Incident Response/�Forensics
Incident Response
Objectives:
The student should be able to:
Sample Cases
Hospital laptop walks away
Corporation hosting recent movies?
Rootkit found in government server
Case: Hospital Laptop is Missing
Questions:
Case: Hospital Laptop is Missing
When did the laptop disappear? Can we recover it?
Case: Hospital Laptop is Missing
What patient data was on laptop?
Was the network further compromised?
Case: Hospital Laptop is Missing
Results:
Case: Hospital Laptop is Missing
Solution
Case: P2P File Sharing
Case: P2P File Sharing
Questions:
Case: P2P File Sharing
Where is the P2P data stored? Who is responsible?
Case: P2P File Sharing
Where is the P2P data stored? Who is responsible?
What data was stored?
Case: �Government Server has Rootkit
Antivirus detected suspicious files on government server
Questions:
Case: �Government Server has Rootkit
How was the system compromised?
Case: Gov’t Server has Rootkit
How was the system compromised?
Case: Gov’t Server has Rootkit
Were other computers compromised?
What information was stolen?
Result:
How to investigate a case: OSCAR
OSCAR
Oscar: Obtain Information
Obtain info about the Incident:
Obtain info about the Environment:
Collected information includes…
Volatile information:
oScar: Strategize
osCar: Collect Evidence
osCar: Collect Evidence
Useful information to collect…
After computer is turned off…
Incident Response Procedure
Live Response
Goal: Minimize reaction time by:
Chain of Custody
10:53 AM
Attack
observed
Jan K
11:04
Inc. Resp. team arrives
11:05-11:44
System copied
PKB & RFT
11:15
System
brought
Offline
RFT
11:45
System
Powered down
PKB & RFT
11:47-1:05
Disk
Copied
RFT & PKB
1:15
System locked in static-free bag
in storage room
RFT & PKB
Who did what to evidence when?
(Witness is required)
Time
Line
Creating a Forensic Copy
Original
Mirror
Image
3) Forensically Sterile:
Wipes existing data;
Records sterility
4) One-way Copy:
Cannot modify
original
5) Bit-by-Bit Copy:
Mirror image
2) Accuracy Feature:
Tool is accepted as accurate by the scientific community:
e.g., CoreRESTORE, Forensic Replicator, FRED
1) & 6) Calculate Message Digest:
Before and after copy
7) Calculate Message Digest
Validate correctness of copy
Data Collection
oscAr: Analyze Evidence
oscaR: Report
Writing a Report
Step 0: Establish Detection Procedures
Redline’s recommendations
For a compromise machine:
Live Response Process
Forensic Analysis
Evidence, internal affair
Thank You