23
Web Forensics Web Forensics Jess García Consultant – Jessland Enterprise Security Services Security Instructor – The SANS Institute http://www.jessland.net

Web Forensics - Open Source Foundation for Application ...Web Forensics Jess García Consultant – Jessland Enterprise Security Services ... – Lots of tools, both commercial and

  • Upload
    others

  • View
    7

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Web Forensics - Open Source Foundation for Application ...Web Forensics Jess García Consultant – Jessland Enterprise Security Services ... – Lots of tools, both commercial and

Web ForensicsWeb Forensics

Jess García Consultant – Jessland Enterprise Security ServicesSecurity Instructor – The SANS Institute

http://www.jessland.net

Page 2: Web Forensics - Open Source Foundation for Application ...Web Forensics Jess García Consultant – Jessland Enterprise Security Services ... – Lots of tools, both commercial and

Web Forensics – © Copyright 2006, Jess García – http:// www.jessland.net – 2

AgendaAgenda

Digital ForensicsDigital ForensicsEvidenceEvidenceWeb ForensicsWeb ForensicsNetwork ForensicsNetwork ForensicsOperating System ForensicsOperating System ForensicsClient Side ForensicsClient Side ForensicsServer Side ForensicsServer Side ForensicsDemoDemoForensics ReadinessForensics Readiness

Page 3: Web Forensics - Open Source Foundation for Application ...Web Forensics Jess García Consultant – Jessland Enterprise Security Services ... – Lots of tools, both commercial and

Web Forensics – © Copyright 2006, Jess García – http:// www.jessland.net – 3

Digital ForensicsDigital Forensics

What is Digital Forensics?What is Digital Forensics?– Incident response– Computer Forensic Investigations– Forensic preparedness– Secure Data Recovery

Page 4: Web Forensics - Open Source Foundation for Application ...Web Forensics Jess García Consultant – Jessland Enterprise Security Services ... – Lots of tools, both commercial and

Web Forensics – © Copyright 2006, Jess García – http:// www.jessland.net – 4

Goal: Goal: Obtain Good EvidenceObtain Good Evidence

EvidenceEvidence– Human Testimony– Environmental– Network Traffic– Network Devices – Host

Operating SystemsDatabasesApplications

– Peripherals– External Storage– Mobile Devices– … ANYTHING !!!

Page 5: Web Forensics - Open Source Foundation for Application ...Web Forensics Jess García Consultant – Jessland Enterprise Security Services ... – Lots of tools, both commercial and

Web Forensics – © Copyright 2006, Jess García – http:// www.jessland.net – 5

Web ForensicsWeb Forensics

Why Web Forensics?Why Web Forensics?– Child Pornography– CC Fraud– Identity Theft– Industrial Espionage– Casual Hacks– …

Web Attacks:Web Attacks:– Clients:

Perimeter PenetrationCC Fraud / Identity Theft

– Web Servers:Access critical information (e.g. customer databases)Trojanize software

Page 6: Web Forensics - Open Source Foundation for Application ...Web Forensics Jess García Consultant – Jessland Enterprise Security Services ... – Lots of tools, both commercial and

Web Forensics – © Copyright 2006, Jess García – http:// www.jessland.net – 6

Web ForensicsWeb Forensics

PlayersPlayers– Common

Network TrafficOperating Systems

– Client SideWeb Browsers

– Server SideWeb ServersApplication ServersDatabase Servers

Page 7: Web Forensics - Open Source Foundation for Application ...Web Forensics Jess García Consultant – Jessland Enterprise Security Services ... – Lots of tools, both commercial and

Web Forensics – © Copyright 2006, Jess García – http:// www.jessland.net – 7

Network ForensicsNetwork Forensics

PhasesPhases– Deployment

May integrate with NIDS

– Traffic Capture– Traffic Analysis

Challenges:Challenges:– Encryption (HTTPS)– High Traffic Load

Page 8: Web Forensics - Open Source Foundation for Application ...Web Forensics Jess García Consultant – Jessland Enterprise Security Services ... – Lots of tools, both commercial and

