340 likes | 664 Views
Windows Forensics for Incident Response. Christian Kopacsi CISSP CISM CEH CHFI Security+. What is Incident Response. An organized approach to addressing and managing the aftermath of a security breach or attack. Steps to Success. Purpose of Incident Response. Preparation User Awareness
E N D
Windows Forensics for Incident Response Christian KopacsiCISSP CISM CEH CHFI Security+
What is Incident Response • An organized approach to addressing and managing the aftermath of a security breach or attack.
Purpose of Incident Response • Preparation • User Awareness • Detection & Analysis • Did an incident occur • Containment • Prevent further damage • Eradication • Root cause analysis • Recovery • Reimage the affected workstation • Post Incident Activity • Lessons Learned
Preparation • User Awareness & Training
Detection & Analysis • You can’t Respond if you can’t Detect • Logs – Hopefully a SIEM • Workstation \ Server • Firewall • IDS \ IPS • Internet Proxy \ Filter • MSSP \ 3rd Party • End Users \ Customers • You!
Containment • Prevent Further Damage • NAC • ACL • Firewall • Switch • Software • Application Whitelisting • AV
Eradication • Root Cause Analysis • Make Sure ProblemDoes Not Come Back!
Recovery • Known Good Configuration • Reimage Device • Restore from Backup
Post incident activity • Lessons Learned • What Worked • What Didn’t Work • New Policy \ Procedures • Change to existing Controls • Implement New Controls
Tableau Write Blocker • SATA\IDE
Digital Camera • Document state of evidence • Inventory items seized
Chain of Custody Form • Log all transfer of evidence
Accessdata FTk Imager • Physical\Logical Hard Drive Acquisition
Accessdata FTk Imager • Live Memory Acquisition • Encryption Keys, Passwords, Running Processes
ImDisk Virtual Disk Driver • Mount evidence files as Read Only Hard Drive
Regripper • Registry Analysis • SAM • Security • Software • System • NTUser
Helix • Free Version still available • Best of Both Worlds • Run applications from within Windows • Boot from Linux Live CD
Forensics and the State of Michigan • PROFESSIONAL INVESTIGATOR LICENSURE ACT • As of May 28, 2008, all computer forensic firms must have a Private Investigators license to practice in Michigan. • Any person engaged in the collection of electronic evidence and/or engaged for the presentation electronic evidence in a Michigan court must have a valid Private Investigators License
References & Thanks • NIST 800-61 • NIST 800-86 • http://www.cert.org/csirts/Creating-A-CSIRT.html • http://www.ussecurityawareness.org/highres/incident-response.html • http://windowsir.blogspot.com • http://www.ericjhuber.com • Chris Pogue – TrustwaveSpiderLabs • http://blog.spiderlabs.com(Sniper Forensics)