SlideShare a Scribd company logo
Memory Forensics and
Incident Response
Robert Reed
Frequently when we think of
CyberCrime external intrusions
immediately comes to mind, but we
should remember that “insiders”
represent a significant threat to
organizations. Between 46 and 58
percent of the incidents resulting in the
largest losses to organizations were
“inside jobs.” This is particularly
troubling because in these incidents the
likely hood of identification of offenders
and potential recovery of assets should
be easier.
Intrusions
Insiders
Outsiders
Global Economic Crime Survey 2011, PriceWaterhouse Cooper.
42%
40%
39%
12%
8%
6%
5%
4%
11%
20%
0% 10% 20% 30% 40% 50%
Damage level
insufficient
Could not identify the
individual
Lack of evidence
negative publicity
Concerns about liability
competitors use for
advantage
Prior negative
response law…
Unaware crime was
reportable
Other
Don't know
Reason not Prosecuted
Damage level insufficient
Could not identify the
individual
Lack of evidence
negative publicity
Concerns about liability
competitors use for
advantage
Prior negative response
law enforcement
Unaware crime was
reportable
Other
In “insider” incidents, 40
percent of the time those
responsible are never
identified, or insufficient
evidence was obtained for
prosecution. This is
particularly troubling because
in these incidents the likely
hood of identification of
offenders and potential
recovery of assets should be
easier
2011 CyberSecuirtyWatch Survey, CSO Magazine, U.S. Secret Service, Software Engineering Institute CERT Program at Carnegie Mellon University and Deloitte,
January 2011.
Why are so many incidents not producing sufficient information
for prosecutions? To some degree this makes sense when we dig
deeper into the numbers, 61 percent businesses suffering from
CyberCrime indicated that “they don’t have, or are not aware of
having, access to forensic technology investigators.”
61
60
46
0 20 40 60 80
Not Aware of access to
forensic investigators
No in-house forensics
No forensic IR
proceedures
Business Forensic capabilities
Forensic Capabilities
Global Economic Crime Survey 2011, PriceWaterhouse Cooper
Objectives of incident response:
• Collect as much evidence as possible
• Minimize or eliminate changes made to
evidentiary information
• Maintain the integrity of the investigation
• Minimize the disruption to business processes
• Obtain a successful outcome
Striking a balance
• Do we need to do a forensic examination?
– Is there a statutory requirement to report?
– Is there potential liability for not investigating?
– Is there a broader objective in the investigation?
– Is it fiscally responsible?
Typical Incident life cycle
• Identify incident
• Establish approach
• Collect evidence
• Analyze evidence
• Document and report
• Assess and follow-up
Traditional Computer Forensic Response
• Secure location
• Document the scene
• Pull the plug
• Collect evidence
• Image the media
• Analysis
• Reporting
Pro’s of the Approach
• Acceptable for most of the cases LE is
presented with
• Easy to validate the information for court
purposes
• Easy to establish and validate SOP’s
Con’s to Traditional Approach
• Increasing drive capacities
• Increased security
awareness
– Encryption
– Passwords
– “Personal Privacy” Software
• Business Continuity
