Sei sulla pagina 1di 2

DIGITAL EVIDENCE COLLECTION ADMINISTRATIVE WORK PLAN CASE SETUP IMAGE INTEGRITY ANALYSIS PREP ANALYSIS INTERPRETATION- REVIEW

IMAGE INTEGRITY ANALYSIS PREP ANALYSIS INTERPRETATION- REVIEW REPORTING

1. ADMINISTRATIVE STUFF 5. BEFORE YOU GET STARTED.. PRE-PROCESSING ANALYTICS MOUNTING / VIRTUAL EMULATE EXPORT
Check physical size of drive and Conduct hash analysis, indentify “known” Mount - Malware/Virus Scan (Don’t forget Export files from case for independent
Review Policies and Laws compare to physical label accounting and/or “notable” files. analysis with specialty tools. For example:
about MBR)
for all drive space (Check for DCA/ Memory Email
Chain of Custody form HPA). Conduct file signature analysis, review Memorize NUIX
Mount - Stego Scan Clearwell
renamed files. Redline
Digital Evidence Collection Form Identify & compare logical partition Volatility (SIFT) Recover My Email
Virtually Emulate – conduct behavior and Passwords Bulk extractor (SIFT)
size(s) to physical drive size to Identify encrypted files (entropy) live analysis
Consent form (if needed) AD PRTK Image Mounting
identify any deleted partitions or Mount ALL compound files (VHD, VMDK, Passware FTK Imager
unused disk space Ophcrack ImDisk
Evidence Tracked and Stored ZIP,RAR, Email containers, Reg Files, etc KEYWORD SEARCHING Shellbags Live View
Retrieve time zone settings for each Shellbags.py (SIFT) OSFMount
disk and apply correct time zone, if Index Case (DT Search, WDS, Encase, AD..) Create keyword list & QC syntax Internet History Virtual Box
2. WORK PLAN (docs) applicable formatting/code page usage (may be WebHistorian Stego
Generate metadata (and extended) listings/ iterative process) LNK Files Outguess
reports Tzworks Hashing
Review Policies and Laws (if needed) Rename hard disk volumes as Lslnk (SIFT) Md5deep (SIFT)
Perform targeted or full disk search Event Logs (.evt & Sha256deep (SIFT)
Gain understanding of: necessary to “Recovery”, “C”, etc. RP / VSC including unallocated and slack areas. .evtx) Hashdeep (SIFT)
-Background Registry
-If applicable, previous work GATHER SYSTEM INFORMATION Tzworks
Identify if services turned on/used Create hit report/stats GrokEVT Reg Ripper (SIFT)
- Requirements/Goal of analysis Determine OS, service pack, OS install MFT Registry Decoder
- Deliverable AD Registry Viewer
date, application list, owner, machine Extract or make available accordingly FILTERING AnalyzeMFT
Create Analysis Work Plan Ntfswalk (SIFT) Reglookup (SIFT)
name, and other basic information. for analysis YARU (SIFT)
index/$I30
Create Investigative Plan Filter data based on meta data and INDXParse.py (SIFT) Windows Journal
Retrieve user profile information exteneded meta data such as Date and SIFT Workstation is a Parser
(names, SIDs, create and last logon Time values, File Extension, and etc. great resource for Tzworks
3. SETUP CASE FOLDER (example) dates) tons of tools!

6. EQUATION FOR SUCCESSFUL ANALYSIS: (TIMELINES + MANUAL ANALYSIS) x (PASSION + TIME + RESEARCH + RESOURCES) = “WINNING”
EV1 (Evidence Files)
WC (Working Copy of Files) GENERAL AREAS REGISTRY ANALYSIS (Win only) SYSTEM ARTIFACTS INTERNET
MEMORY RESIDUE
Case # - Project Name
Custodian Name Analyze general folder locations for The System registry hives (NTUSER.DAT, If applicable, perform memory analysis to Identify installed browsers and perform
artifacts or data of interest. For There are many system related artificacts
SYSTEM, SOFTWARE, SECURITY, SAM..) that may contain potentially relevant gather volatile information including: analysis on artifact such as:
Media Type – EV # example: contain a vast of amount of information information including: -Handles; files, directories, processes, registry
>Desktop that can be imperative to your analysis. -Parse Internet history files (index.dat,
Case File -Backups (RP, VSC, others) keys, Semaphores, events and sections
>User folders For Example: -Open network ports sqlite, etc)
-Event Logs (.evt, evtx)
Index >Documents -OS Version (SOFTWARE) -Shell bags (Registry) -Hooks: Driver IRP, SSDT and IDT driver tree -Check temp folders
Analysis
Folders