Web Forensics – © Copyright 2006, Jess García – http:// www.jessland.net – 8

Operating System Operating System ForensicsForensics

Operating SystemsOperating Systems– Windows, UNIX, …

AnalysisAnalysis– Files, Directories & Filesystems

Timestamps, permissionsAdditions, changes, removals

– Memory & Swap– Processes– Services– Network Connections– Logs

Page 9: Web Forensics - Open Source Foundation for Application ...Web Forensics Jess García Consultant – Jessland Enterprise Security Services ... – Lots of tools, both commercial and

Web Forensics – © Copyright 2006, Jess García – http:// www.jessland.net – 9

Operating System Operating System Forensics Forensics -- ToolsTools

DozensDozens– Lots of tools, both commercial and open source– Open Source Favorite Suites (more UNIX-oriented)

Helix Bootable CD

– Commercial Favorite Suites (more Windows-oriented)EnCaseFTK

– Check:http://www.jessland.net/Forensics/Software.php

Page 10: Web Forensics - Open Source Foundation for Application ...Web Forensics Jess García Consultant – Jessland Enterprise Security Services ... – Lots of tools, both commercial and

Web Forensics – © Copyright 2006, Jess García – http:// www.jessland.net – 10

Client Side Client Side ForensicsForensics

GoalsGoals– Determine if a user has been involved in a crime– Determine if a user has been victim of a crime

HowHow– Tie a person to a system at a particular point of

the time

AnalysisAnalysis– Operating System– Web Browser

Page 11: Web Forensics - Open Source Foundation for Application ...Web Forensics Jess García Consultant – Jessland Enterprise Security Services ... – Lots of tools, both commercial and

Web Forensics – © Copyright 2006, Jess García – http:// www.jessland.net – 11

Client Side Forensics:Client Side Forensics:The Web BrowserThe Web Browser

Electronic EvidenceElectronic Evidence– Email– Visited Pages– Internet Searches

Web BrowsersWeb Browsers– Internet Explorer– Firefox/Mozilla/Netscape– Others:

SafariOperaKonquerorGaleonlinks/lynx

Page 12: Web Forensics - Open Source Foundation for Application ...Web Forensics Jess García Consultant – Jessland Enterprise Security Services ... – Lots of tools, both commercial and

Web Forensics – © Copyright 2006, Jess García – http:// www.jessland.net – 12

Web Browser Forensics:Web Browser Forensics:Internet ExplorerInternet Explorer

Most commonly used BrowserMost commonly used BrowserCharacteristics:Characteristics:– Stores user’s Internet activity under his Windows

ProfileCached Information

– C:\Documents and Settings\john\Local Settings\Temporary Internet Files\Content.IE5\

History– C:\Documents and Settings\john\Local

Settings\History\History.IE5\

Cookies– C:\Documents and Settings\john\Cookies\

File– Index.dat

Page 13: Web Forensics - Open Source Foundation for Application ...Web Forensics Jess García Consultant – Jessland Enterprise Security Services ... – Lots of tools, both commercial and

Web Forensics – © Copyright 2006, Jess García – http:// www.jessland.net – 13

Web Browser Forensics:Web Browser Forensics:ToolsTools

PascoPasco– Parses IE index.dat files

Web HistorianWeb Historian– Allows to review user’s browsing history.

Cache ViewCache View– Allows to view user’s web cache.

IE History ViewIE History View– Allows to review user’s browsing history.

FTK, EncaseFTK, Encase– General Purpose Forensics Suites

Page 14: Web Forensics - Open Source Foundation for Application ...Web Forensics Jess García Consultant – Jessland Enterprise Security Services ... – Lots of tools, both commercial and

Web Forensics – © Copyright 2006, Jess García – http:// www.jessland.net – 14

Server Side Server Side ForensicsForensics

Components:Components:– Web Servers– Application Servers– Database Servers

Page 15: Web Forensics - Open Source Foundation for Application ...Web Forensics Jess García Consultant – Jessland Enterprise Security Services ... – Lots of tools, both commercial and

Web Forensics – © Copyright 2006, Jess García – http:// www.jessland.net – 15

Server Side Server Side ForensicsForensics

The Web & The Web & ApplicatonApplicaton ServersServers– Heavily based on log analysis– Strategies

Increase verbosity of LogsLog remotelyLog securely

– Log analysis tools for identification– Keep your logs safe! Know your logs!

