67
Incident Response and Digital Forensics – Denver Chapter of ISACA

Incident Response and Digital Forensics – Denver Chapter of ISACA

  • Upload
    feoras

  • View
    35

  • Download
    0

Embed Size (px)

DESCRIPTION

Incident Response and Digital Forensics – Denver Chapter of ISACA. Outline. Introduction The Incident Response Process Preparation Identification Containment Eradication Recovery Lessons Learned The Attacker Process Reconnaissance Scanning Exploitation Keeping Access Covering Tracks - PowerPoint PPT Presentation

Citation preview

Page 1: Incident Response and Digital Forensics – Denver Chapter of ISACA

Incident Response and Digital Forensics –Denver Chapter of ISACA

Page 2: Incident Response and Digital Forensics – Denver Chapter of ISACA

Outline Introduction The Incident Response Process

Preparation Identification Containment Eradication Recovery Lessons Learned

The Attacker Process Reconnaissance Scanning Exploitation Keeping Access Covering Tracks

Conclusion

Page 3: Incident Response and Digital Forensics – Denver Chapter of ISACA

Introduction

FishNet Security

Started in 1996, largest InfoSec VAR Support, Consulting, Training, Products Locations – Boston, Omaha, Kansas City,

St. Louis, Dallas, Minnesota Assessment Team: Policy, Network,

WebApp and DB, Wireless, IR and Digital Forensics

Page 4: Incident Response and Digital Forensics – Denver Chapter of ISACA

Introduction

Trey Keifer - ([email protected])

Level II Security Engineer

Sr. Incident Response Analyst Coordinator of Incident Response

Program SANS Certified Incident Handler (GCIH)

Page 5: Incident Response and Digital Forensics – Denver Chapter of ISACA

Incident Response and Digital Forensics

One of the least practiced, most stressful, highly scrutinized areas of Information Security.

Every incident is unique and can incorporate many different areas of the affected organization.

Incident analysts must be able to think quickly, remain calm and consider all possibilities.

Page 6: Incident Response and Digital Forensics – Denver Chapter of ISACA

Common Incident Types

Economic Espionage Intellectual Property Theft

Unauthorized Access Stolen Passwords and Data

Unauthorized Use Inappropriate E-Mail and Web Habits

Malicious Code Worms with Backdoors (Sasser)

Insider Threats

Page 7: Incident Response and Digital Forensics – Denver Chapter of ISACA

6 Steps of the Incident Handler Methodology

Preparation Identification

Containment Eradication Recovery Lessons Learned

Page 8: Incident Response and Digital Forensics – Denver Chapter of ISACA

Preparation:

The key to a successful response is preparation.

Form a strategy. Design a procedure. Gather Resources. Practice, practice, practice.

Page 9: Incident Response and Digital Forensics – Denver Chapter of ISACA

Preparation:

Identify the “Core Team”

Technical (IT, InfoSec and System Owners) Management Legal Department Forensics Public Relations Human Resources Physical Security and Maintenance Telecommunications

Page 10: Incident Response and Digital Forensics – Denver Chapter of ISACA

Preparation:

Organizing Individuals All members of the CSIRT team should know their

role and how they will interact with the other members.

Outsourced or “third party” members should have contracts in place.

Contacts for Law Enforcement should be known and situations for their involvement discussed.

Page 11: Incident Response and Digital Forensics – Denver Chapter of ISACA

Preparation:

Develop a Procedure Incident response can be a high-stress time. A

well documented procedure, that is easy to follow, can greatly reduce the anxiety.

Develop a call tree and notification procedures Brainstorm likely scenarios. Identify general information needed in most

scenarios ahead of time. Make checklists and forms for as much as

possible.

Page 12: Incident Response and Digital Forensics – Denver Chapter of ISACA

Preparation:

Communication Communication is incredibly important during an

incident. Not only the people involved, but the method which it is done.