Reg Files >Desktop -Last logged on user (SAM) -Jump Lists -Parse cookies
Internet Hist >Network Shortcuts -Last Failed Logon (SAM) -Misc. Logs (firewall, AV, Apps, etc) -Cached pages
Case Processor -Username & SID (SAM) -Removable Media Connections E-MAIL/IM/SOCIAL ARTIFACTS -Form History/Auto complete files
>Recently Opened File folders -LNK files
Logs >System Temp folders -Shutdown (SYSTEM) -Prefetch
-Favorites/bookmarks
-TimeZone (SYSTEM) Identify email clients or web access on system -Toolbars
Media Type – EV # >Browser Temp Folders -PageFile
and perform analysis on associated data
>System Folders (malware) -Drives Mounted by User (NTUSER.DAT) -WebSlices
Media Type – EV # -File Ext Associations (NTUSER.DAT) stores or application residue/settings: -Browser plug ins
>Autorun Client based (file examples):
*Organize output neatly! -Installed application list (SOFTWARE) SOFTWARE RESIDUE -Registry analysis
Windows - .OST, .PST, .MSG, Temp folder for -Carve unallocated for deleted history
-Search History (SOFTWARE)
TIE IT ALL TOGETHER USING -Removable Storage Devices (SYSTEM) Identify software (i.e Wiping tools, P2P,
Outlook attachments, Lotus Notes - .NSF, Mac - artifacts
4. CONFIRM IMAGE INTEGRITY 5 TIMELINE ANALYSIS – Sticky Notes, hacker tools, etc) and perform .EML, .EMLX, .MBOX
Using Registry analysis tools, such as Reg
Ripper, can aid your analysis.. analysis on associated files (binary-malware Web based (OWA, Facebook, Twitter, etc.): ...BUCKETING ANALYSIS “TO
FLIP SIDE! analysis), logs, settings, registry and etc. -Logs -Internet History reconstruction -Cache
DO” ITEMS LIKE THIS CAN HELP.
Compare Acquisition and Verification
Hash values (MD5, SHA)
7. INTERPRETATION/REVIEW OF ARTIFACTS (examples) ..
Save Verification Reports
File Open/Save Open/Run
Email
Skype Index.dat /
downloads.sqlite P2P Logs
8
Download MRU MRU History places.sqlite
GENERAL FORENSIC ANALYSIS File Opening/
CHECKLIST V.1.1 Creation
MACB MRU by ext MS Office MRU LNK Files Index.dat file:// JumpLists Shellbags Prefetch
8.REPORTNG
THE PURPOSE OF THIS REFERENCE GUIDE IS TO File XP Search Win7 Search WIn7 Browser Last visited
Thumbs.db Recycle Bin
PROVIDE AN OVERVIEW AND OUTLINE OF Knowledge ACMRU WordWheelQuery Thumbnails Artifacts MRU Document findings comprehensively
COMMON PROCESSES, SOFTWARE, AND BEST
PRACTICES FOLLOWED BY PROFESSIONALS
USB
Identification
First & Last User Volume
Drive Letter LNK Files Event Logs
Mount Have more?
Usage Insert Times Identification Name Point Let me know! Fact based Interpretation
CONDUCTING COMPUTER FORENSIC ANALYSIS
Program LastVisited Run MRU
BY DAVID NIDES (12/16/2011) User Assist Prefetch MUI Cache Jump Lists Event Logs
TWITTER: @DAVNADS Execution MRU (Start->Run) Remember who the audience is
BLOG: DAVNADS.BLOGSPOT.COM Physical Wireless Vista/W7 Network Search Image
Time Zone Cookies IP
EMAIL: DNIDES@KPMG.COM Location SSID History Terms exif Remember requirements/expectations
CREDITS TO: ED GOINGS, ROB LEE & SANS
Account Last Password Group Success/Fail Logon Account Logon/ SID
QUESTIONS/FEEDBACK–CONTACT US! RDP Usage
Usage Change Membership Logons Types Authentication Attributes
Browser Search Box Session Flash & Super Suggested Memory Fragments of AJAX
History Cache Typed URLS
Usage Terms Restore Cookies Sites Private Browsing Transactions
SIFT REFERENCE GUIDE (V.1.1) – CREATING TIMELINES WITH THE SIFT WORKSTATION