The The DabaseDabase BackendBackend– Transaction Log based.– Challenges:

Database Rootkits

Page 16: Web Forensics - Open Source Foundation for Application ...Web Forensics Jess García Consultant – Jessland Enterprise Security Services ... – Lots of tools, both commercial and

Web Forensics – © Copyright 2006, Jess García – http:// www.jessland.net – 16

Other PlayerOther Player’’s s ForensicsForensics

Other players:Other players:– Network Devices– Firewalls– IDSs– Proxies

In the end:In the end:– Operating System Forensics– Log Analysis– Network Traffic Analysis

Page 17: Web Forensics - Open Source Foundation for Application ...Web Forensics Jess García Consultant – Jessland Enterprise Security Services ... – Lots of tools, both commercial and

Web Forensics – © Copyright 2006, Jess García – http:// www.jessland.net – 17

The IncidentThe Incident

II’’VE BEEN HACKED !!! VE BEEN HACKED !!!

Now What???Now What???

Page 18: Web Forensics - Open Source Foundation for Application ...Web Forensics Jess García Consultant – Jessland Enterprise Security Services ... – Lots of tools, both commercial and

Web Forensics – © Copyright 2006, Jess García – http:// www.jessland.net – 18

The ResponseThe Response

Seizure

Preliminary Analysis

Investigation

Analysis

Page 19: Web Forensics - Open Source Foundation for Application ...Web Forensics Jess García Consultant – Jessland Enterprise Security Services ... – Lots of tools, both commercial and

Web Forensics – © Copyright 2006, Jess García – http:// www.jessland.net – 19

A wider view:A wider view:Incident ResponseIncident Response

The 6The 6--Step IR ProcessStep IR Process

PreparationPreparationIdentificationIdentificationContainmentContainmentEradicationEradicationRecoveryRecoveryFollowFollow--upup

Page 20: Web Forensics - Open Source Foundation for Application ...Web Forensics Jess García Consultant – Jessland Enterprise Security Services ... – Lots of tools, both commercial and

Web Forensics – © Copyright 2006, Jess García – http:// www.jessland.net – 20

DemoDemo

Web Server Compromise Web Server Compromise

&&

Forensics AnalysisForensics Analysis

Page 21: Web Forensics - Open Source Foundation for Application ...Web Forensics Jess García Consultant – Jessland Enterprise Security Services ... – Lots of tools, both commercial and

Web Forensics – © Copyright 2006, Jess García – http:// www.jessland.net – 21

Real Life ProblemsReal Life Problems

Lack of trainingLack of trainingPoor EvidencePoor EvidenceTime consuming processTime consuming processLack of logging & tracking capabilitiesLack of logging & tracking capabilitiesLack of containment capabilitiesLack of containment capabilitiesLack of appropriate Forensics environmentLack of appropriate Forensics environment

Page 22: Web Forensics - Open Source Foundation for Application ...Web Forensics Jess García Consultant – Jessland Enterprise Security Services ... – Lots of tools, both commercial and

Web Forensics – © Copyright 2006, Jess García – http:// www.jessland.net – 22

Preparation:Preparation:Forensics ReadinessForensics Readiness

Are you Ready?Are you Ready?

No system or network is secure enough:No system or network is secure enough:

Plan for the Worst, Hope for the Best!!!Plan for the Worst, Hope for the Best!!!

Forensics Readiness is the Forensics Readiness is the ““artart”” of of Maximizing an EnvironmentMaximizing an Environment’’s Ability to Collect Credible s Ability to Collect Credible

Digital EvidenceDigital Evidence

Page 23: Web Forensics - Open Source Foundation for Application ...Web Forensics Jess García Consultant – Jessland Enterprise Security Services ... – Lots of tools, both commercial and

Web Forensics – © Copyright 2006, Jess García – http:// www.jessland.net – 23

The EndThe End

If You Have an IncidentIf You Have an Incident

Ask for Professional Help!!Ask for Professional Help!!

Download this presentation: http://www.jessland.net/Docs.php

More information: http://www.jessland.net/KB/Forensics/

Jessland Security Services – http://www.jessland.net

sm4rt Security Services – http://www.sm4rt.com