540 likes | 568 Views
COEN 250 Computer Forensics. Windows Life Analysis. Extracting Evidence from a Life System. Degrees of Volatility of Data. Gathering more volatile data versus Safer forensics procedures. Extracting Evidence from a Life System. Plan investigation. Evidence gathering differs:
E N D
COEN 250 Computer Forensics Windows Life Analysis
Extracting Evidence from a Life System Degrees of Volatility of Data. • Gathering more volatile data versus • Safer forensics procedures.
Extracting Evidence from a Life System • Plan investigation. • Evidence gathering differs: • Unacceptable web-surfing. • Intellectual property rights theft. • Compromised system.
Extracting Evidence from a Life System • Response Toolkit • Collection of Trusted Tools. • Stored on removable media. • Floppies • CD
Response Toolkit • Determine the tools needed. • Create Toolkit. • Check dependencies on DLL and other files. Include those in toolkit. • Include file authentication tool such as MD5.
Response Toolkit: cmd.exe Built-in command prompt.
Response Toolkit netstat • Enumerates all listening ports and all connections to those ports. Suspicious connection? (No, windows messenger.)
Response Toolkit rasusers • Which users have remote access privileges on the target system.
Response Toolkit Fport • Finds open TCP/IP and UDP ports and maps them to the owning application
Resource Toolkit: kill • Get it from the Windows NT Resource Kit. • Terminates processes via process number.
Recourse Toolkit: md5sum • Creates MD5 hashes for a file.
Resource Toolkit: PsLogList • Dumps the event log list.
Resource Toolkit: PsInfo Local System built.
Preparing the Toolkit • Label the toolkit. • Check for dependencies with Filemon. • Lots of dependencies => lots of MAC changes. • Create an MD5 of the toolkit. • Write protect any floppies.
Storing Obtained Data • Save data on the hard drive of target. (Modifies System.) • Record data by hand. • Save data on removable media. • Includes USB storage. • Save data on a remote system with netcat or cryptcat.
Storing Obtained Data with netcat • Quick on, quick off target system. • Allows offline review. • Establish a netcat listener on the forensic workstation. Redirect into a file. • Establish a netcat funneler on the target system to the forensic workstation. • Cryptcat does the same, but protects against sniffing.
Obtaining Volatile Data Store at least • System date and time. • List of current users. • List of current processes. • List of currently open sockets. • Applications listed on open socket. • List of systems with current or recent connections to the system.
Obtaining Volatile Data: Procedure • Execute a trusted cmd.exe • Record system time and date. • Determine who is logged on. • Record file MAC. • Determine open ports. • List all apps associated with open ports.
Obtaining Volatile Data: Procedure • List all running processes. • List current and recent connections. • Record the system time and date. • Document the commands used during initial response.
Examples • Use Fport to look at open ports. • Use a list of ports to find suspicious ports, i.e. those used by known Trojans, sniffers or spyware. www.doshelp.com/trojanports.htm
Examples • If at your home system, fport shows a suspicious port use and netstat shows a current connection to this port, then kill the process.
Examples • Knowing what processes are running does not do you any good. • You need to know what they are doing. • At least, know the typical processes.
Examples • Access the registry with RegDump • Then study it with regedit on the forensic system.
Examples Assume generic monitoring of systems. Look for • Unusual resource utilization or process behavior. • Missing processes. • Added processes. • Processes with unusual user identification.
Examples • The windows task manager can be very helpful.
Examples: Detecting and Deleting Trojans • Use port scanning tools, either on host machine or remote machine. • Fport (Windows) • Superscan (Windows) • Nmap • netstat (for open connections)
Examples: Detecting and Deleting Trojans • Identify the Trojan on the disk. • Find out how it is being initiated and prevent the process. • Reboot the machine and delete the Trojan.
Example • Run superscan on local host to check for open ports. • What is happening at port 5000?
Example Port 5000?
Example • Run fport. • Connected to process 1260.
Example • Use pllist to find out what this is. • Connected to a process called svchost.