SlideShare a Scribd company logo
Pharmaceuticals
FIST Conference September/Madrid 2005
@




    Forensics of a Windows system

                         Alfredo Reino
                      Systems Engineer
                   Pharma Global Informatics
                     F. Hoffmann-La Roche
Pharmaceuticals
F. Hoffmann – La Roche
A Global Healthcare Leader

• One of the leading research-intensive
  healthcare groups
• Core businesses are pharmaceuticals and
  diagnostics
• A world leader in Diagnostics
• The leading supplier of medicines for
  cancer and transplantation and a market
  leader in virology
• Employs roughly 65,000 people in 150
  countries
• Has R&D agreements and strategic
  alliances with numerous partners, including
  majority ownership interests in Genentech
  and Chugai
Pharmaceuticals
Agenda


• What is forensics?
• Role of forensics in incident handling
• Gathering volatile data
• Filesystem acquisition
• Timeline analysis
• Network information
• Tools
Pharmaceuticals
What is forensics?


 Computer forensics is the process of investigating data storage
 devices and/or data processing equipment typically a home
 computer, laptop, server, office workstation, or removeable
 media such as compact discs, to determine if the equipment
 has been used for illegal, unauthorized, or unusual activities. It
 can also include monitoring a network for the same purpose.
 They must do so in a fashion that adheres to the standards of
 evidence that is admissible in a court of law.

                      http://en.wikipedia.org/wiki/computer_forensics
Pharmaceuticals
What is forensics?


• Computer forensics includes the following aspects:
   – identify evidence
   – preserve evidence
   – analyze evidence
   – present results
• This has to be done following appropiate standards, especially if
  results need to be admitted by court of law
Pharmaceuticals
Incident handling


• General areas of incident handling
  – planning and preparation
  – incident detection
  – containment / response
  – recovery
  – analysis
Pharmaceuticals
Forensics scope and environment




              applications

                               os
                                    server


                     computerized systems

                             infrastructure systems
                                                 lan / dmz


                               external environment



 do you have all the relevant information?
Pharmaceuticals
Gathering data


• Volatile data
   – registers, cache contents
   – memory contents
   – network connections
   – running processes
• Non-volatile data
   – content of filesystems and drives
   – content of removable media
Pharmaceuticals
Volatile data - preparation


• Create cd-rom with trusted toolset
   – at least include a trusted version of CMD.EXE from the same operating
     system
   – netcat or cryptcat (http://sourceforge.net/projects/cryptcat/)
   – system tools (ipconfig, netstat, date, time, net, arp ...) for different
     windows versions and service pack levels
   – pstools, listdlls, filemon, regmon, autoruns... (http://sysinternals.com)
   – hfind, fport, ntlast, ... (http://foundstone.com)
   – windows resource kit tools
   – a good sniffer (ethereal, windump, ...)
   – md5sum / md5deep
Pharmaceuticals
Volatile data - the set up


•   Connect forensics workstation to same lan as suspect server
•   Configure netcat or cryptcat in forensics workstation to listen on a port and save
    received data to evidence file
•   Mount trusted toolset cd-rom in suspect server
•   Open trusted console (cmd.exe)
Pharmaceuticals
Volatile data - what to get


• System date and time
• Running processes
• Network connections
• Open ports
• Applications listening on open sockets
• Logged on users
Pharmaceuticals
Volatile data - tools


• date /t & time /t
   – get system date and time
• ipconfig /all
   – get tcp/ip configuration
• netstat -aon
   – get network connections and listening ports (with associated process pid)
• psinfo -shd
   – get computer information (hardware, software, hotfixes, versions, etc.)
• pslist -t
   – get running processes
Pharmaceuticals
Volatile data - tools


• psloggedon
   – show logged on users and log on times
• psloglist
   – dump event log
• psservice
   – dump system service information
• net use
   – list netbios/smb connections
• listdlls
    – list all dlls loaded in system
• sigcheck -u -e c:windowssystem32
   – enumerate all unsigned files (.exe, .dll)
Pharmaceuticals
Volatile data - tools


