SlideShare a Scribd company logo
Grabbing Forensic Images out
     of EC2/Rackspace
              JP Bourget
          Syncurity Networks
        B-Sides Las Vegas 2012
              @punkrokk
             July 26, 2012
What I ran into while grabbing
        forensic images
– What if you lose access to your amazon
  account?
– What if it’s determined that you need to pull
  images from EC2 in order to to forensic
  analysis on them?
– Amazon makes it easy to get data in – but
  tough to get data out
– Rackspace doesn’t make it much easier…
Regaining Admin account access
            (Amazon)
• I called up Amazon and Rackspace –
  Neither has a public procedure – the most
  they will really say is “they will work with
  you”
  – Can I social engineer access to someone’s
    cloud account?
  – Best practice is to use role based access (Use
    Amazon Identity + Access mgmt) (and two
    factor with Google authenticator)
Regaining Access (Rackspace)
• If you have monitoring, racker (rackspace team), and
  your account creds changed – you better hope you
  can reset your admin creds. (drive images can be
  decrypted)
• If they haven’t changed the monitoring account –
  Rackspace will login to that and reset admin
  passwords
• You need to authenticate to your customer cloud/billing
  account and they will reset your server side account
• Best practice is to have a dedicated account which
  provides granular role based access (public cloud side
  – does not have robust delegation at this time) (you
  can schedule account terminations)
Rack space Forensic Images
• You can: Pause the VM
• Sign off from Legal and Cloud Ops Team
• Need to prove ownership of the account
• Send in my own storage
• It’s up to you to have a strategy to get your data
  out (dd, ghost, other 3rd party cloning tool)
• They will boot up a tool if it’s private storage.
• This can be a nightmare (technically and
  logistically)
      • Thanks Nicole Schwartz from RackSpace (@amazonv)
Geographical Zones
• Zones
  – If you have data in multiple zones for
    redundancy it’s a pain to pull things out
  – AWS Import/Export helps – but you need to
    send disks to every zone
  – Rackspace – you have to send in storage
    and scripts in each store zone (will not
    transfer between countries)
Amazon Forensics
• If you have small images ( > 5 GB ) you
  can dd them to another drive then
  download them (http, sftp, etc) (amazon
  linux image has all the tools you need)
• If you have large images - > 5GB and you
  need to use Amazon Import/Export you
  have a different battle to fight 
How to grab and move Large (>
  5GB) forensic image out of EC2
• Mount a linux VM to a snapshot of the
  system (call this /dev/sdg)
• Give the linux VM a slightly larger drive (
  /dev/sdh) – Format ext3/4 (mount it (-loop
  –ro) (/tmp/image-sdg)
• dd if=/dev/sdh | split –d –b 2G /tmp/snap-
  xxxxxx.dd.split.
• Split –d name .01 .02, etc…
Amazon import/Export Services
• You can now send in drives to Amazon
  and have them copy your S3 bucket to
  media they will mail you back
  – You have to combine your split files back
  – You then can mount them in…

• Will amazon help you with this?
  – I dunno – haven’t found any credible answers
    to this…
Move to S3
• Copy to S3 Bucket:
  – Use aws by Tim Kay (timkay.com/aws)

  aws putmybucket/snap-xxxx.dd.01 snap-
  xxxx.dd.01

  This will upload files of max 5GB to S3
Thing you may want to ask before
           going Cloud
• Will they vendor help you grab forensically
  sound images? Is there an SLA?
• Will they support chain of custody?
• What legal stuff will you have to sign before
  they will export data for you? Will they export
  over country lines? (UK to USA?)
• Do the existing tools out there allow you to
  automate a large amount of machines?
• If you are the Feds – getting data out is most
  likely wayyyy easier!
Thanks for listening!
•   Questions?
•   Twitter: @punkrokk
•   jp@syncurity.net
•   Come to @BSidesRoc next year! (May,
    2013)

More Related Content

PPTX
Data backup and Disaster recovery with AWS
Evgeny Rudinsky
 
PPTX
OWASP Atlanta 2018: Forensics as a Service
Toni de la Fuente
 
PPTX
SANS Cloud Security Summit 2018: Forensics as a Service
Toni de la Fuente
 
PDF
Taking a Selfie - Just Try to Resist! Doing Forensics the DevSecOps Way
Sonatype
 
