Memory forensic analysis (aashish)

21
Windows Memory Windows Memory Forensic Analysis Forensic Analysis Club Club Hack Hack 2010 2010

Transcript of Memory forensic analysis (aashish)

Page 1: Memory forensic analysis (aashish)

Windows Memory Forensic Analysis Windows Memory Forensic Analysis

-- -- Aashish KunteAashish KunteClubClubHackHack20102010

Page 2: Memory forensic analysis (aashish)

Security Incident

• A secured company’s network gets a port 5548 traffic on the Null (SinkHole) Router !

• The activity seems to be a suspicious Service Scan !

• Source Computer is a Windows Web Server ….

Page 3: Memory forensic analysis (aashish)

Security Incident Response

• Set of procedures to examine a computer security incident.

• The process involves figuring out what was happened

• Helps mitigate security risk through proactive measures and world-class defensive tactics

Page 4: Memory forensic analysis (aashish)

Digital Forensics• In depth Analysis & Complex Techniques • The goal of computer forensics is to explain

the current state of a digital artifact• The scope of a forensic analysis can vary

from simple information retrieval to reconstructing a series of events.

Page 5: Memory forensic analysis (aashish)

Technique

• Preparation

• Acquisition• Enumeration• Analysis • Recovery• Presentation

Page 6: Memory forensic analysis (aashish)

Windows Memory• live activities from the contents of RAM on a

Windows Machine. • During a post-mortem analysis: specifically

encrypted, compressed or hidden processes. • RAM constituted "electronically stored

information" under rule 34(a) of the Federal Rules of Civil Procedure.

Page 7: Memory forensic analysis (aashish)

What Information ???Processes

Open Files & Registry Handles

Network Information

Passwords & Cryptographic Keys

Unencrypted Content

Hidden Data

Malicious Code

DLL’s

Page 8: Memory forensic analysis (aashish)

Analysis

Sit Back …

… Relax !!

Page 9: Memory forensic analysis (aashish)

• How Volatile Memory Works ?

Page 10: Memory forensic analysis (aashish)

• Acquisition of Windows Memory

• Volatile Memory Organized ?

Page 11: Memory forensic analysis (aashish)

• Processes

• What is Process Memory ?

• Process Enumeration

Page 12: Memory forensic analysis (aashish)

• How to find Suspicious Files and Suspicious Keys ?

• Open Files

• Windows Registry

• Loaded DLL’s

Video : HBGary Responder Pro & Digital DNA -identifying malware

Page 13: Memory forensic analysis (aashish)

• Network Information

• Why from Volatile Memory ?

• Open Sockets

• Open Ports

• Open TCP Connections

Page 14: Memory forensic analysis (aashish)

• What the heck is VAD Tree ?

Page 15: Memory forensic analysis (aashish)

• Passwords and Encryption Keys

• SSDT

Video : To find out Passwords and Encryption Keys from Windows Memory

Video : To Analyze SSDT using : Python and Volatility Framework

Page 16: Memory forensic analysis (aashish)

• Anti-Forensic Attack (DKOM)

Page 17: Memory forensic analysis (aashish)

• Static & Dynamic Analysis

• Reverse Engineering

• Files of Unknown Origin

Page 18: Memory forensic analysis (aashish)

Quick Bites• Suspicious Log Entries

• Suspicious Processes and Services• Suspicious Files and Registry Keys

• Suspicious Network Usage• Suspicious Scheduled Tasks

• Suspicious Accounts

Page 19: Memory forensic analysis (aashish)

Tools• Basic Tools

• Memdump, KnTTools• FATKit

• WMFT• Procenum

• Idetect

• The Volatility Framework

• VAD Tools • Commercial

Tools

• Memoryze

Page 20: Memory forensic analysis (aashish)

Future

Page 21: Memory forensic analysis (aashish)

Questions ???

ClubClubHackHack20102010