• Misses /Destroys vital
information in RAM
Better Approach
• Secure location
• Photograph and document scene
• Collect volatile data
• Isolate from network??
• Bring the machine down or live image??
• Bit stream image
• Analysis
• Reporting
Order of volatility
1. CPU cache and Register
2. ARP cache, Routing and Process tables
3. RAM
4. Temp file systems, Swap and page files
5. Fixed and removable media attached
6. Remotely logged data
7. Archives
Collection of volatile data
Tool/s
Utilities
OSHardware
Results
Concerns
• Reliability of local tools
• Root kits
• Integrity of evidence
– Authenticity
– Integrity
• Chains of custody
• Security
Collection of Volatile data
• cmd
• tasklist
• netstat
• arp
• Route
• Net commands
• etc
* The problem with using native commands is that we can not trust their results*
Collection of volatile data
Tool/s
Utilities
OSHardware
Results
Collection of volatile data
Tool/s
Utilities
OSHardware
Results
Kernel
Space
UserSpace
External tools
• cmd ?? *are you bringing your own command console?*
• Sysinternals: http://technet.microsoft.com/en-us/sysinternals/default
• Nirsoft: http://www.nirsoft.net/
• Foundstone: http://www.mcafee.com/us/downloads/free-tools/index.aspx
• WFT: http://www.foolmoon.net/security/wft/
• Tons of others out there
Collection of volatile data
Tool/s
Utilities
OSHardware
Results
Kernel
Space
UserSpace
API
Collection of volatile data
Tool/s
Utilities
OSHardware
Results
Kernel
Space
UserSpace
RAM / Image Analysis
tool
OS
utilities
OSHardware
Results ?
Kernel
Space
UserSpace
Tool
Imaging and Analysis Tools
• Win32/64 dd
• Dumpit
• Man dd
• FTK Imager
• Belkasoft
• Volatility
• Memoryze
• Redline
• HBGary
Responder
• Encase
• Etc….
Imaging and Analysis Tools
• Challenges
– Varied Implementations
– Anti-Forensics programs and
techniques
Direct Memory Access
tool
OS
utilities
OSHardware
Results ?
Kernel
Space
UserSpace
Tool
http://www.breaknenter.org/projects/inception/
“Inception is a FireWire
physical memory
manipulation and hacking
tool exploiting IEEE 1394
SBP-2 DMA. The tool can
unlock (any password
accepted) and escalate
privileges to
Administrator/root on
almost* any powered on
machine you have physical
access to. The tool can
attack over FireWire,
Thunderbolt, ExpressCard,
PC Card and any other
PCI/PCIe interfaces.”
“Goldfish was a project by Afrah
Almansoori, Pavel Gladyshev, and Joshua
James aimed at the extraction of user
password and fragments of AIM instant
messenger conversations directly from
RAM of Apple Mac computers. Goldfish
software can be used against 32 bit
versions of Mac OS X up to and including
Mac OS X (10.5) Leopard.”
http://digitalfire.ucd.ie/?page_id=430
Direct Memory Access
• Advantages
– Bypass passwords to gain access
– Recover passwords (keyboard buffers)
– Evade current anti-forensics techniques
Direct Memory Access
• Challenges
– Hardware dependent!
– Physical access!
– Disabled drivers?
– 4GB of accessible space! 0>ffffffff
Direct Memory Access
• Mitigation
– Windows
• Block SBP-2 drivers: http://support.microsoft.com/kb/2516445
• Remove FireWire and thunderbolt drivers
Direct Memory Access
• Mitigation
– Macs
• Filevault2 (OS X Lion) and screen locked
• Firmware password
Direct Memory Access
• Mitigation
– Linux
• Disable DMA
• Remove FireWire drivers
Questions ??

