66
Whodunit? Beginning the cyber investigation

Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

  • View
    221

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

Whodunit?Whodunit?Beginning the cyber investigationBeginning the cyber investigation

Page 2: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

AddressesAddresses

MAC addressNetwork card (NIC interface card)

Identifies a physical device.. The card!!!This is how a packet is delivered on a

local networkNetwork (IP) address

Logical addressAssociated with a MAC addressIdentifies a LOGICAL device

MAC addressNetwork card (NIC interface card)

Identifies a physical device.. The card!!!This is how a packet is delivered on a

local networkNetwork (IP) address

Logical addressAssociated with a MAC addressIdentifies a LOGICAL device

Page 3: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

MAC addressMAC address

Series of six hexadecimal digits00-3E-42-A6-51-0E

“burned in” by manufacturerIn reality, can be changed in many

cases

Series of six hexadecimal digits00-3E-42-A6-51-0E

“burned in” by manufacturerIn reality, can be changed in many

cases

Page 4: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

IP addressIP address

“Dotted decimal” or “dotted quad”32 bits (4 octets)Each octet has a value from 0 thru

255192.168.0.1

Each IP address has aPrefix

Identifies a networkSuffix

Identifies a host (device) on that network

“Dotted decimal” or “dotted quad”32 bits (4 octets)Each octet has a value from 0 thru

255192.168.0.1

Each IP address has aPrefix

Identifies a networkSuffix

Identifies a host (device) on that network

Page 5: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

IP addressesIP addresses

IP “prefixes” must be unique on a global basis

The suffixes must be unique on the local level

IP “prefixes” must be unique on a global basis

The suffixes must be unique on the local level

Page 6: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

IP deliveryIP delivery

IP address is used to deliver a message Comparison using subnet mask

determines if: Local network

A lookup is performed for the MAC address matching the destination IP

Remote network Packet is sent to the ‘gateway’ / router

Router decides the next hop to send packet to the destination network (determined by prefix)

Arrival at remote network A lookup is performed for the MAC address matching

the destination IP

IP address is used to deliver a message Comparison using subnet mask

determines if: Local network

A lookup is performed for the MAC address matching the destination IP

Remote network Packet is sent to the ‘gateway’ / router

Router decides the next hop to send packet to the destination network (determined by prefix)

Arrival at remote network A lookup is performed for the MAC address matching

the destination IP

Page 7: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

IP addressesIP addresses

Prefix part identifies a class A,B,C range A uses the last 3 octets to identify a host B uses the last 2 octets C uses the last octet

If the octet identifying the host is “0” Means the entire network

192.168.1.0 (means the entire 192.168.1 network)

If the suffix octet is 255 (all binary 1’s) Broadcast address for that network

192.168.1.255 sending to all on the 192.168.1 net

Prefix part identifies a class A,B,C range A uses the last 3 octets to identify a host B uses the last 2 octets C uses the last octet

If the octet identifying the host is “0” Means the entire network

192.168.1.0 (means the entire 192.168.1 network)

If the suffix octet is 255 (all binary 1’s) Broadcast address for that network

192.168.1.255 sending to all on the 192.168.1 net

Page 8: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

CIDRCIDRClassless Inter-Domain RoutingClassless Inter-Domain Routing

Page 9: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

RationaleRationale

Class “C” addresses need entries in network routing tables

Too many unique entriesAffects the performance of the router

Develop a different “network identifier”Allocate number of bits to identify the

networkC class uses 24 bits for the network and

remaining 8 bits for the host on the network

Class “C” addresses need entries in network routing tables

Too many unique entriesAffects the performance of the router

Develop a different “network identifier”Allocate number of bits to identify the

networkC class uses 24 bits for the network and

remaining 8 bits for the host on the network

Page 10: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

RoutingRouting

Network mask needs to determine the network identifier in the IP address

Routing can be done using contiguous blocks of class C addresses represented by a single entry in the routing table

Improves scalability of routing system

Network mask needs to determine the network identifier in the IP address

Routing can be done using contiguous blocks of class C addresses represented by a single entry in the routing table