Updates should be frequent. Out-of-Band Communications are very important.

Faxes Cell Phones Be careful with the Blackberry’s

Page 13: Incident Response and Digital Forensics – Denver Chapter of ISACA

Preparation:

Access Rights The incident response team must have access to

systems without the administrators authorization.

Controversial Issue User Accounts, Passwords and Encryption keys Third-party storage methods are available

Page 14: Incident Response and Digital Forensics – Denver Chapter of ISACA

Preparation:

Policies Protect the organization from legal liability and

allow investigators to do their job.

Warning Banners are readily displayed. Search policy is detailed in employee manual. Human Resources and Legal have signed off. Employees have acknowledged knowing their

expectations on privacy. Beware of international laws (European Privacy

Directive)

Page 15: Incident Response and Digital Forensics – Denver Chapter of ISACA

Preparation:

Gathering Resources Incident analysts should have all information

ready and be able to respond to the incident.

Procedures, Checklists and Forms are ready. Access credentials are available or individuals

with them are known. System information, network diagrams, software

and intellectual property are documented thoroughly.

Page 16: Incident Response and Digital Forensics – Denver Chapter of ISACA

Preparation:

Training SANS Institute and GIAC Certifications

Track 4: Incident Response and Hacker Techniques Track ??: Digital Forensics

Vendor Training Guidance Software Access Data

Partners Incident Response Scenarios

Page 17: Incident Response and Digital Forensics – Denver Chapter of ISACA

Identification:

“Incidents can’t always be prevented, but must always be detected.”

Page 18: Incident Response and Digital Forensics – Denver Chapter of ISACA

Incident: Intentional or Unintentional

Multiple failed logins to the domain administrator account.

Administrator credentials were cached on a users workstation and they are attempting to login.

Someone is actively attempting to brute-force the account.

Page 19: Incident Response and Digital Forensics – Denver Chapter of ISACA

Identification:

Goals

Determine Scope Identify what systems, people and informational

assets are involved in the event.

Preserve Evidence Protect the facts of the incident while determining

the scenario.

Page 20: Incident Response and Digital Forensics – Denver Chapter of ISACA

Identification: Suspicious Events

Unexplained Occurrences

New Accounts or Files File Modifications IDS Triggers Firewall Entries Accounting Discrepancies Poor Performance/Unresponsive services System Instability

Page 21: Incident Response and Digital Forensics – Denver Chapter of ISACA

Identification: Passive Identification

Sniffers and Traffic Analysis

Cyclical Buffers allow full recording of events at the packet level to a point, depending on size and utilization.

Target machine evidence is still preserved. Assist in determining new attacks for which

signatures have not yet been written.

Page 22: Incident Response and Digital Forensics – Denver Chapter of ISACA

Identification: Passive Identification

Intrusion Detection Systems

Least invasive method Target machine evidence is preserved Logs must still be protected

Write-Once, Read-Many Media

Page 23: Incident Response and Digital Forensics – Denver Chapter of ISACA

Identification: Passive Identification

Tripwire-style File Modification A hash of the file is taken and stored in a secure

database. Any modification to that file results in a change of the hash.

Very indicative of a successful compromise. Can be noisy during patching and must be tuned

after every software upgrade.

Page 24: Incident Response and Digital Forensics – Denver Chapter of ISACA

Identification: HoneyPots and HoneyTokens

Specific systems or accounts with additional logging and notification to alert on suspicious activity.

Operators must be careful of entrapment. Systems have to be secured and heavily

monitored. Systems cannot invite intruders –

No “hackme” accounts No “Salary Database” systems

Page 25: Incident Response and Digital Forensics – Denver Chapter of ISACA

Identification: Chain of Custody

Evidence must be accounted for from the time it is collected until the time it is submitted to the court.

Each piece of evidence must be under the control of one, identifiable person at all times.

A change in control of the evidence must be recorded.

