35
Incident Handling and Computer Forensics

Incident Handling and Computer Forensics

  • Upload
    merrill

  • View
    33

  • Download
    1

Embed Size (px)

DESCRIPTION

Incident Handling and Computer Forensics. NIST Publication 800-61 Computer Security Incident Handling Computer Security Incidence Denial of Service Malicious Code Unauthorized Access Inappropriate Usage. Incident Policy & Procedures. State of Management commitment - PowerPoint PPT Presentation

Citation preview

Page 1: Incident Handling and Computer Forensics

Incident Handling and Computer Forensics

Page 2: Incident Handling and Computer Forensics

• NIST Publication 800-61– Computer Security Incident Handling

• Computer Security Incidence– Denial of Service– Malicious Code– Unauthorized Access– Inappropriate Usage

Page 3: Incident Handling and Computer Forensics

Incident Policy & Procedures• State of Management commitment• Purpose & objective of the policy• Scope– Who does it apply to– Under what circumstances

• What is a computer incident• Organizational structure– Roles and responsibilities– Who can confiscate/disconnect equipment– Who/what can be monitored– What kind of reporting is required

Page 4: Incident Handling and Computer Forensics

Incident Policy & Procedures

• Prioritization of incidents• Performance measurements• Reporting and contact info

Page 5: Incident Handling and Computer Forensics

Sharing with Outside Parties

Page 6: Incident Handling and Computer Forensics

Media• Dealing with the media can be tricky

– How much info to give out– How to answer questions– How to disseminate info

• Press release• News conference

• Hold mock interviews to hone skills. Practice answering questions like:– Who attacked you?– When did it happen?– How did they do it?– How wide spread?– Did this happen because you have poor security practices?– Who is affected?– How much $$$– Etc…

Page 7: Incident Handling and Computer Forensics

Law Enforcement• Who should we contact?– FBI– District attorney offices– State law enforcement– Local (County) law– Only contact one to prevent jurisdiction conflicts

• Become familiar with law enforcement personal before an incident

• Learn how the various entities want incidents reported

• Find out what evidence needs to be collected• Determine a primary point of contact in your

organization

Page 8: Incident Handling and Computer Forensics

Incident Reporting Organizations• You will be relying on outside parties to help

you. You should contribute to help others• CERT Coordination Center– Run by Carnegie Mellon– Provides an incident reporting system

• Information Sharing and Analysis Center (IT-ISAC)– Keeps a alert system about the number of attacks

• Forum of Incidence Response and Security (FIRST)– Shares information among incidence teams

Page 9: Incident Handling and Computer Forensics

Other Outside Entities• Your ISP• Owner of the attacking address– Caution, you might be contacting the hacker’

• Software vendors• Affected External Parties– How do you handle someone who calls to tell you

your system is attacking them?– How do you contact someone who’s social

security number was compromised?– Contact to these parties should happen BEFORE

the media hears of it

Page 10: Incident Handling and Computer Forensics

Incident Team Structure• Central– One team is responsible for incidences in the entire

organization• Good for smaller or geographically dense organizations

• Distributed– Several teams, each responsible for there unit or

geographic area– Good for large orgs.– Must have a central team to coordinate common

attacks• The need to communicate between teams is essential

• Coordinated– A distributed team, but the central team provides

guidance and advice, but does not have authority over the teams

Page 11: Incident Handling and Computer Forensics

Incident Team Staffing Models• Employees– All incident work is done in house

• Partial Outsourced– Part of the incident teams work is outsourced– Most common:

• IDS systems monitoring– They are most likely more skilled (they look at reports all day long)– 24/7– If an incident is noted, the incent is handed back to the inside team

• On call contractors– If an incident is discovered, outside contractors assist in the handling

• Fully Outsourced– Mostly used for smaller companies with not enough

employees to specialize in Incident handling.

