Lecture 6 PPT

Download Report

Transcript Lecture 6 PPT

PUCIT:404 Computer Forensics
A. Gyasi-Agyei
Lecture 6: Windows Forensics II
2
Aim of lecture
This lecture presents the various log files that a
forensic investigator can study to find on a computer
under investigation
– the possibility of occurrence of activities
– What type of activities if any has occurred
A logfile (or simply log) is a file that records either the
events which happen while an operating system or
other software runs, or the personal messages
between different users of a communication software.
The act of keeping a logfile is called logging. In the
simplest case, log messages are written to a single log
file.
2
3
Lecture Objectives
1.
Understanding event logs
2.
Understanding other audit events
3.
Understanding forensic analysis of event
logs
4.
Understanding Windows password issues
5.
Describe some popular Windows forensic
analysis tools
4
What is audit trail?
Computer forensics involves audit trail of
systems investigated
An audit trail (also called audit log) is a
security-relevant chronological record, set
of records, and/or destination and source
of records that provide documentary
evidence of the sequence of activities that
have affected at any time a specific
operation, procedure, or event.
4
5
What are events?
Any occurrence that the operating system
(OS) or a program wants to keep track of or
alert the user about
Examples of events are:
– User logging onto a computer
– User logging off a computer
The OS logs each event
Methods of logging events by the OS:
– Some events are logged automatically by default
– Other events are logged based on the audit
configuration in PolAdEvt registry key
5
6
Event Logs?
Event logs are special files that record
significant events on a computer, such as:
– when a user logs onto the computer
– when a program crashes
– When a program starts
The operating system records a ‘special’
event in an event log that can be read
using Event Viewer
Details in event logs can be helpful when
troubleshooting problems with operating
systems and other programs
6
7
Examples of Windows Event Logs
Application (program) events
Setup events
Forwarded events
Security-related events
System events
Domain Controllers events
– File Replication event logs
– Directory Service event logs
Domain Name Servers event logs
– DNS event logs
7
8
Application (program) event logs
Depending on the severity, application
(program) events are classified as
– Error
– Warning
– information, of the event
An error event is a significant problem, such
as loss of data.
A warning event is an event that is not
necessarily significant, but might indicate a
possible future problem.
An information event describes the
successful operation of a program, driver, or
service
8
9
System events log
System events are logged by Windows and
Windows system services
Like application events, they are classified
as error, warning, or information
9
10
Setup event logs
A domain is a Windows concept through
which a user may be granted access to a
number of computer resources using the
same username and password
combination.
On Microsoft Servers, a domain controller
(DC) is a server that responds to security
authentication requests (logging in,
checking permissions, etc.)
Computers that are configured as domain
controllers will have additional logs
displayed here
10
11
Forwarded events log
The forwarded events log contain events
sent or forwarded from other .computers
11
12
Security-related events log
Security-related events are called audits
They are described as successful or failed
depending on the event, such as whether a
user trying to log on to Windows was
successful or not
Example: when you mistype your login
password the system denies access to it.
Such a denial triggers an security-related
event which is logged.
12
13
DNS Event Logs
13
14
Domain Controller event logs
Domain controllers have these logs
 File Replication event logs
 Directory Service event logs
14
15
Event Viewer
We said earlier that events logged by the
operating system can be viewed on
Windows using Event Viewer.
How do we access the Windows Event
Viewer?
15
16
Accessing Windows 7 Event Viewer
• Click on Windows Start button
• Click Control Panel
• Click System and Security
• Administrative Tools
• Double-click Event Viewer
• Double-click Windows/Events Logs
To view the details of an event double click it
16
17
Windows 7 Event Viewer
17
18
Event log format
Windows event log is stored in binary
format with distinct, recognizable features
that can help investigator to recognize and
interpret event log files or event records on
a system, either in files or located in
unallocated space.
Each event log comprises:
– Header section
– Series of records
The event log is kept in a circular buffer to
allow getting rid of records of older events
as new ones are added.
18
19
Structure of event log header