• streams -s c:
   – list files with alternate data streams (ads)
• logonsessions -p
   – lists logged on sessions and processes running on each session
• strings
   – searches for ascii/unicode strings in suspicious files (you decide which
      are suspicious or not!)
• arp -a
   – displays arp cache table
• ntlast
   – record succesful and failed logins in system (including null sessions and
      remote logins)
Pharmaceuticals
Volatile data - tools


• autorunsc
   – show all kinds of autorun items




• hfind c:
   – finds hidden files
Pharmaceuticals
Volatile data - GUI tools


• rootkit revealer
   – detects usermode or kernelmode rootkits
• process explorer
   – useful information about running processes, loaded libraries,
     used resources, etc.
• tcpview
   – displays network connections and associated applications
Pharmaceuticals
Network information


• Useful static data to get
   – IDS/IPS logs
   – firewall logs
   – radius/VPN logs
   – DHCP logs and leased ip information
   – application logs from other servers in same network if they
     are suspected of being entry point (ftp, www, database, ...)
Pharmaceuticals
Network information


• Traffic to/from live system
   – use of sniffer recommended
   – can use ethernet probe (read-only cat5 if possible!)
   – if server connected to hub, then plug probe into hub
   – if connected to switch, use a mirror port (in expensive
     switches) or use arp-spoofing to redirect traffic to sniffer
   – best sniffer: ethereal
Pharmaceuticals
Filesystem acquisition

• Physical acquisition
   – turn off machine (plug power cable)
   – remove harddisk
   – connect to forensics workstation using hardware IDE/SCSI
     write blocker
   – perform bitwise copy
Pharmaceuticals
Filesystem acquisition

• Network acquisition - live system
   – not recommended
      • untrusted operating system
      • filesystem in inconsistent state
   – configure forensics workstation
      • lots of free disk space
      • netcat listener (nc -l -p 9000 > disk1.dd)
      • after acquiring compute hash (md5sum disk1.dd > disk.md5)
   – acquire live filesystem
      • run 'dd for windows' from trusted cd-rom toolset
       • dd if=.PhysicalDrive0 bs=2k | nc -w 3 10.0.0.1 9000
           – where 10.0.0.1 is the ip address of forensics workstation
Pharmaceuticals
Filesystem acquisition

• Network acquisition - non-live system
   – configure forensics workstation
      • lots of free disk space
      • netcat listener (nc -l -p 9000 > disk1.dd)
      • after acquiring compute hash (md5sum disk1.dd > disk.md5)
   – configure suspect system
      • boot suspect system (losing volatile info!) into linux livecd
        distro (gentoo, helix, knoppix, ...)
      • run dd to image disk over network with netcat
          – dd if=/dev/sda | nc 10.0.0.1 9000
Pharmaceuticals
Filesystem analysis


• Many tools for this
  – EnCase (commercial)
  – The Sleuth Kit + forensics browser
  – ftimes
• Basic analysis tool functionality
   – file topography
   – compute hashes for files
   – create timeline analysis (mac data)
   – identify and recover deleted files
   – search functions
   – case management
Pharmaceuticals
Filesystem analysis


• The Sleuth Kit + forensics browser
Pharmaceuticals
Filesystem analysis


• EnCase 5
Pharmaceuticals
Timeline analysis - other sources


• LastWrite information in registry keys
   – use 'lsreg.pl' to parse registry and extract information
     including lastwrite data
       Key -> CurrentControlSetControlWindowsShutdownTime
       LastWrite : Tue Aug 2 12:06:56 2005
       Value : ShutdownTime;REG_BINARY;c4 96 a0 ad 5a 97 c5 01

• INFO2 files
   – contains information about deleted files by each user (only if
     it goes to recycle bin)
   – use 'rifiuti' to extract information
   – file normally at C:Recycler%SID%INFO2
Pharmaceuticals
Timeline analysis - other sources
• Prefetch folder
   – used by windows to store information about how to effectively launch
     executables to improve performance
   – XP prefetches at boot time and application launch, 2003 prefetches only
     at boot time (default)
   – .pf files in %systemroot%/prefetch folder
   – the .pf contains information about file paths
   – the mac info of the .pf file gives us information about when an
     application has been launched
   – use 'pref' or 'pref_ver' to parse this info
Pharmaceuticals
Timeline analysis - other sources


