covered
Registry Hives and Backups • FOR500
Prefetch • FOR500
5
Rapid-Response Tooling Solutions
Supported
Primary Use Deployment Primary Primary
Solution Operating
Case Strategy Advantage Disadvantage
Systems
Uses PowerShell
Not designed for
Incident response Enable PowerShell Remoting for
Kansa Windows forensic
& threat hunting Remoting via GPO efficiency and
acquisition
credential safety
6
KAPE
Tools for Speed and Agility
7
Introducing KAPE – Triage and Rapid Analysis Capability
Search Collect Process
for files & folders using target ` Collected files based on
configurations
responsive files & folders Module Configurations
8
What Makes KAPE Different?
10
KAPE Configuration File Examples
14
KANSA
Tools for Speed and Agility
15
PowerShell Basics
17
PowerShell Basics: Authentication
19
Running Kansa
.\kansa.ps1 -OutputPath .\Output\ -TargetList .\hostlist -
TargetCount 250 –Verbose -Pushbin
20
Kansa Modules.conf
21
Kansa + Third-Party Tools
22
VELOCIRAPTOR
Tools for Speed and Agility
25
The Case for Velociraptor
27
Velociraptor Features
Configurable by administrator
Uniquely identifies the endpoint
30
Velociraptor Web Frontend – Artifact Repository
Here the keyword “process” is searched
and 28 relevant artifacts were found
In this example,
there is an
additional
parameter to
filter processes
by name
31
Velociraptor Web Frontend – Accessing File Contents (1)
Download all files from the
highlighted directory
32
Velociraptor Web Frontend – Accessing File Contents (2)
File contents
viewing pane
(currently on
HexView)
33
Velociraptor Web Frontend – Creating a Hunt
The “plus” button starts a wizard to
define a new hunt
34
Velociraptor Web Frontend – Starting a Hunt
Once created, the hunt has to be
started by using the “Play” button
36
Where do you want to go today?
With a huge variety of built-in artifacts, and the ability to customize them easily,
there’s almost no limit to Velociraptor’s hunting and analysis capabilities!
Filesystem Timeline Memory Acquisition Autoruns
Windows Timeline Processes, DLLs Permanent WMI Events
Prefetch Timeline VAD, Handles, Mutants Scheduled Tasks
KAPE Triage Impersonation Tokens Service Creations
Volume Shadow Copy Netstat, ARP Certificate Store
MFT, $I30 DNS Queries SRUM, BAM
File Finder Event Logs ShimCache, AmCache
YARA Scanning User ProfileList UserAssist
Rapid-Response Tooling Solutions
Supported
Primary Use Deployment Primary Primary
Solution Operating
Case Strategy Advantage Disadvantage
Systems
Uses PowerShell
Not designed for
Incident response Enable PowerShell Remoting for
Kansa Windows forensic
& threat hunting Remoting via GPO efficiency and
acquisition
credential safety
38
References & Resources
• KAPE
• Download: https://www.kroll.com/en/insights/publications/cyber/kroll-artifact-
parser-extractor-kape
• Pre-configured KAPE files: https://github.com/EricZimmerman/KapeFiles
• Kansa
• Download: https://github.com/davehull/Kansa
• Kansa to Splunk & Graylog: https://powerhunt.org/enterprise-dfir-on-a-budget/
• Velociraptor
• Download & docs: https://www.velocidex.com/docs/getting-started/
• Blog articles: https://www.velocidex.com/blog/
39