Page 12: Incident Handling and Computer Forensics

Inside Contacts• Management• Information Security

– Most likely found the incident– May be needed to alter security settings (IE firewall rules)

• Telecommunications• IT Support

– Have the best know how about the systems– Know the day to day running of the organization

• Legal Department– Rules– Legal ramifications– Right to privacy– Evidence collection – Persecution– Law suits

Page 13: Incident Handling and Computer Forensics

Inside Contacts• Public affairs• Human resources• Business Continuity– Minimize business impact of an incident– Alter business plans and projections based on an

incident• Physical Security– Getting access to a workstation in a locked office

Page 14: Incident Handling and Computer Forensics

Incident Team Services• Advisory Role– Monitor current threats and incidents– Relay important info to the rest of the organization

• Vulnerability assessment– Scan, probe, penetrate

• Intrusion Detection• Education and Awareness– Good passwords– Educate employee to notify them of unusual activity– Train technical staff about vulnerabilities and how to

protect against them

Page 15: Incident Handling and Computer Forensics

Incident Life Cycle

Page 16: Incident Handling and Computer Forensics

Incident Life Cycle - Preparation• Tools and Resources needed:– Communications• Outside contact list• On-call list • Incident report mechanisms – forms, emails,

anonymous reporting• Pagers/Cell phones of team members• Encryption software – Used to communicate between

team members (pgp)• War Room• Secure storage

Page 17: Incident Handling and Computer Forensics

Incident Life Cycle - Preparation• Tools and Resources needed:

– Hardware and Software• Forensic workstations• Backup devices• Spare workstations and network equipment

– Used to try out malicious code– Restore backups

• Blank media (cd-r, dvd-r, usb memory sticks)• Portable printer• Packet sniffers / Protocol analyzers• Forensic software• CDs, usb, and floppies with trusted applications• Evidence gathering accessories

– Notebooks– Cameras– Audio recorders– Chain of custody forms– Evidence tags

Page 18: Incident Handling and Computer Forensics

Incident Life Cycle - Preparation• Tools and Resources needed:– Analysis Resources

• Port lists– What ports should be open on what machines

• Documentation• Network diagrams

– What servers, switches, routers, firewalls, etc– What server does email, web, dns, etc and where are they

located• Baselines

– What is normal activity• Hashes

– A collection of hashes of critical applications– Eases detection of infected systems

Page 19: Incident Handling and Computer Forensics

Incident Life Cycle – Detection and Analysis

• Detection– Software Alerts

• IDS• Antivirus• File Integrity• 3rd party monitoring – probe various services to make sure they are up

– Logs• OS• Application• Network device

– Publicly available info• Info on new vulnerabilities• Info of incidents at related organizations

– People• Internal users• Outside users

Page 20: Incident Handling and Computer Forensics

Incident Life Cycle – Detection and Analysis

• Analysis– Understand Normal behavior– Centralized logging

• Have devices and software send their logs to a central location or server

– Log Retention policy• How long do we keep logs? Archive them?

– Event correlation• Events can be caught on several logs• Extract log entries across multiple logs can provide valuable info

about the event– Clock synchronization

• Logs are almost impossible to correlate if there are different times stamps – Use ntp

Page 21: Incident Handling and Computer Forensics

Incident Life Cycle – Detection and Analysis

• Analysis– Maintain a knowledge base of info

• Links to malicious code and hoax info – antivirus vendors• Links to lists of black listed spam sites• Links and manuals explaining the various codes associated

with error messages– Use google, yahoo, etc…– Run packet sniffers– Filter data if the quantity of events is to large– Experience– Diagnostic matrix for the less experienced

Page 22: Incident Handling and Computer Forensics

Incident Life Cycle – Detection and Analysis

• Documentation– As soon as a event is suspected, start a log.

• Document events as they are found• Phone conversations• File changes

– Time stamp and sign every entry– Can be used in a court of law– Work in teams of 2.

• One performs the work• One logs the work

– Put the log into a database or some where other team members can get to• You can’t work 24/7• Vacations, sick time, even death• Need to be able to allow other to start where you left off

Page 23: Incident Handling and Computer Forensics

Incident Life Cycle – Detection and Analysis

• Prioritization– If many events happen in quick succession you

need to prioritize them• Current and Potential effect

– An root compromise on one system, can they get to others– A worm on a few computers may spread to the entire org

• Criticality of the affected system– Is it a business critical web server, email, fileserver…

– Service level agreements• Maximum time to restore key resources• Maximum time to react to events

Page 24: Incident Handling and Computer Forensics

Current Impact or Likely future impact

Criticality of ResourceHigh (Internet connectivity, Public web server, firewall, customer data)

Medium (Sys Admin workstation, file and print servers, application data)

Low (user workstations)

