kush wadhwa _mining_digital_evidence_in_windows - clubhack2009

19
Advance Digital Forensic

Upload: clubhack

Post on 09-Jun-2015

1.798 views

Category:

Technology


3 download

TRANSCRIPT

Page 1: Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009

Advance Digital Forensic

Page 2: Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009

2

Agenda

What is Computer Forensic?

Gathering evidence from windows memory

Advance registry forensic.

Analyzing network data to collect evidence

Page 3: Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009

3

Computer Forensics – the laws

First Law of Computer Forensics

There is evidence of every action.

Harlan Carvey’s Corollary :

Once you understand what actions or conditions create or modify an artifact, then the absence of that artifact is itself an artifact.

Page 4: Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009

4

Tip of the “Digital” Iceberg

Data as seen by a casual observer using common tools (Explorer Window, cmd shell, web browser etc. )

Data as seen by Forensic Investigators using his sophisticated toolkit. May include deleted data, hidden data, unauthorized information and records of illegal activity!

Page 5: Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009

5

Windows Memory Forensic

Extracting windows login credentials from RAM image.Extracting running processes.Extracting user assist keys from RAMViewing registry keys for all open process.

Page 6: Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009

6

Volatility modules used1. hivescan {python volatility hivescan -f

<filename>}2. hivelist {python volatility hivelist -f

<filename> -o <offset value>3. Hashdump {volatility hashdump -f

<filename> (-y System Hive Offset)(-s SAM Hive Offset)

Use of CAIN & Abel to crack the hashes obtained.

Extracting windows login credentials from RAM image.

Page 7: Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009

7

Extracting user assist keys from RAM

Load the image in Encase and search for the keyword HRZR_EHACNGU {which is “UEME_RUNPATH”}. Keywords are HRZR_EHACNGU.*[\.]rkr

HRZR_EHACNGU.*[\.]yaxDecrypt the results using ROT13-decryptor.

Page 8: Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009

Advance Registry Forensic

Page 9: Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009

9

Windows Registry

Registry files are essentially databases containing information and settings for

HardwareSoftwareUsersPreferences

A registry hive is a group of keys, subkeys, and values in the registry that has a set of supporting files containing backups of its data. In Windows 98, the registry files are named User.dat and System.dat. In Windows Millennium Edition, the registry files are named Classes.dat, User.dat, and System.dat. In Win XP, the registry files are available in C:\windows\system32\config folder

Page 10: Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009

10

Mining Windows RegistryMultiple forensic avenues in the registry!

System and User-specific settingsUserAssistMuiCacheMRU ListsProgramsCacheStreamMRUShellbagsUsbstorIE passwordsand many more!

Page 11: Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009

11

Mining Windows Registry

Multiple forensic avenues in the registry!System and User-specific settings- NTUSER.DATUserAssist - HKCU/software/microsoft/windows/currentversion/Explorer/UserAssistMuiCache - HKCU/Software/Microsoft/Windows/ShellNoRoam/MUICacheMRU Lists - HKCU/software/microsoft/windows/currentversion/Explorer/RunMRUProgramsCache –HKCU/Software/Microsoft/Windows/CurrentVersion/Explorer/StartPageStreamMRU - HKCU/software/microsoft/windows/currentversion/Explorer/StreamMRUShellbags – HKCU/Software/Microsoft/Windows/Shell/BagMRUUsbstor - HKLM/System/CurrentControlSet/Enum/USBStorand many more!

Demo

Page 12: Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009

12

Tools to analyze registry

Regripper {open source tool. Developed by Harlen Carvey. Coding is done in PERL language}Windows registry analyzerWindows registry recovery.Timestamp Dcode.

Page 13: Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009

Network Forensic

Page 14: Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009

14

The Security Process and Network Forensics

Page 15: Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009

15

Overall approach

Study the network architecture.

Determine network traffic capture mechanisms at appropriate points and get a copy of the capture file.

Determine devices that should/could be generating logs, especially those that are pertinent to case in hand.

Determine vendors of these devices.

Determine logging functionality, and logging configuration.

Assemble appropriate log analysis tools, and objectives of the analysis

String searchesPattern searches

Page 16: Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009

16

Tools for analyzing captured network traffic

Network Miner

Netwitness

Wireshark

Winhex

Page 17: Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009

Case study of Network Forensic

Page 18: Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009

18

Page 19: Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009

19

Thank you!

Questions and Answers!!

Kush Wadhwa, EnCE, CEH, RHCEContact Number : +919717188544Email Address: - [email protected]