Improves scalability of routing system

Page 11: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

SupernetSupernet

Arbitrary sized network Create a network from a contiguous block of “C”

addresses Criteria

Consecutive address ranges 192.168.6.0 192.168.7.0

Third octet of the first address range must be divisible by 2

192.168.6.0 New network can have up to 512 unique hosts New netmask is 255.255.254.0

9 bits available for the host address

Arbitrary sized network Create a network from a contiguous block of “C”

addresses Criteria

Consecutive address ranges 192.168.6.0 192.168.7.0

Third octet of the first address range must be divisible by 2

192.168.6.0 New network can have up to 512 unique hosts New netmask is 255.255.254.0

9 bits available for the host address

Page 12: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

SupernetSupernet

Combination of more than two class C networks Done in powers of 2 Third octet must be divisible by the number

of networks you’re combining 192.168.16.0 192.168.17.0 …… 192.168.24.0

8 networks combined Netmask 255.255.248.0

21 bits used for the host 192.168.19.45/21

IP address, first 21 bits identify the network

Combination of more than two class C networks Done in powers of 2 Third octet must be divisible by the number

of networks you’re combining 192.168.16.0 192.168.17.0 …… 192.168.24.0

8 networks combined Netmask 255.255.248.0

21 bits used for the host 192.168.19.45/21

IP address, first 21 bits identify the network

Page 13: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

PortsPorts

TCP and UDP Ports identify ‘processes’ running Numbered 1 to 65535

“well known ports” Associated with services

80 HTTP 20,21 FTP 443 HTTPS 110 POP3 23 TELNET 25 SMTP

TCP and UDP Ports identify ‘processes’ running Numbered 1 to 65535

“well known ports” Associated with services

80 HTTP 20,21 FTP 443 HTTPS 110 POP3 23 TELNET 25 SMTP

Page 14: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

`

192.168.0.5

`

192.168.0.20

Switch

`

192.168.0.45

Private NetworkPrivate Network

Page 15: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

Cable ModemCable Modem

`

167.209.88.53

Cable Modem

COAX Cable

SWITCH

SERVER

`

167.209.88.53

Cable Modem

COAX Cable

SWITCH

SERVER

Page 16: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

Private Network thru Cable Modem

Private Network thru Cable Modem

`

192.168.0.5

`

192.168.0.20

`

192.168.0.45

Router192.168.0.1 / 167.209.88.53

Cable Modem

COAX Cable

`

192.168.0.5

`

192.168.0.20

`

192.168.0.45

Router192.168.0.1 / 167.209.88.53

Cable Modem

COAX Cable

Page 17: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

ToolsTools

Connection propertiesarpping ipconfigpathpingnslookupEnable/Disable/Repair

Connection propertiesarpping ipconfigpathpingnslookupEnable/Disable/Repair

Page 18: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

TCP/IP propertiesTCP/IP properties

Control PanelNetwork connections

Locate the connection (typically Local Area Network)

Right click

Find the ‘properties’ tabClient for Microsoft networksFile/printer sharingInternet Protocol (TCP/IP)

Control PanelNetwork connections

Locate the connection (typically Local Area Network)

Right click

Find the ‘properties’ tabClient for Microsoft networksFile/printer sharingInternet Protocol (TCP/IP)

Page 19: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

Properties of TCP/IPProperties of TCP/IP

DHCPLook for my IP address using a DCHP

server which assigns it to meShould also retrieve the settings for

Gateway (way out of network)DNS (lookup service for URL to IP)Network (subnet) mask

AlternativeSpecify the IP yourself

Make sure it’s not already assignedSpecify your own netmask, DNS, gateway

DHCPLook for my IP address using a DCHP

server which assigns it to meShould also retrieve the settings for

Gateway (way out of network)DNS (lookup service for URL to IP)Network (subnet) mask

AlternativeSpecify the IP yourself

Make sure it’s not already assignedSpecify your own netmask, DNS, gateway

Page 20: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

Properties of TCP/IPProperties of TCP/IP

Need to talk between local devices No need for gateway in general Unless you’re looking up URLs, no need for

DNS Network mask should be consistent with IP

address pattern on that network segment ‘mismatch’ will cause the packet to be sent to

the router (gateway) Thinks the address is not local

‘mismatch’ may believe that a foreign address is on your local network

Will not be routed

Need to talk between local devices No need for gateway in general Unless you’re looking up URLs, no need for