Root access 15 min 30 min 1 hour

Unauthorized data modification

15 min 30 min 2 hour

Unauthorized user-level access

30 min 2 hour 4 hours

Un authorized access to sensitive data

15 min 1 hour 1 hour

Service unavailable 30 min 2 hours 4 hours

Annoyance 30 min Local IT staff Local IT stall

Page 25: Incident Handling and Computer Forensics

Incident Life Cycle – Detection and Analysis

• Notification– CIO– Head of information security– Other incident teams– System owner– Human resources (if it involves employees)– Public affairs (if it might generate publicity)– Legal dept

Page 26: Incident Handling and Computer Forensics

Incident Life Cycle – Containment, Eradication and Recovery

• Containment Strategy– Method• Shut down• Disconnect from the network (wired or wireless)• Segment the network• Disable functions• Block hosts or ports at the perimeter• Rebuild or clean

Page 27: Incident Handling and Computer Forensics

Incident Life Cycle – Containment, Eradication and Recovery

• Containment Strategy– Considerations• Potential damage to and theft of resources• Need for evidence preservation• Service availability• Time needed to implement the strategy• Effectiveness of the strategy• Duration of the solution

– Emergency work around (several hours)– Temporary work around (several weeks)

Page 28: Incident Handling and Computer Forensics

Incident Life Cycle – Containment, Eradication and Recovery

• Evidence Gathering and Handling– Primary reason is to resolve the incidence– May also be needed for legal reasons– Needs to be handled according to procedures that

meet applicable laws and regulations• Log of the evidence including:

– Identifying info (location, serial number, model number, hostname, MAC address, IP address, etc…)

– Name, title, phone or each person who collected data– Time and date of each collection– Location of where the evidence is stored – must be a secured

location• Evidence must be accounted for at all times• Chain of custody

Page 29: Incident Handling and Computer Forensics

Incident Life Cycle – Containment, Eradication and Recovery

• Volatile Evidence (in order of volatility)– Network Traffic• sniffers

Page 30: Incident Handling and Computer Forensics

Incident Life Cycle – Containment, Eradication and Recovery

• Volatile Evidence (in order of volatility)– Memory

• Plug in media with trusted software (usb, cd, network share)• Execute shell from trusted media (cmd.exe, bash, etc)• Dump memory to a file (not on the suspected equipment!)

– Unix: cat /dev/memory > file – Windows: mdd –o file

» Mantech Physical Memory Dump» http://sourceforge.net/projects/mdd/

• Windows Forensic Toolkit– www.accessdata.com

• Eject media, hash the extracted file, copy the file to write once media (cd), hash copy and compare.

• Copy again, hash compare.• Enter first copy into evidence (recording hash on the evidence tag)

Page 31: Incident Handling and Computer Forensics

Incident Life Cycle – Containment, Eradication and Recovery

• Volatile Evidence (in order of volatility)– Hard Drive

• Consider– Volume of storage– Drive configuration– Is the machine mission critical

• Do a graceful shutdown• Remove hard drive, connect to a work station with a write blocker• Hash original• Duplicate

– Hardware duplication is best» www.ics-iq.com

– Software» Linux: dd» Encase: www.guidancesoftware.com» Windows: Forensic Toolkit

Page 32: Incident Handling and Computer Forensics

Incident Life Cycle – Containment, Eradication and Recovery

• Volatile Evidence (in order of volatility)– Hard Drive• Duplicate

– Or reboot the compromised system with helix linux (www.e-fense.com/products.php). Good when the system uses software RAID or LVM

• Rehash the original to verify nothing was changed• Hash duplicate and compare to verify that the copy is

the same• Enter the original and hash into evidence

Page 33: Incident Handling and Computer Forensics

Incident Life Cycle – Containment, Eradication and Recovery

• Volatile Evidence (in order of volatility)– Data Analysis

• Verify Hash• Undelete or recover files• Index identifiable words into a database and search

– Strings• Hash individual files

– NIST has a database of hashes of compromised files– www.nsrl.nist.gov

• File signature analysis– Is the file what the extension say it is?

• Key word search– Pwdump –outputs hashes of windows passwords– Sysinternals– Dameware: www.dameware.com

Page 34: Incident Handling and Computer Forensics

Incident Life Cycle – Containment, Eradication and Recovery

• Volatile Evidence (in order of volatility)– Data Analysis

• AV Scan– Multiple AV software brands– www.virustotal.com/

• Method– Find a bad file– Search for other files with the same date and time– Look in the same directory– Check event logs for that date/time– Search registry for file name– Repeat with any new files found

Page 35: Incident Handling and Computer Forensics

Incident Life Cycle – Post Incident Activities

• Lessons learned• Policy updates• Pursue legal action