Router Marshal How-To

advertisement
Patrick Leahy Center for Digital Investigation (LCDI)
Router Marshal How-To
Written & Researched by
Maegan Katz
175 Lakeside Ave, Room 300A
Phone: 802/865-5744
Fax: 802/865-6446
http://www.lcdi.champlin.edu
July 2013
Router Marshal How-To
Page 1 of 14
Patrick Leahy Center for Digital Investigation (LCDI)
Disclaimer:
This document contains information based on research that has been gathered by employee(s) of The Senator
Patrick Leahy Center for Digital Investigation (LCDI). The data contained in this project is submitted
voluntarily and is unaudited. Every effort has been made by LCDI to assure the accuracy and reliability of the
data contained in this report. However, LCDI nor any of our employees make no representation, warranty or
guarantee in connection with this report and hereby expressly disclaims any liability or responsibility for loss
or damage resulting from use of this data. Information in this report can be downloaded and redistributed by
any person or persons. Any redistribution must maintain the LCDI logo and any references from this report
must be properly annotated.
Router Marshal How-To
Page 2 of 14
Patrick Leahy Center for Digital Investigation (LCDI)
1 Introduction
Router Marshal Version 1.0.1 is a digital forensic tool developed by ATC-NY for law enforcement that is used to
“automatically acquire digital forensic evidence from network devices such as routers and wireless access
points. An investigator can use the Router Marshal software in the field to identify a network device,
automatically acquire volatile forensic evidence from the device, and view and interpret this evidence.”1 The
software also maintains detailed logs of all activities and communications it performs with a target device.
2 Installing
1) Double-click RouterMarshal_Setup and run it through the installer. Make sure to install WinPcap and nmap
(http://nmap.org/download.html) to ensure that Router Marshal will run correctly. WinPcap will be downloaded
with nmap, but it will still need to be installed. Once all of the components are installed, run Router Marshal. If
the host computer is connected to the internet, you can register the software with the product key. Otherwise,
choose the option to manually register via email.
1
Router Marshal™ Digital Forensic Software. (2010, December 22). Router Marshal™ Digital Forensic Software. Retrieved from http://routermarshal.com/
Router Marshal How-To
Page 3 of 14
Patrick Leahy Center for Digital Investigation (LCDI)
3 Acquisition
1) A new acquisition can be started by selecting the magnifying glass icon in the upper left corner, in the icon bar.
Additionally, an old case can be opened by selecting the folder icon to the right.
Router Marshal How-To
Page 4 of 14
Patrick Leahy Center for Digital Investigation (LCDI)
2) After selecting a new acquisition, you will be prompted to enter acquisition information such as: acquisition
name/ID, case number, the name of the investigator, and the save to location. Click Next.
Router Marshal How-To
Page 5 of 14
Patrick Leahy Center for Digital Investigation (LCDI)
3) The next step is to select the target. Select the IP/Ethernet option. The program will attempt to automatically
detect the IP and MAC address of available devices. If the program doesn’t automatically detect the available
devices, select one of the detected devices or type in the target IP address. Click Finish.
4) The acquisition should take no more than a few minutes.
Router Marshal How-To
Page 6 of 14
Patrick Leahy Center for Digital Investigation (LCDI)
5) If Router Marshal is unable to detect what kind of device the router is, a window with a list of supported devices
will pop up. Select the appropriate device from the list and then click OK. If a device does not appear on the list,
Router Marshal does not have a script to acquire the device. It is possible to expand the list of supported routers
by writing custom scripts for an unsupported router.
Router Marshal How-To
Page 7 of 14
Patrick Leahy Center for Digital Investigation (LCDI)
6) Once a device is selected, Router Marshal may require authentication. This is the same information that is
entered when accessing the router’s web interface. The default username and password for the device will
automatically be filled in. If the defaults have been changed, the user will need to know the new username and
password in order to access the router. Click OK.
