Uploaded by exedee1234

7.2 Forensics Toolkits

advertisement
7.2
Forensics Toolkits
UTSA IS 3523 ID & Incident Response
Kaufman
What We Will Cover
• “Who said there were no free lunches anymore?”
• Types of tools
◦
◦
◦
◦
◦
◦
Cygwin
Data Integrity Tools
Drive Tools
Viewers
Search Tools
Forensics Programs
UTSA IS 3523 ID & Incident Response
Kaufman
CYGWIN
• A Unix environment for Windows:
◦ A DLL (cygwin1.dll) that acts as a UNIX emulation layer
providing substantial UNIX API functionality
◦ A collection of tools, ported from UNIX, which provide
UNIX/Linux look and feel
◦ The Cygwin DLL works with all versions of Windows since
Windows 95, with the exception of Windows CE
UTSA IS 3523 ID & Incident Response
Kaufman
CYGWIN
• Where to get it:
◦ www.redhat.com/download/cygwin.html
• What’s included:
◦ date time uptime uname –a
◦ hostname whoamienv
◦ ps netstat arp
UTSA IS 3523 ID & Incident Response
Kaufman
Data Integrity Tools
• Goal: maintain the chain of evidence and
integrity of tools
• Maresware’s Disk_crc
◦ http://www.dmares.com
• MD5 Summer
◦ http://sourceforge.net/projects/md5summer
UTSA IS 3523 ID & Incident Response
Kaufman
Network Tool
• NetCat/Cryptcat
◦ Creates a channel of communication between hosts
◦ Used during forensics to create a reliable, TCP connection
between the target system and the forensic workstation
◦ Cryptcat provides for encryption
◦ http://netcat.sourceforge.net/
◦ http://cryptcat.sourceforge.net/
UTSA IS 3523 ID & Incident Response
Kaufman
Netcat Commands
• Forensic workstation (192.168.1.1) command
◦ E:\>nc –l –p 2222 > yourfilename
◦ Translation: execute netcat in listen mode on port 2222 and
pipe inbound traffic to “yourfilename”
• Sending output from target system
◦ A:> pslist | nc 192.168.1.1 2222
◦ Translation: execute pslist and pipe output to netcat and
netcat will transmit to 192.168.1.1 port 2222
UTSA IS 3523 ID & Incident Response
Kaufman
Netcat in Action
Hacked Machine
time
Forensics Workstation
date
loggedon
fport
pslist
Nbtstat - c
1)
2)
3)
4)
Run trusted commands on Hacked Machine
Send output of commands to forensics workstation using netcat
Perform off-line review
MD5SUM output files
UTSA IS 3523 ID & Incident Response
Kaufman
Netcat Command Sequence
Hacked Machine
time
Forensics Workstation
192.168.1.1
date
loggedon
fport
pslist
Nbtstat - c
A:>time | nc 192.168.1.1 2222
A:>date | nc 192.168.1.1 2222
*
*
A:>Nbtstat – c | nc 192.168.1.1 2222
UTSA IS 3523 ID & Incident Response
Kaufman
C:>nc – l – p 2222 > forensics.txt
C:>md5sum forensics.txt > ?????
Drive Tools
• Goal: allow collection of various hard/floppy/CD
forensics
• Partition tools
◦ fdisk (for Linux, DOS version obsolete)
◦ Partinfo (free ftp://ftp.powerquest.com/pub/utilities)
◦ PartitionMagic (includes Partinfo but cost $)
• CD-R utilities
◦ CD-R diagnostics (www.cdrom-prod.com/software.html)
• Unerase Tools
◦ Windows: Norton Utilities Diskedit & unerase
◦ Unix: e2recover (www.praeclarus.demon.co.uk)
◦ FilesScavenger (www.quetek.com/)
UTSA IS 3523 ID & Incident Response
Kaufman
Drive Tools (cont’d.)
• Drive imagers
◦
◦
◦
◦
NTI’s SafeBack (www.forensics-intl.com)
SnapBack (www.cdp.com)
Ghost (www.symantec.com)
Dd—the Unix command
• Disk wipers
◦ DiskScrub from NTI
UTSA IS 3523 ID & Incident Response
Kaufman
File Viewers
• Goal: allow investigator to discover, view, and
analyze files on all operating systems
• QuickViewPlus – (www.jasc.com)
◦ Views over 200 file types
• Conversion Plus (www.dataviz.com)
◦ Views Mac files on Windows
• ThumbsPlus – (www.cerious.com)
◦ Catalogs and displays all image files
UTSA IS 3523 ID & Incident Response
Kaufman
Search Tools
• Goal: find keywords pertinent to investigation
• Danny Mares StringSearch (www.maresware.com)
• Hidden streams
◦ SFind (www.foundstone.com)
◦ Streams (www.sysinternals.com/ntw2k/source/misc.html)
UTSA IS 3523 ID & Incident Response
Kaufman
Forensics Programs
• Focus: collect and analyze data
• Forensic Toolkit – www.foundstone.com
◦ Focus is on Windows NT systems
• The Coroners Toolkit (TCT) – www.fish.com
◦ Investigates a hacked Unix host
◦
◦
◦
◦
graverobber
mac utility
unrm utility
lazarus tool
UTSA IS 3523 ID & Incident Response
Kaufman
Forensics Programs (cont’d.)