• Logs
   – event logs (application, system, security)
       • very useful, many tools to extract
   – IIS/webserver/FTP logs
       • useful to detect webapp exploiting (maybe as point of entry), for
         example unicode attacks, sql injection, ...
   – setupapi.log
       • information about installation of applications and devices
   – schedlgu.txt
       • information about scheduled tasks
   – antivirus logs
   – ...
Pharmaceuticals
Timeline analysis - other sources


• Recently opened documents
   - check this registry key (for each user!)
       HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerRunMRU

• Temp folders
   – examine contents for suspicious files
• Web browser cache
  – 'pasco' tool for internet explorer forensic analysis
  – cache and cookies folders
  – browser history
Pharmaceuticals
Analysis of evidence


• Need to find "footprints"
• Initial analysis
   – check for hidden or unusual files
   – check for unusual processes and open sockets
   – check for unusual application requests
   – check for suspicious accounts
   – determine patch level of system
• Based on findings, we should develop a strategy for further investigation
   – full filesystem analysis
   – recovery of deleted files
   – password cracking
   – analysis of pagefile
   – ...
Pharmaceuticals
Tools

•   These are the mentioned
    tools in this presentation
•   Feel free to add more to your
    toolkit
•   Script (vbscript, perl) your
    toolset!!
Licensing




Pharmaceuticals
Pharmaceuticals
FIST Conference @         www.fistconference.org




              Alfredo Reino
              Madrid, September 2005



       Thanks for your attention.

More Related Content

PPT
Windowsforensics
Santosh Khadsare
 
PPTX
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Jared Greenhill
 
PPT
Linux forensics
Santosh Khadsare
 
PPT
Registry forensics
Prince Boonlia
 
PPTX
Mobile Forensics
primeteacher32
 
PPTX
Intro to cyber forensics
Chaitanya Dhareshwar
 
PPTX
Autopsy Digital forensics tool
Sreekanth Narendran
 
PPTX
Digital forensics
yash sawarkar
 
Windowsforensics
Santosh Khadsare
 
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Jared Greenhill
 
Linux forensics
Santosh Khadsare
 
Registry forensics
Prince Boonlia
 
Mobile Forensics
primeteacher32
 
Intro to cyber forensics
Chaitanya Dhareshwar
 
Autopsy Digital forensics tool
Sreekanth Narendran
 
Digital forensics
yash sawarkar
 

What's hot (20)

PPTX
Windows registry forensics
Taha İslam YILMAZ
 
PPTX
Processing Crimes and Incident Scenes
primeteacher32
 
PPTX
Mobile Forensics
abdullah roomi
 
PPTX
Memory forensics.pptx
9905234521
 
PDF
05 Duplication and Preservation of Digital evidence - Notes
Kranthi
 
PPTX
mobile forensic.pptx
Ambuj Kumar
 
ODT
Operating System Forensics
ArunJS5
 
PPT
Windows forensic artifacts
n|u - The Open Security Community
 
PDF
Windows Registry Analysis
Himanshu0734
 
PPT
Malware forensics
Sameera Amjad
 
PPTX
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Sam Bowne
 
PPTX
Memory forensics
Sunil Kumar
 
PPTX
Incident response process
Bhupeshkumar Nanhe
 
PDF
01 Computer Forensics Fundamentals - Notes
Kranthi
 
PPTX
Digital Forensic ppt
Suchita Rawat
 
PPT
Data recovery
Mir Majid
 
PPTX
Windows Registry
primeteacher32
 
PPT
Network forensics1
Santosh Khadsare
 
PDF
CNIT 121: 8 Forensic Duplication
Sam Bowne
 
Windows registry forensics
Taha İslam YILMAZ
 
Processing Crimes and Incident Scenes
primeteacher32
 
Mobile Forensics
abdullah roomi
 
Memory forensics.pptx
9905234521
 
05 Duplication and Preservation of Digital evidence - Notes
Kranthi
 
mobile forensic.pptx
Ambuj Kumar
 
Operating System Forensics
ArunJS5
 
Windows forensic artifacts
n|u - The Open Security Community
 
Windows Registry Analysis
Himanshu0734
 
Malware forensics
Sameera Amjad
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Sam Bowne
 