DNS Network mask should be consistent with IP

address pattern on that network segment ‘mismatch’ will cause the packet to be sent to

the router (gateway) Thinks the address is not local

‘mismatch’ may believe that a foreign address is on your local network

Will not be routed

Page 21: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

ToolboxToolboxApplying your knowledgeApplying your knowledge

Page 22: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

ToolsTools

ipconfig / ifconfig ping pathping tracert / traceroute arp netstat nslookup dig whois host

ipconfig / ifconfig ping pathping tracert / traceroute arp netstat nslookup dig whois host

Page 23: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

So many tools…So many tools…

So little time…Live incident or autopsy

Volatile information firstDisturbing the system

Durable / non-volatile information

So little time…Live incident or autopsy

Volatile information firstDisturbing the system

Durable / non-volatile information

Page 24: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

Windows Volatile InformationWindows Volatile InformationGoing, Going……Going, Going……

Page 25: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

VolatileVolatile

Information residing in memoryTemporary nature

Gone on shutdownTime sensitive

Gone before shutdown

What do you go for first???Minimize the footprint you leave

as you collect the data

Information residing in memoryTemporary nature

Gone on shutdownTime sensitive

Gone before shutdown

What do you go for first???Minimize the footprint you leave

as you collect the data

Page 26: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

Order of VolatilityOrder of Volatility

Registers and cache Routing table, arp tables, process table,

kernel statistics, connections Temp file systems Hard disk / non-volatile storage systems Remote / offsite logging and monitoring

data Physical configuration and network

topology Archival media

Registers and cache Routing table, arp tables, process table,

kernel statistics, connections Temp file systems Hard disk / non-volatile storage systems Remote / offsite logging and monitoring

data Physical configuration and network

topology Archival media

Page 27: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

Types of Volatile Information

Types of Volatile Information

System timeUsers on systemProcesses runningConnectionsStatus of the networkClipboardCommand historyServices and drivers

System timeUsers on systemProcesses runningConnectionsStatus of the networkClipboardCommand historyServices and drivers

Page 28: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

Common ErrorsCommon Errors

No documentation on the baseline system

Failing to document your collection process

Shutdown or reboot of machineClosing down terminal or shell should

also not be doneReliance on the suspect machine

No documentation on the baseline system

Failing to document your collection process

Shutdown or reboot of machineClosing down terminal or shell should

also not be doneReliance on the suspect machine

Page 29: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

MethodologyMethodology

PreparationDocument the IncidentPolicy VerificationVolatile Data Collection StrategyVolatile Collection SetupVolatile Collection Process

PreparationDocument the IncidentPolicy VerificationVolatile Data Collection StrategyVolatile Collection SetupVolatile Collection Process

Page 30: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

PreparationPreparation

ToolkitGuidelinesPolicies

ToolkitGuidelinesPolicies

Page 31: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

DocumentationDocumentation

Profile How detected Scenario Time of occurrence Who/what reported Hardware and software involved Contacts for involved personnel How critical is suspicious system

Collection Logbook Who is collecting History of tools used and executed commands Generated output and reports Timestamp of executed commands Expected system changes as you execute commands

Forensics toolkit logbook Usage, output and affects

Profile How detected Scenario Time of occurrence Who/what reported Hardware and software involved Contacts for involved personnel How critical is suspicious system

Collection Logbook Who is collecting History of tools used and executed commands Generated output and reports Timestamp of executed commands Expected system changes as you execute commands

Forensics toolkit logbook Usage, output and affects

Page 32: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

Policy VerificationPolicy Verification

Examine policies for violations of rights by your actionsUser signed policies

ConsentEstablish your legal boundaries

Examine policies for violations of rights by your actionsUser signed policies

ConsentEstablish your legal boundaries

Page 33: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

Volatile Data Collection Strategy

Volatile Data Collection Strategy

Types of data to collectTools to do the jobWhere is output saved?Administrative vs. user accessMedia access (USB, floppy, CD)Machine connected to network

Types of data to collectTools to do the jobWhere is output saved?Administrative vs. user accessMedia access (USB, floppy, CD)Machine connected to network

