coen 250 computer forensics

55
COEN 250 Computer Forensics Windows Life Analysis

Upload: pisces

Post on 25-Feb-2016

37 views

Category:

Documents


1 download

DESCRIPTION

COEN 250 Computer Forensics. Windows Life Analysis. Extracting Evidence from a Life System. Degrees of Volatility of Data. Gathering more volatile data versus Safer forensics procedures. Extracting Evidence from a Life System. Life Examination is done: To quickly access the situation - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: COEN 250  Computer Forensics

COEN 250 Computer Forensics

Windows Life Analysis

Page 2: COEN 250  Computer Forensics

Extracting Evidence from a Life SystemDegrees of Volatility of Data. Gathering more volatile data

versus Safer forensics procedures.

Page 3: COEN 250  Computer Forensics

Extracting Evidence from a Life SystemLife Examination is done: To quickly access the situation

Confirmation of incident. To retrieve volatile data

Such as network connections, running processes, etc.

Page 4: COEN 250  Computer Forensics

Extracting Evidence from a Life SystemInitial response must not destroy potential

evidence. Use only trusted tools on a response toolkit. Document results.

Notebook Hard Drive of target system Removable media connected to target drive Other system using netcat or cryptcat

Page 5: COEN 250  Computer Forensics

Extracting Evidence from a Life System Plan investigation. Evidence gathering differs

according to incidence: Unacceptable web-surfing. Intellectual property rights theft. Compromised system.

Page 6: COEN 250  Computer Forensics

Extracting Evidence from a Life System Response Toolkit

Collection of Trusted Tools. Stored on removable media.

Floppies (write-protected) CD Thumbdrive (write-protected)

Page 7: COEN 250  Computer Forensics

Response Toolkit Determine the tools needed. Create Toolkit. Check dependencies on DLL and

other files. Include those in toolkit. Include file authentication tool

such as MD5.

Page 8: COEN 250  Computer Forensics

Response Toolkit: cmd.exeBuilt-in command prompt.

Page 9: COEN 250  Computer Forensics

Response Toolkitnetstat Enumerates all

listening ports and all connections to those ports.

Suspicious connection? (No, windows messenger.)

Page 10: COEN 250  Computer Forensics

Response Toolkitrasusers Which users have remote access

privileges on the target system.

Page 11: COEN 250  Computer Forensics

Response ToolkitFport Finds open TCP/IP and UDP ports and maps

them to the owning application

Page 12: COEN 250  Computer Forensics

Response Toolkit: pslist

Page 13: COEN 250  Computer Forensics

Resource Tools ListDLLs

Page 14: COEN 250  Computer Forensics

Resource Toolkit: nbtstat

Page 15: COEN 250  Computer Forensics

Resource Toolkit: arp

Page 16: COEN 250  Computer Forensics

Resource Toolkit: kill Get it from the Windows NT

Resource Kit. Terminates processes via process

number.

Page 17: COEN 250  Computer Forensics

Recourse Toolkit: md5sum Creates MD5 hashes for a file.

Page 18: COEN 250  Computer Forensics

Resource Toolkit: PsLogList Dumps the event log list.

Page 19: COEN 250  Computer Forensics

Resource Toolkit: PsInfo

Local System built.

Page 20: COEN 250  Computer Forensics

Remote Toolkit: PsFile

Page 21: COEN 250  Computer Forensics

Remote Toolkit: PsLoggedOn

Page 22: COEN 250  Computer Forensics

Resource Toolkit: PsService

Page 23: COEN 250  Computer Forensics

Resource Toolkit: regdump

Page 24: COEN 250  Computer Forensics

Preparing the Toolkit Label the toolkit. Check for dependencies with

Filemon. Lots of dependencies => lots of MAC

changes. Create an MD5 of the toolkit. Write protect any floppies.

Page 25: COEN 250  Computer Forensics

Storing Obtained Data Save data on the hard drive of

target. (Modifies System.) Record data by hand. Save data on removable media.