Memory forensics
Sunil Kumar
 
Incident response process
Bhupeshkumar Nanhe
 
01 Computer Forensics Fundamentals - Notes
Kranthi
 
Digital Forensic ppt
Suchita Rawat
 
Data recovery
Mir Majid
 
Windows Registry
primeteacher32
 
Network forensics1
Santosh Khadsare
 
CNIT 121: 8 Forensic Duplication
Sam Bowne
 
Ad

Viewers also liked (20)

PDF
Windows 7 forensics -overview-r3
CTIN
 
PPT
Mac Forensics
CTIN
 
PDF
Netcat cheat sheet
Youssoufou YABRE
 
PPT
Vista Forensics
CTIN
 
PPTX
Windows Forensics
Prince Boonlia
 
PPT
F Database
CTIN
 
PPT
Unit B Windows 7
Chaffey College
 
PPT
Translating Geek To Attorneys It Security
CTIN
 
PPT
Live Forensics
CTIN
 
PPTX
Msra 2011 windows7 forensics-troyla
CTIN
 
PPTX
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
Basis Technology
 
PPT
Computer Forensics & Windows Registry
somutripathi
 
PPT
Part6 Private Sector Concerns
CTIN
 
PDF
Digital forensic upload
Setia Juli Irzal Ismail
 
PPT
Installation of Joomla on Windows XP
Rupesh Kumar
 
PDF
Forensic Anaysis on Twitter
Yansi Keim
 
PPT
File system
Harleen Johal
 
PPT
Raidprep
CTIN
 
PDF
NTFS file system
Ravi Yasas
 
PPTX
Windows 7 forensics jump lists-rv3-public
CTIN
 
Windows 7 forensics -overview-r3
CTIN
 
Mac Forensics
CTIN
 
Netcat cheat sheet
Youssoufou YABRE
 
Vista Forensics
CTIN
 
Windows Forensics
Prince Boonlia
 
F Database
CTIN
 
Unit B Windows 7
Chaffey College
 
Translating Geek To Attorneys It Security
CTIN
 
Live Forensics
CTIN
 
Msra 2011 windows7 forensics-troyla
CTIN
 
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
Basis Technology
 
Computer Forensics & Windows Registry
somutripathi
 
Part6 Private Sector Concerns
CTIN
 
Digital forensic upload
Setia Juli Irzal Ismail
 
Installation of Joomla on Windows XP
Rupesh Kumar
 
Forensic Anaysis on Twitter
Yansi Keim
 
File system
Harleen Johal
 
Raidprep
CTIN
 
NTFS file system
Ravi Yasas
 
Windows 7 forensics jump lists-rv3-public
CTIN
 
Ad

Similar to Forensics of a Windows System (20)