Page 34: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

Volatile Collection SetupVolatile Collection Setup

Trusted command shellEstablish transmission and storage

methodEnsure integrity of forensic toolkit

outputMD5 hash

Trusted command shellEstablish transmission and storage

methodEnsure integrity of forensic toolkit

outputMD5 hash

Page 35: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

Volatile Collection ProcessVolatile Collection Process

Collect uptime, time, date, command historyGenerate time/date to establish audit

trailBegin command history to

document your collectionCollect all volatile information

system and network informationEnd collection with date/time and

command history

Collect uptime, time, date, command historyGenerate time/date to establish audit

trailBegin command history to

document your collectionCollect all volatile information

system and network informationEnd collection with date/time and

command history

Page 36: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

System TimeSystem Time

Page 37: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

Systeminfo.exeSysteminfo.exe

XP and 2003XP and 2003

Page 38: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

UptimeUptime

Uptime from www.dwam.net/docs/aintx

Psinfo from Sysinternals

Uptime from www.dwam.net/docs/aintx

Psinfo from Sysinternals

Page 39: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

UsersUsers

Psloggedon (Sysinternals)Netusers.exe (somarsoft)

Two switches/l local logged on/h history

Net sessionUsers

Name / IP of clientClient type

Psloggedon (Sysinternals)Netusers.exe (somarsoft)

Two switches/l local logged on/h history

Net sessionUsers

Name / IP of clientClient type

Page 40: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

ProcessesProcesses

IdentifyExecutableCommand line usedHow long was it running?Security contextModules or dll it’s accessingMemory used

IdentifyExecutableCommand line usedHow long was it running?Security contextModules or dll it’s accessingMemory used

Page 41: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

PslistPslist

SysinternalsSysinternals

Page 42: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

Task ManagerTask Manager

Page 43: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

Pslist -tPslist -t

Page 44: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

ListDLLsListDLLs

SysinternalsSysinternals

Page 45: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

handlehandle

SysinternalsSysinternals

Page 46: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

TasklistTasklist

Page 47: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

PSPS

AintxAintx

Page 48: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

CmdlineCmdline

DiamondCSwww.diamondcs.com.au

DiamondCSwww.diamondcs.com.au

Page 49: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

Process MemoryProcess Memory

Current state of processesPasswordsServer addressesRemote connections

Current state of processesPasswordsServer addressesRemote connections

Page 50: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

pmdumppmdump

www.NTSecurity.nuwww.NTSecurity.nu

Page 51: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

pmdumppmdump

OptionList

Lists the PID’s

Then… dump the PIDpmdump ### <filename>Use another tool then to view the

contents(“strings” from sysinternals)

OptionList

Lists the PID’s

Then… dump the PIDpmdump ### <filename>Use another tool then to view the

contents(“strings” from sysinternals)

Page 52: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

Network InfoNetwork Info

Ipconfig Ipconfig

Page 53: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

PromiscdetectPromiscdetect

www.netsecurity.nuWorks on the local host

Not remote

www.netsecurity.nuWorks on the local host

Not remote

Page 54: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

NetstatNetstat

Lists connectionsLists connections

Page 55: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

NbtstatNbtstat

Net Bios connectionsNet Bios connections

Page 56: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

FportFport

FoundstoneMaps ports to processes using them

FoundstoneMaps ports to processes using them

Requires Administrator!

Page 57: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

OpenPortsOpenPorts

Ports mapped to processwww.DiamondCS.com.auAdministrator access not required

Ports mapped to processwww.DiamondCS.com.auAdministrator access not required

Page 58: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

With netstat optionWith netstat option

Page 59: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

With fport optionWith fport option

Page 60: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

OpenFilesOpenFiles

Page 61: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

Protected storageProtected storage

Used for storing informationPrivate keys

For using SSL and S/MIME

Used for storing informationPrivate keys

For using SSL and S/MIME

Page 62: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

Following the LeadsFollowing the Leads

Page 63: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is
Page 64: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is

Ohio State UniversityOhio State University

Page 65: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is
Page 66: Whodunit? Beginning the cyber investigation. Addresses MAC address Network card (NIC interface card) Identifies a physical device.. The card!!! This is