View Presentation with Notes - PPT

Download Report

Transcript View Presentation with Notes - PPT

Expanding Response: Deeper
Analysis for Incident Handlers
Russ McRee
November 2011
GIAC GCIH Gold, GCFA, GCIA, GPEN, GWAPT,
GSEC Gold
SANS Technology Institute - Candidate for Master of Science Degree
1
1
Objective
• Expand incident response tactics
beyond common horizons
• Sample Overview – SpyEye
• Demonstrate tools for expanded toolkit
•
•
•
•
Volatility 2.0
Xplico
Maltego
Confessor
• Summary
SANS Technology Institute - Candidate for Master of Science Degree
2
Broaden IR perspective
• Opportunities to enhance IR tactics via:
• Memory analysis (Volatility)
• Network Forensic Analysis Tooling (Xplico)
• Derive disparate entity relationships
(Maltego)
• Analysis of systems at scale with uniform
results (Confessor, MOLE)
• Review sample’s attributes with all tools
SANS Technology Institute - Candidate for Master of Science Degree
3
Sample Overview
• Trojan.SpyEye
– MD5: 00b77d6087f00620508303acd3fd846a
• Modifies registry
– [HKEY_CURRENT_USER\Software\Microsoft\Windows
\CurrentVersion\Run]
• cleansweep.exe =
"C:\cleansweep.exe\cleansweep.exe"
• Creates directory C:\cleansweep.exe
– Populates with .exe and config file
SANS Technology Institute - Candidate for Master of Science Degree
4
Volatilty 2.0
• For the extraction of digital artifacts
from volatile memory image
• “A Python version of the Windows
Internals book, since you can really
learn a lot about Windows by just
looking at how Volatility
enumerates evidence.” - Michael Hale Ligh
SANS Technology Institute - Candidate for Master of Science Degree
5
Volatilty 2.0
• Gather image info:
– vol.py imageinfo –f HIOMALVM02.raw
• Network connections:
– vol.py --profile=WinXPSP3x86 connscan -f
HIOMALVM02.raw
• Active processes:
– vol.py --profile=WinXPSP3x86 pslist -P -f
HIOMALVM02.raw
SANS Technology Institute - Candidate for Master of Science Degree
6
Volatilty 2.0
• Process tree:
– vol.py --profile=WinXPSP3x86 pstree -f
HIOMALVM02.raw
• Discover malware attributes:
– vol.py --profile=WinXPSP3x86 -f
HIOMALVM02.raw malfind -p 1512 -D output/
• Demonstration
SANS Technology Institute - Candidate for Master of Science Degree
7
Xplico
• Xplico decodes packet captures
(PCAP) extracting the likes of:
• email content (POP, IMAP, and SMTP protocols)
• HTTP content
• VoIP calls (SIP)
• IM chats
• FTP
• TFTP
SANS Technology Institute - Candidate for Master of Science Degree
8
Xplico
• Demo: SpyEye PCAP analysis
SANS Technology Institute - Candidate for Master of Science Degree
9
Maltego
• Maltego: open source intelligence & forensics
application offering extraordinary data mining
and intelligence gathering capabilities
• Results are well represented in a variety of
easy to understand views
• In concert with its graphing libraries, Maltego
identifies key relationships between data sets
and identifies previously unknown
relationships between them
SANS Technology Institute - Candidate for Master of Science Degree
10
Maltego
• PCAPs can be converted to CSV then
directly imported by Maltego
• tcpdump -vttttnnelr SpyEye.pcap
| /usr/local/bin/tcpdump2csv.pl
"sip dip dport" > SpyEye.csv
produces a CSV that Maltego can consume
easily
SANS Technology Institute - Candidate for Master of Science Degree
11
Maltego
• Demo: IP address relationships
SANS Technology Institute - Candidate for Master of Science Degree
12
Confessor
• Confessor collects from hundreds or thousands of
systems simultaneously via Sysinternals:
• System logs
• Volatile data
• User and account information
• MAC times
• Can run SecCheck on 32-bit systems
• Search for reg keys and existence of specific files
SANS Technology Institute - Candidate for Master of Science Degree
13
Confessor
• Confessor
configuration
optimized for
specific
registry keys
and file checks
SANS Technology Institute - Candidate for Master of Science Degree
14
Summary
• Tools offered to enhance the incident
handler toolkit and address challenges
• Takeaways:
– Tool to scale
– Seek unique opportunities to correlate
– Build what you can’t buy or borrow
• Q&A: russ at holisticinfosec dot org
SANS Technology Institute - Candidate for Master of Science Degree
15