• SANS Investigative Forensic Toolkit (SIFT)
◦ http://digital-forensics.sans.org/community/downloads
UTSA IS 3523 ID & Incident Response
Kaufman
Forensics Programs (cont’d.)
• ForenSix by Dr. Fred Cohen
◦ www.all.net
◦ Runs on Linux, but can access many different file systems
• EnCase (www.encase.com)
◦ Claims to be the only fully integrated Windows-based
forensics application
UTSA IS 3523 ID & Incident Response
Kaufman
Foundstone Tools
• http://www.foundstone.com/resources/forensics.ht
m
◦
◦
◦
◦
◦
◦
◦
◦
Pasco 1.0 – IE activity forensic tool
Galleta 1.0 – Examine content of cookie files from IE
Rifiuti 1.0 – Examine Info2 file in the Recycle Bin
Vision 1.0 – Reports open TCP/UDP ports and maps to
owning process
NTLast 3.0 – Security Log Analyzer
ShoWin 2.0 – Show information about Windows
BinText 3.0 - Finds strings in a file
Patchit 2.0 – Binary file byte patching program
UTSA IS 3523 ID & Incident Response
Kaufman
Vision System Info
UTSA IS 3523 ID & Incident Response
Kaufman
Vision Processes View
UTSA IS 3523 ID & Incident Response
Kaufman
Vision Services View
UTSA IS 3523 ID & Incident Response
Kaufman
Vision Services View
UTSA IS 3523 ID & Incident Response
Kaufman
File Watch
UTSA IS 3523 ID & Incident Response
Kaufman
Sysinternals Tools
• http://www.sysinternals.com/ntw2k/utilities.shtml
• Monitoring Tools
◦
◦
◦
◦
◦
◦
Diskmon 1.1 – monitors disk activity
Filemon 1.1 – monitors file activity
ListDLLs 2.23 – List all currently loaded DLLs
NTFSInfo—Gives size and location of MFT
Portmon 3.02—monitors serial and parallel ports
Process Explorer 6.03 – find our what files, registry keys,
and other objects process which DLLs
◦ PSTools 1.82
◦ Regmon 6.06 – monitors registry activity
UTSA IS 3523 ID & Incident Response
Kaufman
Sysinternals Tools (cont’d.)
• Utilities
◦ AccessEnum 1.0 – used to find holes in file permissions
◦ NTRecover 1.0 – access dead NT disks over a serial
connection
◦ NTFSDOS 3.02 – Access NTFS drives read-only from DOS
◦ Remote Recover 2.0-- access dead NT disks over a network
connection
UTSA IS 3523 ID & Incident Response
Kaufman
pstools
UTSA IS 3523 ID & Incident Response
Kaufman
pslist
UTSA IS 3523 ID & Incident Response
Kaufman
Process Explorer-View 1
UTSA IS 3523 ID & Incident Response
Kaufman
Process Explorer-View 2
UTSA IS 3523 ID & Incident Response
Kaufman
FILEMON
UTSA IS 3523 ID & Incident Response
Kaufman
REGMON
UTSA IS 3523 ID & Incident Response
Kaufman
TCP/IP Monitor
One Single IE Access to One Web Site
UTSA IS 3523 ID & Incident Response
Kaufman
Other Useful Tools
• Password Crackers (see pg 145)
◦
◦
◦
◦
◦
L0phtCrack – www.atstake.com
John the Ripper – www.openwall.com/john
Chntpw – home.eunet.no/~pnordahl/ntpasswd
Fast ZipCracker – www.netgate.com.uy/~fpapa
AccessData – www.accessdata.com
◦ Provides entry to a wide range of application encrypted files
◦ Elcom – www.elcomsoft.com
UTSA IS 3523 ID & Incident Response
Kaufman
Other Useful Tools (cont’d.)
• Internet References
◦ Matching Hardware Types to MAC addresses
◦ www.cavebear.com/CaveBear/Ethernet/vendor.html
◦ Proxy Servers available to the Public
◦ www.proxys4all.com
◦ List of Defaced Web sites
◦ www.attrition.org
◦ List of HTTP status codes
◦ www.w3.org/Protocols/HTTP/HTRESP.html
◦ File Formats and Header Specifications
◦ www.wotsit.org
◦
UTSA IS 3523 ID & Incident Response
Kaufman
McAfee Visual Trace
Hostile Activity From China
UTSA IS 3523 ID & Incident Response
Kaufman
Forensics Toolkit Summary
• Lots of free lunches are out there when it comes to
forensic tools and utilities…do some research!
UTSA IS 3523 ID & Incident Response
Kaufman
Next Steps
• Review the required reading for this module.
◦ Slide decks 7.1 and 7.2
◦ Incident Response and Computer Forensics (Mandia), pgs.
173-195
◦ Guide to integrating Forensic Techniques into Incident
Response (Kent et al., NIST, 2006) (attached to 7.1)
• Take Quiz 7.3.
• Keep working on Lab 03.
UTSA IS 3523 ID & Incident Response
Kaufman
UTSA IS 3523 ID & Incident Response
Kaufman
36
Download