PPT
Forensics of a Windows Systems
Conferencias FIST
 
PPT
Electornic evidence collection
Fakrul Alam
 
PPT
3871778
Christiaan Beek
 
PPT
ch11.ppt
contactatkmdp
 
PPT
Introduction to computer forensic
Online
 
PPT
Computer Forensics Analysis and Validation.ppt
mcjaya2024
 
PPT
Cyber forensics
pranjal dutta
 
PPTX
cyber Forensics
Muzzammil Wani
 
DOCX
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
smile790243
 
PPTX
Module 3 continuation of computer forensic
ssuserec53e73
 
PDF
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
APNIC
 
PPTX
Computer forensics libin
libinp
 
PDF
Monitorama 2015 Netflix Instance Analysis
Brendan Gregg
 
PPTX
Computer forensics and its role
Sudeshna Basak
 
PDF
CNIT 121: 3 Pre-Incident Preparation
Sam Bowne
 
PPT
Digital Forensics in the Archive
GarethKnight
 
PPTX
Introduction to Malware Analysis
Andrew McNicol
 
PPTX
BSides Vancouver 2018 - Live IR on a Budget
dsplice
 
PPT
Preserving and recovering digital evidence
Online
 
PPTX
Computer forensics
deaneal
 
Forensics of a Windows Systems
Conferencias FIST
 
Electornic evidence collection
Fakrul Alam
 
ch11.ppt
contactatkmdp
 
Introduction to computer forensic
Online
 
Computer Forensics Analysis and Validation.ppt
mcjaya2024
 
Cyber forensics
pranjal dutta
 
cyber Forensics
Muzzammil Wani
 
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
smile790243
 
Module 3 continuation of computer forensic
ssuserec53e73
 
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
APNIC
 
Computer forensics libin
libinp
 
Monitorama 2015 Netflix Instance Analysis
Brendan Gregg
 
Computer forensics and its role
Sudeshna Basak
 
CNIT 121: 3 Pre-Incident Preparation
Sam Bowne
 
Digital Forensics in the Archive
GarethKnight
 
Introduction to Malware Analysis
Andrew McNicol
 
BSides Vancouver 2018 - Live IR on a Budget
dsplice
 
Preserving and recovering digital evidence
Online
 
Computer forensics
deaneal
 

More from Conferencias FIST (20)

PDF
Seguridad en Open Solaris
Conferencias FIST
 
PDF
Seguridad en Entornos Web Open Source
Conferencias FIST
 
PDF
Spanish Honeynet Project
Conferencias FIST
 
PDF
Seguridad en Windows Mobile
Conferencias FIST
 
PDF
SAP Security
Conferencias FIST
 
PDF
Que es Seguridad
Conferencias FIST
 
PDF
Network Access Protection
Conferencias FIST
 
PDF
Las Evidencias Digitales en la Informática Forense
Conferencias FIST
 
PDF
Evolución y situación actual de la seguridad en redes WiFi
Conferencias FIST
 
PDF
El Information Security Forum
Conferencias FIST
 
PDF
Criptografia Cuántica
Conferencias FIST
 
PDF
Inseguridad en Redes Wireless
Conferencias FIST
 
PDF
Mas allá de la Concienciación
Conferencias FIST
 
PDF
Security Metrics
Conferencias FIST
 
PDF
PKI Interoperability
Conferencias FIST
 
PDF
Wifislax 3.1
Conferencias FIST
 
PDF
Network Forensics
Conferencias FIST
 
PDF
Riesgo y Vulnerabilidades en el Desarrollo
Conferencias FIST
 
PDF
Demostracion Hacking Honeypot y Análisis Forense
Conferencias FIST
 
PDF
Security Maturity Model
Conferencias FIST
 
Seguridad en Open Solaris
Conferencias FIST
 
Seguridad en Entornos Web Open Source
Conferencias FIST
 
Spanish Honeynet Project
Conferencias FIST
 
Seguridad en Windows Mobile
Conferencias FIST
 
SAP Security
Conferencias FIST
 
Que es Seguridad
Conferencias FIST
 
Network Access Protection
Conferencias FIST
 
Las Evidencias Digitales en la Informática Forense
Conferencias FIST
 
Evolución y situación actual de la seguridad en redes WiFi
Conferencias FIST
 
El Information Security Forum
Conferencias FIST
 
Criptografia Cuántica
Conferencias FIST
 
Inseguridad en Redes Wireless
Conferencias FIST
 
Mas allá de la Concienciación
Conferencias FIST
 
Security Metrics
Conferencias FIST
 
PKI Interoperability
Conferencias FIST
 
Wifislax 3.1
Conferencias FIST
 
Network Forensics
Conferencias FIST
 
Riesgo y Vulnerabilidades en el Desarrollo
Conferencias FIST
 
Demostracion Hacking Honeypot y Análisis Forense
Conferencias FIST
 
Security Maturity Model
Conferencias FIST
 

Recently uploaded (20)

PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Software Development Methodologies in 2025
KodekX
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Doc9.....................................
SofiaCollazos
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Software Development Methodologies in 2025
KodekX
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Doc9.....................................
SofiaCollazos
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
The Future of Artificial Intelligence (AI)
Mukul
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 