Evidence in storage must be protected from contamination. (ie… sealed and secured)

Page 26: Incident Response and Digital Forensics – Denver Chapter of ISACA

Containment -

Now that the events have been identified as an incident and a chain-of-custody for evidence has been established, we will take the first step into system modification by beginning our containment.

Page 27: Incident Response and Digital Forensics – Denver Chapter of ISACA

Containment:

Vendor Coordination Work closely with your vendors and know how to

open security-related tickets with high priority.

ISPs can prevent some Denial of Service situations. They are more familiar with attacks because they have

seen them with other clients and are up-to-date on advisories.

Additional people working towards identification, containment and recovery.

We are used to the pressure!

Page 28: Incident Response and Digital Forensics – Denver Chapter of ISACA

Containment:

Identifying the Trust Model The trust model identifies not only the

technology, but also the people that are involved in the incident.

What connectivity does the network or system have to other areas in the organization?

What information is contained within it? Who needs to be involved and to what extent?

Page 29: Incident Response and Digital Forensics – Denver Chapter of ISACA

Containment:

Documentation Strategies Documentation should be collected from

most volatile to least volatile and least invasive to most invasive.

Volatile evidence includes RAM, running processes and active connections.

Be careful of running system commands from anything but recovery media.

Page 30: Incident Response and Digital Forensics – Denver Chapter of ISACA

Containment:

Should we Quarantine? Changes to a system may be easily

observed by an active attacker.

Rootkits may identify a pulled network connection or extensive system modification and protect the attacker.

Some exploits are entirely memory resident and will disappear when the power is pulled.

Page 31: Incident Response and Digital Forensics – Denver Chapter of ISACA

Containment:

Initial Analysis

Keep a low profile Never analyze the original Make frequent updates to CSIRT Acquire log files Stick to the facts and avoid blame Consider all possibilities but keep it simple

Page 32: Incident Response and Digital Forensics – Denver Chapter of ISACA

Containment:

Backups Numerous backups allow both

investigation and preservation of evidence.

Different strategies exist and depend on the situation.

Original is kept as evidence Backup 1 – Placed back in production Backup 2 – Forensic Analysis Backup 3, 4, etc… separate copies for analysis

Page 33: Incident Response and Digital Forensics – Denver Chapter of ISACA

Containment:

Digital Forensics Numerous separate analysis all yield the

same results.

Requires specialty hardware, software and training.

Bit by Bit copying and analysis of data. Recovery of deleted data. Identification of altered system files (trojans) and

binaries in a safe environment.

Page 34: Incident Response and Digital Forensics – Denver Chapter of ISACA

Containment:

Digital Forensics: Hardware Write Blockers No modification to the data itself, we want

to observe and duplicate only.

Hardware device or driver between acquisition machine and target system.

May use NIC, USB, FireWire or IDE/SCSI channels. Intercepts write commands and gives logical

return results. Allows browsing of the filesystem during

acquisition.

Page 35: Incident Response and Digital Forensics – Denver Chapter of ISACA

Containment:

Digital Forensics: Forensic Software Allows quick and efficient analysis of the

information contained on the device.

Guidance Software’s EnCase used by law enforcement.

Linux Forensics CD’s are coming along in maturity. (still must use write blockers!!!)

Scripts allow quick searching of keywords in files and deleted data.

Hash comparisons verify original files, known dangerous applications and aid the examiner in avoiding the bad stuff.

Page 36: Incident Response and Digital Forensics – Denver Chapter of ISACA

Containment:

Digital Forensics: What are we looking for? Many areas of interesting data are

forgotten about.

Cached web content Email Files (PST’s) Recoverable Deleted Files Specific Incidents: CAD drawings, Engineering

diagrams, Pornography Known file signatures of hacking tools, backdoors,

etc…

Page 37: Incident Response and Digital Forensics – Denver Chapter of ISACA

Containment:

Digital Forensics: Other devices? May not be able to submit as evidence in

court, but can assist the Incident Handler in their investigation.