Basic features of the event log header:
– The first 48 bytes of a valid event log file
– Consists of 12 distinct DWORD values
Event record structure (see Page 5-3 of
CHFI Book)
– Basic size of header is 56 bytes
19
20
An application program event log
20
21
IIS Logs
Microsoft Internet Information Services
Server (IIS), formerly Internet Information
Server, is a popular Web server platform
A best way to uncover attempts to
compromise an IIS or to view the details of
a successful exploit is to examine the
directory %WinDir%\System32\LogFiles
A scripting language can be used to open
files in each subfolder and searched during
investigations
21
22
Virtual Servers in IIS
1. Open Windows explorer
2. In the address bar type
%WinDir%\System32\LogFiles
1. Click <enter>
22
23
How to activate IIS
Before that you have to enable the IIS for
windows by
start
Control panel
programs
Turn windows feature on / off
Check the IIS services (4th and 5th
checkbox)
ok
restart the system
23
24
Parsing Windows Firewall Logs
When logging is enabled, windows firewall
logs are kept in the folder
%SystemRoot%\pfirewall.log
Data is stored in the file objects.data which
is located in
C:\Windows\System32\wbem\Repository\
When the Windows Firewall log is open in a
text editor we can see the header at the top.
This header describes
– The software, version, time format, and other
fields
24
25
Tasks
Study the header of the basic event log of
the operating system on your
laptop/computer. Note the type of OS.
Analyze the log files of:
– DHCP Server
– Windows firewall
25
26
What is account auditing?
Whenever you are connected to the Internet, you
are at risk. Anyone can try to access your system
and if enhanced security is not implemented, then
the hacker can steal your confidential data
Account Auditing lets you see who may be trying
to break into your account.
If you have enabled the Account Auditing settings
then such type of events are logged in the system
and you can view these log files any time to see if
someone is accessing your system or not.
Account Auditing lets you see who may be trying
to break into your account.
26
27
Examining auditing-policy change
events
Attackers to a system often attempt to
disable auditing
Modifications to the audit policy are recorded
as event ID 612
A computer forensics investigator can deduce
what changes have been made by looking at
event ID 612 entries and comparing the old
and new policies
As the audit policy of a domain controller has
precedence over local audit policy on
individual computers, attackers have a
difficult task in completely disabling auditing
27
28
How do we enable Account Auditing
Settings?
Click on Start Windows and type secpol.msc
Hit
Enter
Local Security Policy window opens
Navigate to:
Local Policies  Audit Policy
Right click on:
Audit account logon events policy
Choose Properties
28
29
29
30
Examining system log entries
The system event log records events
relating to system behaviour, e.g.
–
–
–
–
Operating system changes
Hardware configuration changes
Starting and stopping of services
Installation of device drivers
The Service Control Manager sends a
message with event ID 7035 to the System
event log whenever a service is stopped
30
31
Examining application log entries
Application event log contains messages from both
operating system and various programs, e.g.
– Desktop application programs like MS Word
– Antivirus and security software, including
scanning activities and discovery of malware
Users can use Microsoft program called logevent.exe
to send customized messages
Virtual Network Computing (VNC) and Windows
Remote Desktop allow remote connections. VNC
application records connections to the VNC server
including source IP and port number in the
application log
31
32
Windows Event Log File Internals
Windows event log files are essentially
dbases with the records related to the
– System  SysEvent.evt
– Security  SecEvent.evt
– Applications  AppEvent.evt
These event file types are stored in the
folder %SystemRoot%\system32\config
NOTE: EVT is a file extension for log files
used by Windows Event Viewer
32
33
What is Windows Event Log Parser?
Log parser is a powerful, versatile tool that
provides universal query access to textbased data such as
– log files, XML files and CSV files
As well as key data sources on the
Windows® operating system such as the
– Event Log,
– the Registry,
– the file system, and
– Active Directory®
33
34
Popular Windows forensic analysis
tools: Word Extractor
Word Extractor is a hacking tool that
extracts human-understandable words
from binary computer files
– Binary files  human-understandable words
A hacker can use this tool to attempt to
find hidden text or passwords in a file
Features of word extractor:
– Supports drag and drop and text warping
– Saves results as text or RTF files
– Replaces nonhuman words with spaces or dots
for better visibility
34