Forensics of a Windows System

  • 1. Pharmaceuticals FIST Conference September/Madrid 2005 @ Forensics of a Windows system Alfredo Reino Systems Engineer Pharma Global Informatics F. Hoffmann-La Roche
  • 2. Pharmaceuticals F. Hoffmann – La Roche A Global Healthcare Leader • One of the leading research-intensive healthcare groups • Core businesses are pharmaceuticals and diagnostics • A world leader in Diagnostics • The leading supplier of medicines for cancer and transplantation and a market leader in virology • Employs roughly 65,000 people in 150 countries • Has R&D agreements and strategic alliances with numerous partners, including majority ownership interests in Genentech and Chugai
  • 3. Pharmaceuticals Agenda • What is forensics? • Role of forensics in incident handling • Gathering volatile data • Filesystem acquisition • Timeline analysis • Network information • Tools
  • 4. Pharmaceuticals What is forensics? Computer forensics is the process of investigating data storage devices and/or data processing equipment typically a home computer, laptop, server, office workstation, or removeable media such as compact discs, to determine if the equipment has been used for illegal, unauthorized, or unusual activities. It can also include monitoring a network for the same purpose. They must do so in a fashion that adheres to the standards of evidence that is admissible in a court of law. http://en.wikipedia.org/wiki/computer_forensics
  • 5. Pharmaceuticals What is forensics? • Computer forensics includes the following aspects: – identify evidence – preserve evidence – analyze evidence – present results • This has to be done following appropiate standards, especially if results need to be admitted by court of law
  • 6. Pharmaceuticals Incident handling • General areas of incident handling – planning and preparation – incident detection – containment / response – recovery – analysis
  • 7. Pharmaceuticals Forensics scope and environment applications os server computerized systems infrastructure systems lan / dmz external environment do you have all the relevant information?
  • 8. Pharmaceuticals Gathering data • Volatile data – registers, cache contents – memory contents – network connections – running processes • Non-volatile data – content of filesystems and drives – content of removable media
  • 9. Pharmaceuticals Volatile data - preparation • Create cd-rom with trusted toolset – at least include a trusted version of CMD.EXE from the same operating system – netcat or cryptcat (http://sourceforge.net/projects/cryptcat/) – system tools (ipconfig, netstat, date, time, net, arp ...) for different windows versions and service pack levels – pstools, listdlls, filemon, regmon, autoruns... (http://sysinternals.com) – hfind, fport, ntlast, ... (http://foundstone.com) – windows resource kit tools – a good sniffer (ethereal, windump, ...) – md5sum / md5deep
  • 10. Pharmaceuticals Volatile data - the set up • Connect forensics workstation to same lan as suspect server • Configure netcat or cryptcat in forensics workstation to listen on a port and save received data to evidence file • Mount trusted toolset cd-rom in suspect server • Open trusted console (cmd.exe)
  • 11. Pharmaceuticals Volatile data - what to get • System date and time • Running processes • Network connections • Open ports • Applications listening on open sockets • Logged on users
  • 12. Pharmaceuticals Volatile data - tools • date /t & time /t – get system date and time • ipconfig /all – get tcp/ip configuration • netstat -aon – get network connections and listening ports (with associated process pid) • psinfo -shd – get computer information (hardware, software, hotfixes, versions, etc.) • pslist -t – get running processes
  • 13. Pharmaceuticals Volatile data - tools • psloggedon – show logged on users and log on times • psloglist – dump event log • psservice – dump system service information • net use – list netbios/smb connections • listdlls – list all dlls loaded in system • sigcheck -u -e c:windowssystem32 – enumerate all unsigned files (.exe, .dll)
  • 14. Pharmaceuticals Volatile data - tools • streams -s c: – list files with alternate data streams (ads) • logonsessions -p – lists logged on sessions and processes running on each session • strings – searches for ascii/unicode strings in suspicious files (you decide which are suspicious or not!) • arp -a – displays arp cache table • ntlast – record succesful and failed logins in system (including null sessions and remote logins)
  • 15. Pharmaceuticals Volatile data - tools • autorunsc – show all kinds of autorun items • hfind c: – finds hidden files
  • 16. Pharmaceuticals Volatile data - GUI tools • rootkit revealer – detects usermode or kernelmode rootkits • process explorer – useful information about running processes, loaded libraries, used resources, etc. • tcpview – displays network connections and associated applications