Includes USB storage. Save data on a remote system with

netcat or cryptcat.

Page 26: COEN 250  Computer Forensics

Storing Obtained Data with netcat Quick on, quick off target system. Allows offline review.

Establish a netcat listener on the forensic workstation. Redirect into a file.

Establish a netcat funneler on the target system to the forensic workstation.

Cryptcat does the same, but protects against sniffing.

Page 27: COEN 250  Computer Forensics

Obtaining Volatile DataStore at least System date and time. List of current users. List of current processes. List of currently open sockets. Applications listed on open socket. List of systems with current or recent

connections to the system.

Page 28: COEN 250  Computer Forensics

Obtaining Volatile Data: Procedure Execute a trusted cmd.exe Record system time and date. Determine who is logged on. Record file MAC. Determine open ports. List all apps associated with open

ports.

Page 29: COEN 250  Computer Forensics

Obtaining Volatile Data: Procedure List all running processes. List current and recent

connections. Record the system time and date. Document the commands used

during initial response.

Page 30: COEN 250  Computer Forensics

Recording System Time

Page 31: COEN 250  Computer Forensics

Determining Logons

Page 32: COEN 250  Computer Forensics

Determining File MAC

Page 33: COEN 250  Computer Forensics

Determining Open Ports

Page 34: COEN 250  Computer Forensics

Listing Applications with Open Ports

Page 35: COEN 250  Computer Forensics

Listing all running processes

Page 36: COEN 250  Computer Forensics

List current connections

Page 37: COEN 250  Computer Forensics

List current connections

Page 38: COEN 250  Computer Forensics

Documenting history

Page 39: COEN 250  Computer Forensics

Scripting the response

Page 40: COEN 250  Computer Forensics

Scripting the response

Page 41: COEN 250  Computer Forensics

Examples Use Fport to look at open ports. Use a list of ports to find suspicious

ports, i.e. those used by known Trojans, sniffers or spyware.

www.doshelp.com/trojanports.htm

Page 42: COEN 250  Computer Forensics

Examples If at your home system, fport shows a

suspicious port use and netstat shows a current connection to this port, then kill the process.

Page 43: COEN 250  Computer Forensics

Examples Knowing what processes are

running does not do you any good. You need to know what they are

doing. At least, know the typical

processes.

Page 44: COEN 250  Computer Forensics

Examples Access the registry with RegDump Then study it with regedit on the

forensic system.

Page 45: COEN 250  Computer Forensics

ExamplesAssume generic monitoring of systems.Look for Unusual resource utilization or

process behavior. Missing processes. Added processes. Processes with unusual user

identification.

Page 46: COEN 250  Computer Forensics

Examples The windows task manager can be

very helpful.

Page 47: COEN 250  Computer Forensics

Examples: Detecting and Deleting Trojans Use port scanning tools, either on

host machine or remote machine. Fport (Windows) Superscan (Windows) Nmap

netstat (for open connections)

Page 48: COEN 250  Computer Forensics

Examples: Detecting and Deleting Trojans Identify the Trojan on the disk. Find out how it is being initiated

and prevent the process. Reboot the machine and delete the

Trojan.

Page 49: COEN 250  Computer Forensics

Example Run superscan on local host to

check for open ports. What is happening at port 5000?

Page 50: COEN 250  Computer Forensics

Example

Port 5000?

Page 51: COEN 250  Computer Forensics

Example Run fport. Connected to process 1260.

Page 52: COEN 250  Computer Forensics

Example Use pllist to find out what this is. Connected to a process called svchost.

Page 53: COEN 250  Computer Forensics

Example Do an internet search on svchost. Process checks the service portion

of the registry to start services that need to run.

Use Tasklist /SVC in a command prompt

Page 54: COEN 250  Computer Forensics

Example

Page 55: COEN 250  Computer Forensics

Example Nothing serious here. At least not on the surface.