More Related Content

PPSX
Hard drive partitions
Gabriela_Technoteacher
 
PPT
Linux forensics
Santosh Khadsare
 
PDF
CNIT 121: 8 Forensic Duplication
Sam Bowne
 
PDF
Osint
Kamal Rathaur
 
PPTX
Dark web by Pranesh Kulkarni
PraneshKulkarni22
 
PPT
Registry Forensics
Somesh Sawhney
 
PDF
OSINT with Practical: Real Life Examples
SyedAmoz
 
Hard drive partitions
Gabriela_Technoteacher
 
Linux forensics
Santosh Khadsare
 
CNIT 121: 8 Forensic Duplication
Sam Bowne
 
Dark web by Pranesh Kulkarni
PraneshKulkarni22
 
Registry Forensics
Somesh Sawhney
 
OSINT with Practical: Real Life Examples
SyedAmoz
 

What's hot (20)

PPTX
Backup & restore in windows
Jab Vtl
 
PPTX
Darkweb
Sateesh Gollapudi
 
PDF
Disk forensics
Chiawei Wang
 
PDF
NTFS file system
Ravi Yasas
 
PPTX
Digital forensic tools
Parsons Corporation
 
PPT
Linux
dwarfyray
 
PPTX
Linux basic commands
Sagar Kumar
 
PDF
OSS Presentation Arista
OpenStorageSummit
 
PPTX
Finalppt metasploit
devilback
 
PPTX
Introduction to Linux
Harish R
 
PPTX
Linux and DNS Server
Prabhakar Thota
 
PPTX
Basic malware analysis
securityxploded
 
PDF
NTFS Forensics
nullowaspmumbai
 
PDF
Redis and its many use cases
Christian Joudrey
 
PPTX
Network forensics and investigating logs
anilinvns
 
PPT
Internet Traffic Monitoring and Analysis
Information Technology
 
PPT
Computer forensics
Shreya Singireddy
 
PPTX
Log Files
Heinrich Hartmann
 
PPTX
Samba power point presentation
Md Maksudur Rahman
 
Backup & restore in windows
Jab Vtl
 
Disk forensics
Chiawei Wang
 
NTFS file system
Ravi Yasas
 
Digital forensic tools
Parsons Corporation
 
Linux
dwarfyray
 
Linux basic commands
Sagar Kumar
 
OSS Presentation Arista
OpenStorageSummit
 
Finalppt metasploit
devilback
 
Introduction to Linux
Harish R
 
Linux and DNS Server
Prabhakar Thota
 
Basic malware analysis
securityxploded
 
NTFS Forensics
nullowaspmumbai
 
Redis and its many use cases
Christian Joudrey
 
Network forensics and investigating logs
anilinvns
 
Internet Traffic Monitoring and Analysis
Information Technology
 
Computer forensics
Shreya Singireddy
 
Samba power point presentation
Md Maksudur Rahman
 
Ad

Viewers also liked (13)

PDF
Linux Memory Analysis with Volatility
Andrew Case
 
PDF
katagaitaictf7_hw_ysk
ysk256
 
PDF
Investigating Hackers' Tools
Israel Umana
 
PDF
Stop pulling the plug
Kamal Rathaur
 
PPTX
Memory forensics
Sunil Kumar
 
PDF
(120513) #fitalk an introduction to linux memory forensics
INSIGHT FORENSIC
 
PDF
Dfrws eu 2014 rekall workshop
Tamas K Lengyel
 
PPTX
REMnux tutorial-2: Extraction and decoding of Artifacts
Rhydham Joshi
 
PDF
katagaitai CTF 勉強会 #5 -関東 |med おまけ問題 Parlor (Plaid CTF 2014) @m1z0r3勉強会
sonickun
 
PPTX
Applying Memory Forensics to Rootkit Detection
Igor Korkin
 
PDF
katagaitai CTF勉強会 #5 Crypto
trmr
 
PDF
Proactive incident response
Brian Honan
 
PDF
2010 2013 sandro suffert memory forensics introdutory work shop - public
Sandro Suffert
 
Linux Memory Analysis with Volatility
Andrew Case
 
katagaitaictf7_hw_ysk
ysk256
 
Investigating Hackers' Tools
Israel Umana
 
Stop pulling the plug
Kamal Rathaur
 
Memory forensics
Sunil Kumar
 
(120513) #fitalk an introduction to linux memory forensics
INSIGHT FORENSIC
 
Dfrws eu 2014 rekall workshop
Tamas K Lengyel
 
REMnux tutorial-2: Extraction and decoding of Artifacts
Rhydham Joshi
 
katagaitai CTF 勉強会 #5 -関東 |med おまけ問題 Parlor (Plaid CTF 2014) @m1z0r3勉強会
sonickun
 
Applying Memory Forensics to Rootkit Detection
Igor Korkin
 
katagaitai CTF勉強会 #5 Crypto
trmr
 
Proactive incident response
Brian Honan
 
2010 2013 sandro suffert memory forensics introdutory work shop - public
Sandro Suffert
 
Ad

Similar to Memory forensics and incident response (20)