  • 17. Pharmaceuticals Network information • Useful static data to get – IDS/IPS logs – firewall logs – radius/VPN logs – DHCP logs and leased ip information – application logs from other servers in same network if they are suspected of being entry point (ftp, www, database, ...)
  • 18. Pharmaceuticals Network information • Traffic to/from live system – use of sniffer recommended – can use ethernet probe (read-only cat5 if possible!) – if server connected to hub, then plug probe into hub – if connected to switch, use a mirror port (in expensive switches) or use arp-spoofing to redirect traffic to sniffer – best sniffer: ethereal
  • 19. Pharmaceuticals Filesystem acquisition • Physical acquisition – turn off machine (plug power cable) – remove harddisk – connect to forensics workstation using hardware IDE/SCSI write blocker – perform bitwise copy
  • 20. Pharmaceuticals Filesystem acquisition • Network acquisition - live system – not recommended • untrusted operating system • filesystem in inconsistent state – configure forensics workstation • lots of free disk space • netcat listener (nc -l -p 9000 > disk1.dd) • after acquiring compute hash (md5sum disk1.dd > disk.md5) – acquire live filesystem • run 'dd for windows' from trusted cd-rom toolset • dd if=.PhysicalDrive0 bs=2k | nc -w 3 10.0.0.1 9000 – where 10.0.0.1 is the ip address of forensics workstation
  • 21. Pharmaceuticals Filesystem acquisition • Network acquisition - non-live system – configure forensics workstation • lots of free disk space • netcat listener (nc -l -p 9000 > disk1.dd) • after acquiring compute hash (md5sum disk1.dd > disk.md5) – configure suspect system • boot suspect system (losing volatile info!) into linux livecd distro (gentoo, helix, knoppix, ...) • run dd to image disk over network with netcat – dd if=/dev/sda | nc 10.0.0.1 9000
  • 22. Pharmaceuticals Filesystem analysis • Many tools for this – EnCase (commercial) – The Sleuth Kit + forensics browser – ftimes • Basic analysis tool functionality – file topography – compute hashes for files – create timeline analysis (mac data) – identify and recover deleted files – search functions – case management
  • 23. Pharmaceuticals Filesystem analysis • The Sleuth Kit + forensics browser
  • 25. Pharmaceuticals Timeline analysis - other sources • LastWrite information in registry keys – use 'lsreg.pl' to parse registry and extract information including lastwrite data Key -> CurrentControlSetControlWindowsShutdownTime LastWrite : Tue Aug 2 12:06:56 2005 Value : ShutdownTime;REG_BINARY;c4 96 a0 ad 5a 97 c5 01 • INFO2 files – contains information about deleted files by each user (only if it goes to recycle bin) – use 'rifiuti' to extract information – file normally at C:Recycler%SID%INFO2
  • 26. Pharmaceuticals Timeline analysis - other sources • Prefetch folder – used by windows to store information about how to effectively launch executables to improve performance – XP prefetches at boot time and application launch, 2003 prefetches only at boot time (default) – .pf files in %systemroot%/prefetch folder – the .pf contains information about file paths – the mac info of the .pf file gives us information about when an application has been launched – use 'pref' or 'pref_ver' to parse this info
  • 27. Pharmaceuticals Timeline analysis - other sources • Logs – event logs (application, system, security) • very useful, many tools to extract – IIS/webserver/FTP logs • useful to detect webapp exploiting (maybe as point of entry), for example unicode attacks, sql injection, ... – setupapi.log • information about installation of applications and devices – schedlgu.txt • information about scheduled tasks – antivirus logs – ...
  • 28. Pharmaceuticals Timeline analysis - other sources • Recently opened documents - check this registry key (for each user!) HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerRunMRU • Temp folders – examine contents for suspicious files • Web browser cache – 'pasco' tool for internet explorer forensic analysis – cache and cookies folders – browser history
  • 29. Pharmaceuticals Analysis of evidence • Need to find "footprints" • Initial analysis – check for hidden or unusual files – check for unusual processes and open sockets – check for unusual application requests – check for suspicious accounts – determine patch level of system • Based on findings, we should develop a strategy for further investigation – full filesystem analysis – recovery of deleted files – password cracking – analysis of pagefile – ...
  • 30. Pharmaceuticals Tools • These are the mentioned tools in this presentation • Feel free to add more to your toolkit • Script (vbscript, perl) your toolset!!
  • 32. Pharmaceuticals FIST Conference @ www.fistconference.org Alfredo Reino Madrid, September 2005 Thanks for your attention.