PDF
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Toni de la Fuente
 
PPTX
Automate or die! Rootedcon 2017
Toni de la Fuente
 
PPTX
Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...
RootedCON
 
PDF
AWS Incident Response Cheat Sheet.pdf
Christopher Doman
 
Data backup and Disaster recovery with AWS
Evgeny Rudinsky
 
OWASP Atlanta 2018: Forensics as a Service
Toni de la Fuente
 
SANS Cloud Security Summit 2018: Forensics as a Service
Toni de la Fuente
 
Taking a Selfie - Just Try to Resist! Doing Forensics the DevSecOps Way
Sonatype
 
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Toni de la Fuente
 
Automate or die! Rootedcon 2017
Toni de la Fuente
 
Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...
RootedCON
 
AWS Incident Response Cheat Sheet.pdf
Christopher Doman
 

Similar to Grabbing Forensic Images from EC2/Rackspace (20)

PPTX
Hack proof your aws cloud cloudcheckr_040416
Jarrett Plante
 
PDF
A New Perspective on Resource-Level Cloud Forensics
Christopher Doman
 
PDF
Cloud forensics putting the bits back together
Shakacon
 
PDF
Cloud_providers_comparison.pdf
Harshith212902
 
PDF
Cloud Breach - Forensics Audit Planning
Valdez Ladd MBA, CISSP, CISA,
 
PPTX
[Wroclaw #7] AWS (in)security - the devil is in the detail
OWASP
 
PPTX
Owning aws infrastructure services
Suraj Khetani
 
PDF
AWS STARTUP DAY 2018 I Securing Your Customer Data From Day One
AWS Germany
 
PDF
Securing Your Customers Data From Day One
Amazon Web Services LATAM
 
PDF
AWS Notes.pdf
Tracy Hill
 
PDF
Trying to bottle the cloud forensic challenges with cloud computing
Brent Muir
 
PPTX
Locking Down Your Cloud
2nd Sight Lab
 
PPTX
Hackproof Your Cloud: Responding to 2016 Threats
CloudCheckr
 
PDF
Backup and recovery_approaches_using_aws
saifam
 
PDF
Incident response-in-the-cloud
Priyanka Aash
 
PDF
Introduction to Amazon Web Services
Dayanand Shanmugham
 
PDF
Diving into Common AWS Misconfigurations
Nikhil Sahoo
 
PPTX
In the Cloud, nobody can hear you scream: AWS Cloud Security for DevOps
Garth Boyd
 
KEY
Cloud Security at Netflix
Jason Chan
 
PPTX
AWS Meet-up San Francisco: Cloud Security
Aaron Klein
 
Hack proof your aws cloud cloudcheckr_040416
Jarrett Plante
 
A New Perspective on Resource-Level Cloud Forensics
Christopher Doman
 
Cloud forensics putting the bits back together
Shakacon
 
Cloud_providers_comparison.pdf
Harshith212902
 
Cloud Breach - Forensics Audit Planning
Valdez Ladd MBA, CISSP, CISA,
 
[Wroclaw #7] AWS (in)security - the devil is in the detail
OWASP
 
Owning aws infrastructure services
Suraj Khetani
 
AWS STARTUP DAY 2018 I Securing Your Customer Data From Day One
AWS Germany
 
Securing Your Customers Data From Day One
Amazon Web Services LATAM
 
AWS Notes.pdf
Tracy Hill
 
Trying to bottle the cloud forensic challenges with cloud computing
Brent Muir
 
Locking Down Your Cloud
2nd Sight Lab
 
Hackproof Your Cloud: Responding to 2016 Threats
CloudCheckr
 
Backup and recovery_approaches_using_aws
saifam
 
Incident response-in-the-cloud
Priyanka Aash
 
Introduction to Amazon Web Services
Dayanand Shanmugham
 
Diving into Common AWS Misconfigurations
Nikhil Sahoo
 
In the Cloud, nobody can hear you scream: AWS Cloud Security for DevOps
Garth Boyd
 
Cloud Security at Netflix
Jason Chan
 
AWS Meet-up San Francisco: Cloud Security
Aaron Klein
 
Ad

Recently uploaded (20)