PPTX
Računalna forenzika i automatizirani odgovor na mrežne incidente
Damir Delija
 
PPTX
Msra 2011 windows7 forensics-troyla
CTIN
 
PDF
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
Sam Bowne
 
PDF
eForensics_17_2013_KMOKER
Kevin M. Moker, CFE, CISSP, ISSMP, CISM
 
PPTX
Memory forensics.pptx
9905234521
 
PDF
Práctica de informática forense taller práctico
LJPT2
 
PPTX
encase enterprise
Damir Delija
 
PDF
6 Scope & 7 Live Data Collection
Sam Bowne
 
PPT
cyber forensics - TYPES OF CYBER FORENSICS.ppt
mcjaya2024
 
PPTX
Combating cyber security through forensic investigation tools
Venkata Sreeram
 
PPT
Role of a Forensic Investigator
Agape Inc
 
PPTX
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Damir Delija
 
PDF
CNIT 152: 6. Scope & 7. Live Data Collection
Sam Bowne
 
PDF
CNIT 152: 6 Scoping & 7 Live Data Collection
Sam Bowne
 
PPTX
Business Intelligence (BI) Tools For Computer Forensic
Dhiren Gala
 
PPT
CF.ppt
KhusThakkar
 
PDF
11 Analysis Methodology
Sam Bowne
 
PDF
Enabling effective hunt teaming and incident response
jeffmcjunkin
 
PPTX
cyber Forensics
Muzzammil Wani
 
DOCX
Cyber&digital forensics report
yash sawarkar
 
Računalna forenzika i automatizirani odgovor na mrežne incidente
Damir Delija
 
Msra 2011 windows7 forensics-troyla
CTIN
 
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
Sam Bowne
 
eForensics_17_2013_KMOKER
Kevin M. Moker, CFE, CISSP, ISSMP, CISM
 
Memory forensics.pptx
9905234521
 
Práctica de informática forense taller práctico
LJPT2
 
encase enterprise
Damir Delija
 
6 Scope & 7 Live Data Collection
Sam Bowne
 
cyber forensics - TYPES OF CYBER FORENSICS.ppt
mcjaya2024
 
Combating cyber security through forensic investigation tools
Venkata Sreeram
 
Role of a Forensic Investigator
Agape Inc
 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Damir Delija
 
CNIT 152: 6. Scope & 7. Live Data Collection
Sam Bowne
 
CNIT 152: 6 Scoping & 7 Live Data Collection
Sam Bowne
 
Business Intelligence (BI) Tools For Computer Forensic
Dhiren Gala
 
CF.ppt
KhusThakkar
 
11 Analysis Methodology
Sam Bowne
 
Enabling effective hunt teaming and incident response
jeffmcjunkin
 
cyber Forensics
Muzzammil Wani
 
Cyber&digital forensics report
yash sawarkar
 

More from London School of Cyber Security (20)

PDF
The Panama Papers Hack
London School of Cyber Security
 
PDF
ISIS and Cyber Terrorism
London School of Cyber Security
 
PDF
Silk Road & Online Narcotic Distribution
London School of Cyber Security
 
PDF
Ashely Madison Hack
London School of Cyber Security
 
PDF
How To Protect Your Website From Bot Attacks
London School of Cyber Security
 
PDF
How To Defeat Advanced Malware. New Tools for Protection and Forensics
London School of Cyber Security
 
PDF
How To Catch a Phish: User Awareness and Training
London School of Cyber Security
 
PDF
Advanced Threat Detection in ICS – SCADA Environments
London School of Cyber Security
 
PPTX
What Everybody Ought to Know About PCI DSS and PA-DSS
London School of Cyber Security
 
PDF
Building an Effective Cyber Intelligence Program
London School of Cyber Security
 
PDF
Crowdsourced Vulnerability Testing
London School of Cyber Security
 
PDF
Gauntlt Rugged By Example
London School of Cyber Security
 
PPTX
Application Hackers Have A Handbook. Why Shouldn't You?
London School of Cyber Security
 