Personal Organizers (PIMs): Blackberry, Palm Pilots, IPAQ’s.

SIM Cards/Cell phones USB Tokens/Flash Drives

Page 38: Incident Response and Digital Forensics – Denver Chapter of ISACA

Containment:

Digital Forensics: Not Perfect! Some tools have been written specifically

to defeat forensics software.

DoD: 7-Pass, random-write method for secure deletion of magnetic media. (Rainbow Method)

Windows: Eraser Unix: Wipe

Page 39: Incident Response and Digital Forensics – Denver Chapter of ISACA

Containment:

Slowing the Attack Change passwords and access rights. Change hostnames and IPs. Null Route suspicious traffic. Block IPs or Networks. Apply Patches to similar systems. Shutdown services.

Page 40: Incident Response and Digital Forensics – Denver Chapter of ISACA

Eradication -

Once an incident has been contained we attempt the total removal of malicious applications from a system or network.

Page 41: Incident Response and Digital Forensics – Denver Chapter of ISACA

Eradication:

Remove or Restore The decision of whether to remove malicious files

or restore from backups is a difficult task.

Rootkits almost always demand a rebuild. Verification of backups is a must. Patches may not be available and a total change

of architectures may be necessary.

Page 42: Incident Response and Digital Forensics – Denver Chapter of ISACA

Eradication:

Improve Defenses Implement additional detection and protection

methods and strengthen existing technologies and processes.

Apply firewall and router filters. Perform “mini-assessments” using the same tools

and techniques as your attackers. Look for the same exploits and backdoors on

multiple machines.

Page 43: Incident Response and Digital Forensics – Denver Chapter of ISACA

Recovery -

Once the threat has been removed the organization must begin the process of returning the business to normal operation.

Page 44: Incident Response and Digital Forensics – Denver Chapter of ISACA

Recovery:

Returning to Operation System owners make the final call on returning to

production.

Owners depend on the systems and know their true value.

If a disagreement occurs on whether to return to production or not it should be documented by the analysts and the owner should acknowledge responsibility.

Page 45: Incident Response and Digital Forensics – Denver Chapter of ISACA

Recovery:

Monitoring At this point in the process you should have

enough information to identify the attack if it occurs again.

Create custom IDS signatures if possible. Verify proper operation to baseline configurations. Implement additional logging on network, hosts

and applications.

Page 46: Incident Response and Digital Forensics – Denver Chapter of ISACA

Lessons Learned -

The lessons learned meeting provides a method for the organization to coordinate knowledge of an incident, suggest changes in procedures and policies for the future and justify the implementation of new safeguards.

Page 47: Incident Response and Digital Forensics – Denver Chapter of ISACA

Lessons Learned:

Recap Meeting Should occur promptly after eradication of

an incident while details are fresh in the team members heads.

Create a timeline of events. Provide a consensus of notes and

documentation. Finalize facts for a final report.

Page 48: Incident Response and Digital Forensics – Denver Chapter of ISACA

7 Deadly Sins

Failure to report/ask for help Incomplete/Non-Existent Notes Mishandling/Damaging Evidence Failure to create backups Failure to eradicate or contain Failure to prevent re-infection Failure to apply lessons learned

Page 49: Incident Response and Digital Forensics – Denver Chapter of ISACA

Attacker Methodology

Reconnaissance Profiling the Target

Scanning Identifying Weaknesses

Exploitation Breaking the Law

Keeping Access Backdoors

Covering Tracks Staying out of Jail

Page 50: Incident Response and Digital Forensics – Denver Chapter of ISACA

Reconnaissance:

The target is profiled –

Employee Information (name, numbers, titles) Systems Information (usenet postings, job listings) Process Information (vendors and transactions) Location Information (external networks, physical

locations)

Page 51: Incident Response and Digital Forensics – Denver Chapter of ISACA

Scanning:

Port and Vulnerability scanners are run to identify vulnerable systems.