1. VISIT: http://computer-forensics11.sans.org/community/downloads 2. BOOT SIFT VM 4. CONNECT IMAGE TO THE PURPOSE OF THIS REFERENCE
$ sudo su SIFT GUIDE IS TO WALK THROUGH THE
2 4
Download: SIFT Workstation VM Appliance PROCESS OF BOOTING THE SIFT
Login: sansforensics 3 WORKSTATION, CREATING A TIMELINE
1 Plug hard drive to physical 5
Password: forensics host and attach to SIFT VM (“SUPER” OR “MICRO”) AND
Download: SIFT Workstation Installation 3. ELEVATE PRIVS
REVIEWING IT.
log2timeline PARSING PLUGINS 5. HARD DRIVE MOUNTING (if you are using log2timeline-sift and Single DD you can skip to 7-A) HOW TO CALCULATE THE OFFSET
apache2_error - Apache2 error log FOR MOUNTING
file
chrome - Chrome history file SINGLE OR SPLIT IMAGE (2 options): # mount -t ntfs -o ro,loop,show_sys_files,streams_interface=windows, 1. Run mmls to query partition layout

EWF/E01
encase_dirlisting - CSV file that is 6
exported from encase Not offset=#### /mnt/ewf/<image> /mnt/windows_mount/ # mmls image.E01
evt - Windows 2k/XP/2k3 Event Log # mount_ewf.py image.E01 /mnt/ewf Needed 2. Identify partition and byte offset
evtx - Windows Event Log File (EVTX) or For 7-A 3. (Partition byte offset) x (bytes per
exif - Metadata information from files # ewfmount image.E01 /mnt/ewf/ MOUNT TO MOUNT POINT sector) = offset #### to use!
using ExifTool Example: 63 X 512 = 32256
ff_bookmark - Firefox bookmark file
firefox2 - Firefox 2 browser history SINGLE IMAGE
firefox3 - Firefox 3 history file
ftk_dirlisting - CSV file that is Note: If needed, repeat for each
exported from FTK Imager (dirlisting) # mount -t ntfs -o ro,loop,show_sys_files,streams_interface=windows,offset=#### image.dd /mnt/windows_mount/
partition. Make new mount point:
generic_linux - Generic Linux logs that
DD