PDF
Website Impersonation Attacks. Who is REALLY Behind That Mask?
London School of Cyber Security
 
PDF
Legal Issues in Mobile Security Research
London School of Cyber Security
 
PDF
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
London School of Cyber Security
 
PPT
Bulletproof IT Security
London School of Cyber Security
 
The Panama Papers Hack
London School of Cyber Security
 
ISIS and Cyber Terrorism
London School of Cyber Security
 
Silk Road & Online Narcotic Distribution
London School of Cyber Security
 
Ashely Madison Hack
London School of Cyber Security
 
How To Protect Your Website From Bot Attacks
London School of Cyber Security
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
London School of Cyber Security
 
How To Catch a Phish: User Awareness and Training
London School of Cyber Security
 
Advanced Threat Detection in ICS – SCADA Environments
London School of Cyber Security
 
What Everybody Ought to Know About PCI DSS and PA-DSS
London School of Cyber Security
 
Building an Effective Cyber Intelligence Program
London School of Cyber Security
 
Crowdsourced Vulnerability Testing
London School of Cyber Security
 
Gauntlt Rugged By Example
London School of Cyber Security
 
Application Hackers Have A Handbook. Why Shouldn't You?
London School of Cyber Security
 
Website Impersonation Attacks. Who is REALLY Behind That Mask?
London School of Cyber Security
 
Legal Issues in Mobile Security Research
London School of Cyber Security
 
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
London School of Cyber Security
 
Bulletproof IT Security
London School of Cyber Security
 

Recently uploaded (20)

PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Simple and concise overview about Quantum computing..pptx
mughal641
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 