PPTX
IoT Sensor Integration 2025 Powering Smart Tech and Industrial Automation.pptx
Rejig Digital
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
IoT Sensor Integration 2025 Powering Smart Tech and Industrial Automation.pptx
Rejig Digital
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
Software Development Methodologies in 2025
KodekX
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Ad

Grabbing Forensic Images from EC2/Rackspace

  • 1. Grabbing Forensic Images out of EC2/Rackspace JP Bourget Syncurity Networks B-Sides Las Vegas 2012 @punkrokk July 26, 2012
  • 2. What I ran into while grabbing forensic images – What if you lose access to your amazon account? – What if it’s determined that you need to pull images from EC2 in order to to forensic analysis on them? – Amazon makes it easy to get data in – but tough to get data out – Rackspace doesn’t make it much easier…
  • 3. Regaining Admin account access (Amazon) • I called up Amazon and Rackspace – Neither has a public procedure – the most they will really say is “they will work with you” – Can I social engineer access to someone’s cloud account? – Best practice is to use role based access (Use Amazon Identity + Access mgmt) (and two factor with Google authenticator)
  • 4. Regaining Access (Rackspace) • If you have monitoring, racker (rackspace team), and your account creds changed – you better hope you can reset your admin creds. (drive images can be decrypted) • If they haven’t changed the monitoring account – Rackspace will login to that and reset admin passwords • You need to authenticate to your customer cloud/billing account and they will reset your server side account • Best practice is to have a dedicated account which provides granular role based access (public cloud side – does not have robust delegation at this time) (you can schedule account terminations)
  • 5. Rack space Forensic Images • You can: Pause the VM • Sign off from Legal and Cloud Ops Team • Need to prove ownership of the account • Send in my own storage • It’s up to you to have a strategy to get your data out (dd, ghost, other 3rd party cloning tool) • They will boot up a tool if it’s private storage. • This can be a nightmare (technically and logistically) • Thanks Nicole Schwartz from RackSpace (@amazonv)
  • 6. Geographical Zones • Zones – If you have data in multiple zones for redundancy it’s a pain to pull things out – AWS Import/Export helps – but you need to send disks to every zone – Rackspace – you have to send in storage and scripts in each store zone (will not transfer between countries)
  • 7. Amazon Forensics • If you have small images ( > 5 GB ) you can dd them to another drive then download them (http, sftp, etc) (amazon linux image has all the tools you need) • If you have large images - > 5GB and you need to use Amazon Import/Export you have a different battle to fight 
  • 8. How to grab and move Large (> 5GB) forensic image out of EC2 • Mount a linux VM to a snapshot of the system (call this /dev/sdg) • Give the linux VM a slightly larger drive ( /dev/sdh) – Format ext3/4 (mount it (-loop –ro) (/tmp/image-sdg) • dd if=/dev/sdh | split –d –b 2G /tmp/snap- xxxxxx.dd.split. • Split –d name .01 .02, etc…
  • 9. Amazon import/Export Services • You can now send in drives to Amazon and have them copy your S3 bucket to media they will mail you back – You have to combine your split files back – You then can mount them in… • Will amazon help you with this? – I dunno – haven’t found any credible answers to this…
  • 10. Move to S3 • Copy to S3 Bucket: – Use aws by Tim Kay (timkay.com/aws) aws putmybucket/snap-xxxx.dd.01 snap- xxxx.dd.01 This will upload files of max 5GB to S3
  • 11. Thing you may want to ask before going Cloud • Will they vendor help you grab forensically sound images? Is there an SLA? • Will they support chain of custody? • What legal stuff will you have to sign before they will export data for you? Will they export over country lines? (UK to USA?) • Do the existing tools out there allow you to automate a large amount of machines? • If you are the Feds – getting data out is most likely wayyyy easier!
  • 12. Thanks for listening! • Questions? • Twitter: @punkrokk • [email protected] • Come to @BSidesRoc next year! (May, 2013)

Editor's Notes

  • #3: e.g. an admin consulting for you switches sides
  • #4: asking if I had assets in their cloud and I lost access to the AWS or Rackspace console – what is the process for getting it back? access (Use Amazon Identity + Access mgmt) (and two factor with Google authenticator)