7) When the acquisition is finished, the results will automatically appear. The detection tab shows the tools used to
identify the device. This will most likely be an NMAP scan. The evidence tab shows the commands used to
acquire data, and the analysis tab puts all the results into easy to read charts.
Router Marshal How-To
Page 8 of 14
Patrick Leahy Center for Digital Investigation (LCDI)
8) Right clicking a selection in evidence gives the option to “Go To Referenced URL,” which will bring up a visual of
the page for that particular router setting.
Router Marshal How-To
Page 9 of 14
Patrick Leahy Center for Digital Investigation (LCDI)
9) The following chart is a breakdown of types of evidence found using Router Marshal. It may vary from router to
router.
Command
/WLG_adv.htm
/DEV_device.htm
/BAS_ether.htm
/BAS_pppoe.htm
/BAS_pptp.htm
/BKS_keyword.htm
/BKS_service.htm
/UPG_upgrade.htm
/DNS_ddns.htm
/RST_st_dhcp.htm
/FW_email.htm
/LAN_lan.htm
/RST_st_poe.htm
/RST_status.htm
/FW_pt.htm
/FW_remote.htm
/LAN_lan.htm
Router Marshal How-To
Action
Advanced Wireless Variables
Attached Devices
Basic Internet Settings
Basic Internet Settings
Basic Internet Settings
Blocked Keywords
Blocked Services
Check for Firmware Updates on Startup
DDNS Settings
DHCP Settings
Email Variables
LAN Variables
POE Connection Status
Port Information
Port Triggering
Remote Management Settings
Reserved IP Addresses
Comments
IP Address, Device Name, MAC Address
Ethernet
Point-to-Point Protocol Over Ethernet
Point-to-Point Tunneling Protocol
Checked/ Unchecked
IP, Subnet Mask, DHCP Start/End, Etc.
Connected/Disconnected
Port, Start/End IP, Enables/Disabled
Page 10 of 14
Patrick Leahy Center for Digital Investigation (LCDI)
/FW_log.htm
Router Log
Activity log for the router**
/STR_stattbl.htm
Router Status Statistics
Uptime, Packets, Etc.
/FW_schedule.htm
Schedule Variables
Time Data
/STR_routes.htm
Static Routes
/BKS_keyword.htm
Trusted IP for Blocked Sites
/UPNP_upnp.htm
UPnP Portmap Table
Active/Unactive, Protocol, IP Address, Etc.
/RST_status.htm
Version Information
/WAN_wan.htm
WAN Variables
/WLG_acl.htm
Wireless Card Access List
/RST_status.htm
Wireless Port Information
/WLG_wireless2.htm Wireless2 Settings Variables
/WLG_wireless3.htm Wireless3 Settings Variables
** The router log will get accessed sites if the “Keyword Blocking” option in the router is always on. This means that
the router is allowing or denying sites (it won’t deny anything if there is nothing on the blocked list). If the setting is
not turned on, visited sites will not show up in the log.
4. Report
1) To begin creating a report, select the clipboard icon at the top of the Router Marshal Window.
Router Marshal How-To
Page 11 of 14
Patrick Leahy Center for Digital Investigation (LCDI)
2) The generate report window will popup. Here, you will enter the report name, comments, or an optional header
or custom logo. Select Next.
3) Select the sections of data to include in the report. Each selection correlates to the tabs from the acquisition
results. The “Include audit log” option will include the log of all communication that Router Marshal had with
the router in the report. Select Next.
Router Marshal How-To
Page 12 of 14
Patrick Leahy Center for Digital Investigation (LCDI)
4) Select the output type for the report and the report location. Select Finish.
Router Marshal How-To
Page 13 of 14
Patrick Leahy Center for Digital Investigation (LCDI)
5) The report will output in the chosen format.
6) At this point, you have successfully acquired data from a router and created a report with Router Marshal.
Router Marshal How-To
Page 14 of 14
Download