Memory forensics and incident response

  • 1. Memory Forensics and Incident Response Robert Reed
  • 2. Frequently when we think of CyberCrime external intrusions immediately comes to mind, but we should remember that “insiders” represent a significant threat to organizations. Between 46 and 58 percent of the incidents resulting in the largest losses to organizations were “inside jobs.” This is particularly troubling because in these incidents the likely hood of identification of offenders and potential recovery of assets should be easier. Intrusions Insiders Outsiders Global Economic Crime Survey 2011, PriceWaterhouse Cooper.
  • 3. 42% 40% 39% 12% 8% 6% 5% 4% 11% 20% 0% 10% 20% 30% 40% 50% Damage level insufficient Could not identify the individual Lack of evidence negative publicity Concerns about liability competitors use for advantage Prior negative response law… Unaware crime was reportable Other Don't know Reason not Prosecuted Damage level insufficient Could not identify the individual Lack of evidence negative publicity Concerns about liability competitors use for advantage Prior negative response law enforcement Unaware crime was reportable Other In “insider” incidents, 40 percent of the time those responsible are never identified, or insufficient evidence was obtained for prosecution. This is particularly troubling because in these incidents the likely hood of identification of offenders and potential recovery of assets should be easier 2011 CyberSecuirtyWatch Survey, CSO Magazine, U.S. Secret Service, Software Engineering Institute CERT Program at Carnegie Mellon University and Deloitte, January 2011.
  • 4. Why are so many incidents not producing sufficient information for prosecutions? To some degree this makes sense when we dig deeper into the numbers, 61 percent businesses suffering from CyberCrime indicated that “they don’t have, or are not aware of having, access to forensic technology investigators.” 61 60 46 0 20 40 60 80 Not Aware of access to forensic investigators No in-house forensics No forensic IR proceedures Business Forensic capabilities Forensic Capabilities Global Economic Crime Survey 2011, PriceWaterhouse Cooper
  • 5. Objectives of incident response: • Collect as much evidence as possible • Minimize or eliminate changes made to evidentiary information • Maintain the integrity of the investigation • Minimize the disruption to business processes • Obtain a successful outcome
  • 6. Striking a balance • Do we need to do a forensic examination? – Is there a statutory requirement to report? – Is there potential liability for not investigating? – Is there a broader objective in the investigation? – Is it fiscally responsible?
  • 7. Typical Incident life cycle • Identify incident • Establish approach • Collect evidence • Analyze evidence • Document and report • Assess and follow-up
  • 8. Traditional Computer Forensic Response • Secure location • Document the scene • Pull the plug • Collect evidence • Image the media • Analysis • Reporting
  • 9. Pro’s of the Approach • Acceptable for most of the cases LE is presented with • Easy to validate the information for court purposes • Easy to establish and validate SOP’s
  • 10. Con’s to Traditional Approach • Increasing drive capacities • Increased security awareness – Encryption – Passwords – “Personal Privacy” Software • Business Continuity • Misses /Destroys vital information in RAM
  • 11. Better Approach • Secure location • Photograph and document scene • Collect volatile data • Isolate from network?? • Bring the machine down or live image?? • Bit stream image • Analysis • Reporting
  • 12. Order of volatility 1. CPU cache and Register 2. ARP cache, Routing and Process tables 3. RAM 4. Temp file systems, Swap and page files 5. Fixed and removable media attached 6. Remotely logged data 7. Archives
  • 13. Collection of volatile data Tool/s Utilities OSHardware Results
  • 14. Concerns • Reliability of local tools • Root kits • Integrity of evidence – Authenticity – Integrity • Chains of custody • Security
  • 15. Collection of Volatile data • cmd • tasklist • netstat • arp • Route • Net commands • etc * The problem with using native commands is that we can not trust their results*
  • 16. Collection of volatile data Tool/s Utilities OSHardware Results
  • 17. Collection of volatile data Tool/s Utilities OSHardware Results Kernel Space UserSpace
  • 18. External tools • cmd ?? *are you bringing your own command console?* • Sysinternals: http://technet.microsoft.com/en-us/sysinternals/default • Nirsoft: http://www.nirsoft.net/ • Foundstone: http://www.mcafee.com/us/downloads/free-tools/index.aspx • WFT: http://www.foolmoon.net/security/wft/ • Tons of others out there
  • 19. Collection of volatile data Tool/s Utilities OSHardware Results Kernel Space UserSpace API
  • 20. Collection of volatile data Tool/s Utilities OSHardware Results Kernel Space UserSpace
  • 21. RAM / Image Analysis tool OS utilities OSHardware Results ? Kernel Space UserSpace Tool
  • 22. Imaging and Analysis Tools • Win32/64 dd • Dumpit • Man dd • FTK Imager • Belkasoft • Volatility • Memoryze • Redline • HBGary Responder • Encase • Etc….
  • 23. Imaging and Analysis Tools • Challenges – Varied Implementations – Anti-Forensics programs and techniques
  • 25. http://www.breaknenter.org/projects/inception/ “Inception is a FireWire physical memory manipulation and hacking tool exploiting IEEE 1394 SBP-2 DMA. The tool can unlock (any password accepted) and escalate privileges to Administrator/root on almost* any powered on machine you have physical access to. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe interfaces.”
  • 26. “Goldfish was a project by Afrah Almansoori, Pavel Gladyshev, and Joshua James aimed at the extraction of user password and fragments of AIM instant messenger conversations directly from RAM of Apple Mac computers. Goldfish software can be used against 32 bit versions of Mac OS X up to and including Mac OS X (10.5) Leopard.” http://digitalfire.ucd.ie/?page_id=430
  • 27. Direct Memory Access • Advantages – Bypass passwords to gain access – Recover passwords (keyboard buffers) – Evade current anti-forensics techniques
  • 28. Direct Memory Access • Challenges – Hardware dependent! – Physical access! – Disabled drivers? – 4GB of accessible space! 0>ffffffff
  • 29. Direct Memory Access • Mitigation – Windows • Block SBP-2 drivers: http://support.microsoft.com/kb/2516445 • Remove FireWire and thunderbolt drivers
  • 30. Direct Memory Access • Mitigation – Macs • Filevault2 (OS X Lion) and screen locked • Firmware password
  • 31. Direct Memory Access • Mitigation – Linux • Disable DMA • Remove FireWire drivers