Module 8: Digital Forensics for Incident Responders

Fundamentals of Digital Evidence Handling

Importance of Evidence Handling

Failing to handle evidence properly can result in the integrity of the evidence bein compromised or become untrustworthy.

Evidence Collection and Preservation

  1. Identify potential sources of digital evidence.

  2. Gather content, and metadata.

    1. Limit interactino with media that may contain digital evidence to avoid altering the original data.

  3. Maintain integrity via cryptographic hashes for validation.

  4. Use a hardware write blocker when duplicating data.

  5. Store evidence securely.

  6. Protect sensitive data/digital evidence via encryption.

  7. Control and monitor chain of custody.

Kali Linux Forensics Mode

Kali live has a boot option for forensics mode which protects from writing/modifying contents of the hard drive(s). It also has auto-mounting disabled.

Capturing a disk image using dd

Option
Explanation

if=/dev/nvme0n1

This specifies the input file.

of=/mnt/external/VICTIM-OS.raw

This specifies the output file.

bs=4M

This specifies the size of each block.

conv=sync,noerror

This is specifying that if there is a read error, pad the output block with null bytes to "sync" with the original device. If there are errors, continue.

status=progress

Display a visual status of the progress of the image copy.

sha256sum can be used to obtain a sha256 hash of the resulting image.

Prominent resource by IETF

It is suggested that evidence is gathered in this order, with most volatile being first:

  • Registers, cache

  • Routing table, ARP cache, process table, kernel statistics, memory

  • Temporary file systems

  • Disk

  • Remote logging and monitoring data that is relevant to the system in question

  • Physical configuration, network topology

  • Archival media

A very detailed, standardized, and methodical approach is provided in ISO 27037:

Response Kits

Bare minimum necessities:

  • Administrative Documents

  • Hard Drive Cloner/Eraser

  • Storage Devices

  • SSD/HDD Converters

  • Laptop

  • Forensics Tools

Forensic Tools and Techniques

Computer Forensics

  • Disk imaging

    • Offline imaging

    • Live imaging

    • remote imaging

    • VM imaging

Creating a new Case in Autopsy
Adding a Data Source in Autopsy Step 1
Adding a Data Source in Autopsy Step 2
Adding a Data Source in Autopsy Step 3
Adding a Data Source in Autopsy Step 4
Adding a Data Source in Autopsy Step 5
File System of WEB01
Navigating to the database file dump.db
Creating a Timeline
Analyzing the Timeline
Following the activities in the Timeline

Memory Forensics

Using volatility to perform some memory forensics.

Displaying Windows Information with Volatility3:

Displaying Networking Information with Volatility3

Displaying Process Tree Information with Volatility3

Network Forensics

Useful sources:

  • Netflow data

  • Full Packet Capture (FPC)

Starting NetWitness Investigator
Creating a new Local Connection
Selecting the PCAP files recorded on IDS01
Values identified by NetWitness Investigator
Reviewing Attachments
Analyzing one of the phishing emails

Log Forensics

We already did this earlier via Splunk. Do it again.

Malware Analysis

Basic Static Analysis

Loaded Binary in pestudio

PowerShell Script to calculate Shannon's Entropy for all .exe files in a specified directory

Searching for the hash in VirusTotal
String Analysis in PEStudio
Analysis of Indicators

Basic Dynamic Analysis

ProcMon displaying numerous events
Creating a ProcMon filter

Starting the binary application_builder.exe in PowerShell

ProcMon shows events related to the started binary
The binary loads kernel32.dll
The binary loads ws2_32.dll
The binary attempts network connections to 192.168.48.130

Automated Analysis

Use tools like VirusTotal, ANY.RUN, Hybrid Analysis, Joe Sandbox Cloud's Community Edition, Cuckoo Sandbox, etc. If they have APIs, you can automate this even further.

Last updated