Open Ports and Services Vulnerable Applications Default Usernames and Passwords Weak Encryption Implementations

Page 52: Incident Response and Digital Forensics – Denver Chapter of ISACA

Exploitation:

Execution of attack – usually the first point at which the law is broken.

Goals Gaining Access Elevating Access Extracting Information Denying Service (DoS)

Page 53: Incident Response and Digital Forensics – Denver Chapter of ISACA

Keeping Access:

Addition of Admin-level User Accounts Enabling of default, insecure services Installation of “Backdoor” or “root kit”

applications allowing the attacker to retain access despite system modifications.

Application Level Traditional Rootkit Kernel Level Rootkit

Page 54: Incident Response and Digital Forensics – Denver Chapter of ISACA

Covering Tracks:

Modification of system logs, applications and processes to prevent identification by administrators. Hiding files and Directories (… and alt-255

dirs) Changes in /var/log Changes in shell history Removal of events (windows)

Page 55: Incident Response and Digital Forensics – Denver Chapter of ISACA

Our Example Scenario

An attacker uses a “0-day” exploit to infiltrate the target organization, install a backdoor and retrieve critical intellectual property for a competitor.

Normal security procedures alert the administrators to suspicious activity and the incident response plan is activated.

Page 56: Incident Response and Digital Forensics – Denver Chapter of ISACA
Page 57: Incident Response and Digital Forensics – Denver Chapter of ISACA

Attacker Perspective: Reconnaissance

Google and the corporate web site are used to identify the organizational structure of key personnel including HR managers and executive management.

Low-Profile, no data sent directly to organization.

Impossible to detect.

Page 58: Incident Response and Digital Forensics – Denver Chapter of ISACA

Attacker Perspective: Harvesting

Freely-available scanningtools are used to identifyemail addresses from thecorporate website.

Same method as SPAMgroups.

Many sites do not usegeneric web addresses.

Page 59: Incident Response and Digital Forensics – Denver Chapter of ISACA

Attacker Perspective: Exploitation

Attacker sends malicious application to email addresses obtained during scanning.

Users open emails (possibly through social engineering) and are immediately infected.

Attacker can be listening for connections from infected machines and have immediate control over systems.

Page 60: Incident Response and Digital Forensics – Denver Chapter of ISACA

Attacker Perspective: Keeping Access

Page 61: Incident Response and Digital Forensics – Denver Chapter of ISACA

Incident Timeline

Page 62: Incident Response and Digital Forensics – Denver Chapter of ISACA

Incident Timeline: Preparation

IR Team established and roles defined. Daily procedures established for log

analysis and identification. Containment procedures are outlined in

policy. (Restoration takes priority) Roles and Responsibilities are defined

Page 63: Incident Response and Digital Forensics – Denver Chapter of ISACA

Incident Timeline: Identification

Bandwidth graphing shows abnormal usage

Passive sniffing identifies responsible host

Page 64: Incident Response and Digital Forensics – Denver Chapter of ISACA

Incident Timeline: Containment

No “watch and learn” policy, power is pulled from the host.

System is imaged using forensic tools and Hardware Write-Blockers which prevent alteration of data during backup.

Employee is interviewed to determine method of infection.

Page 65: Incident Response and Digital Forensics – Denver Chapter of ISACA

Incident Timeline: Eradication and Recovery

System is restored from the organizations hardened base image and patches are applied. (Analysis can continue through restore)

Page 66: Incident Response and Digital Forensics – Denver Chapter of ISACA

Incident Timeline: Lessons Learned

Social Engineering Awareness File attachment blocking Firewall Rule Revisions IDS Signature changes Patch Management Advisory Alert Services

Page 67: Incident Response and Digital Forensics – Denver Chapter of ISACA

Questions?