Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.

17
Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis

Transcript of Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.

Page 1: Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.

Mastering Windows Network Forensics and Investigation

Chapter 10: Tool Analysis

Page 2: Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.

April 21, 2023© Wiley Inc. 2007. All Rights Reserved 2

Chapter Topics:

• Purpose of tool analysis

• Tools & Techniques

Page 3: Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.

Purpose of Tool Analysis

• Understand the tool used by attacker - what it is doing and how it works

• Understand impact or damage done to target system

• Be able to demonstrate later in court how intrusion occurred

• Enables detailing of damage done to system & connected systems

Page 4: Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.

Tools & Techniques

• Use various antivirus / spyware detection tools first

• Strings– Enables extraction & viewing of plain-text

strings from within executables, DLL’s, etc

• Dependency Walker– Shows on which modules the attacker’s

code depends– Assists with understanding what the code

is doing

Page 5: Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.

Tools & Techniques

• Monitoring the code when it runs– Create clone system (VMWare,

Shadow Drive, restored copy)– Keep in sandbox – isolate on

network– Setup monitoring tools

• Regmon• Filemon• InCtrl5

Page 6: Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.

Tools & Techniques

• Install live analysis tools– PsList– Netstat– Tasklist (tlist)– Fport– Whoami

• Setup network traffic monitoring tool (Wireshark)

– Use whatever tools you would use for a live response to analyze the impact & function of the bad code

Page 7: Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.

InCtrl5 Results

Page 8: Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.

FileMon Results

Page 9: Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.

RegMon Results

Page 10: Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.

Forensic Exam of “Compromised Clone”

• After you’ve run the bad code on test machine, forensically examine it

• If cloned, examine clone device• If VMWare, create full clone of

comprised VMWare image• Examine the compromised full

clone image with forensic tool such as EnCase

Page 11: Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.

EnCase View of VMWare Image

Page 12: Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.

Examine Results of Network Traffic

• When test host compromised, what network traffic resulted from bad code during and after installation?

• Wireshark (formerly Ethereal) network monitoring tool

Page 13: Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.

Ethereal View of Bad Code Attempting to Contact an FTP Server

Page 14: Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.

Do External Port Scan & Compare to Netstat Results

• Root kit can hide open ports and processes from user

• By comparing netstat results with those on external port scan, you can often detect presence of root kit

Page 15: Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.

Results of “netstat –an”

Page 16: Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.

Results?

• Netstat showed 9 open TCP ports?

• SuperScan showed 10 open TCP ports?

• Why?

• Root kit is hiding one of the TCP ports and netstat can’t be relied upon to be accurate!

Page 17: Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.

Results of SuperScan