# mkdir /mnt/windows_mount2/
start with MMM DD HH:MM:SS SPLIT IMAGE (2 step process)
iehistory - index.dat file containg IE
history 6. log2timeline default timezone is set to examiner local host. To change
iis - IIS W3C log file
# affuse image.001 /mnt/aff use -z [TIMEZONE] option. To list all available timezones:
isatxt - ISA text export log file # mount –t ntfs-3g –o loop,ro,show_sys_files /mnt/aff/<image> /mnt/windows_mount/ # log2timeline -z list
jp_ntfs_change - CSV output file from
JP (NTFS Change log)
mactime - Body file in the mactime 8 7-A & 7-B
format 7-A: AUTOMATED SUPER TIMELINE CREATION 7-B: MANUAL “MICRO” TIMELINE CREATION
mcafee - Log file
mft - NTFS MFT file log2timeline-sift -o –z [TIMEZONE] -p [PARTITION #] -i [IMAGE FILE] log2timeline [OPTIONS] [-f FORMAT] [-z TIMEZONE] [-o OUTPUT MODULE] [-w HELP? OPTIONS? USAGE?
mssql_errlog - ERRORLOG file BODYFILE] LOG_FILE/LOG_DIR [--] [FORMAT FILE OPTIONS]
produced by MS SQL server log2timeline -help
ntuser - NTUSER.DAT registry file DISK IMAGE (prompt for partition, mount, and run): Log2timeline-sift -help
FILE SYSTEM METADATA (using log2timeline or fls)
opera - Opera's global history file L2t_process -help
oxml - OpenXML document pcap XP # log2timeline-sift –z EST5EDT -i image
pcap - PCAP file Parse file system data w/log2timeline from mounted file system: OTHER log2timeline
pdf - Available PDF document # log2timeline -f mft -o mactime –r -z EST5EDT -w OUTPUT FORMATS
metadata WIN7 # log2timeline-sift -win7 -z EST5EDT -i image
prefetch - Prefetch directory mft.body /mnt/volume/ Note: CSV is Default Output
recycler - Recycle bin directory OR Extract MFT from image using Sleuthkit: -BeeDocs - Mac OS X visualization tool
FOR PARTITION (mount and run using all applicable plugins): -CEF - Common Event Format - ArcSight
restore 0.9 - Restore point directory # fls -m "" -o offset –r image.dd > fls.body
safari - Safari History.plist file -CFTL - XML file- CyberForensics TimeLab
sam - SAM registry file XP # log2timeline-sift –z EST5EDT -p 0 -i partition Convert body file format to CSV format w/ mactime: visualization tool
security - SECURITY registry file # mactime –b fls.body –d > fls.csv -CSV - comma separated value file
setupapi - SetupAPI log file in -Mactime - Both older and newer version of
WIN7 # log2timeline-sift -win7 -z EST5EDT -p 0 -i partition the format supported for use by TSK's
Windows XP ARTIFACTS (run l2l on mounted file system with plugins recursively)
skype_sql - Skype database mactime
software - SOFTWARE registry file -SIMILE - XML file - SIMILE timeline
OTHER USAGE EXAMPLES: visualization widget
sol - .sol (LSO) or a Flash cookie file Extract artifacts w/ log2timeline and run on mounted file system: -SQLite - SQLite database
squid - Squid access log # log2timeline -f firefox3,chrome -o mactime –r -z EST5EDT -w
(http_emulate off) Display list of available plugins: -TLN - Tab Delimited File
web.body /mnt/volume/ -TLN - Format used by some of H Carvey
syslog - Linux Syslog log file # log2timeline -f list tools, expressed as a ASCII output
system - SYSTEM registry file Run log2timeline use -o flag to use only specific plugins: Convert body file format to CSV format w/ mactime:
tln - Body file in the TLN format -TLNX - Format used by some of H Carvey
# log2timeline-sift -o evtx,preftch –z EST5EDT -i image.dd # mactime –b log2timeline.body –d > log2timeline.csv 10 tools, expressed as a XML document
volatility - Volatility output files
(psscan2, sockscan2, ...) Help (man page): 9
win_link - Windows shortcut file (or # log2timeline-sift -h
9. FILTER TIMELINE
a link file)
wmiprov - wmiprov log file
xpfirewall - XP Firewall log 8. CSV FILE OUTPUT (/cases/timeline-output-folder) Filter timeline with date range to include only: 10. CONNECT TO SIFT
l2t_process -b timeline.csv MM-DD-YYYY..MM-DD-YYYY > filtered.csv
List plugins # log2timeline -f list -date: Date of the event, in the format of MM/DD/YYYY Filter timeline with keyword list (one term per line in keywords.txt): 1. VM -> SETTINGS -> OPTIONS -> Shared
...HELP EXPAND THIS LIST. BUILD -time: Time of day, expressed in a 24h format, HH:MM:SS Folders -> Always Enabled (Check)
PLUGINS!!! -timezone: the timezone that was used to call the tool with.
l2t_process -b timeline.csv -k keywords.txt > filtered.csv
-MACB: MACB meaning of the fields, comp w/ mactime format. What sources are in your timeline? 2. SIFT Desktop > VMware-Shared-Drive
BY DAVID NIDES (12/16/2011) -source: Source short name (i.e. registry entries are REG) awk–F , ‘{print $6;}’ timeline.csv| grep–v sourcetype|sort | uniq
TWITTER: @DAVNADS -sourcetype: Desc of the source (“Internet Explorer” instead of WEBHIST) Access from a Win Machine
-type: Timestamp type (i.e. “Last Accessed”, “Last Written”) Find all LNK files that reference E Drive
BLOG: DAVNADS.BLOGSPOT.COM -user: Username associated with the entry, if one is available. grep“Shortcut LNK” timeline.csv| grep“E:” \\SIFTWORKSTATION
EMAIL: DNIDES@KPMG.COM -host: Hostname associated with the entry, if one is available.
CREDITS TO: ED GOINGS, ROB LEE FiindMountPoints2 entries that reference E Drive 11
-short: Contains less text than the full description field.
KRISTINN GUDJONSSON, KPMG & SANS!! -desc: where majority info is stored, the actual parsed desc of the entry. grep“MountPoints2 key” timeline.csv} | grep“E drive”
QUESTIONS/FEEDBACK–CONTACT US! -version: Version number of the timestamp object. grepUSB timeline.csv| grep“SetupAPILog”
-filename: Filename with the full path that contained the entry 11. REVIEW TIMELINE
KEY -Inode: inode number of the file being parsed.
-notes: Some input modules insert additional information in the form of a File System M _____________ A ________ C______ B_____ Review timelines using:
Red text – image/source
Blue text – mount point note, which comes here. Or it can be used during the review. Ext2/3 Modified Accessed Changed N/A - Open, Soft, Filter with Excel
Purple text – output file -format: Input module name used to parse the file. FAT Written Accessed N/A Created - Import into SPLUNK
Green text – log2timeline plugins -extra: Additional information parsed is joined together and put here. NTFS File Modified Accessed MFT Modified Created - SIMILE
Brown text - TimeZone UFS Modified Accessed Changed N/A - Tapestry

Potrebbero piacerti anche