Windows Forensics: Dr. Phil Polstra @ppolstra PHD, Cissp, Ceh
Windows Forensics: Dr. Phil Polstra @ppolstra PHD, Cissp, Ceh
Windows Forensics: Dr. Phil Polstra @ppolstra PHD, Cissp, Ceh
©SecurityTube.net
Course Contents
Live Response
●
Human interactions
●
Creating a live response kit
●
Transporting data across a network
●
Collecting volatile data
●
Determining if dead analysis is justified
●
Dumping RAM
©SecurityTube.net
Course Contents (cont.)
Acquiring filesystem images
●
Using dd
●
Using dcfldd & dc3dd
●
Write blocking
●
Software blockers
●
Udev rules
●
Forensic Linux distros
●
Hardware blockers
©SecurityTube.net
Course Contents (cont.)
Analyzing filesystems
●
Mounting image files
●
Finding the strange
●
Searching tools
●
Authentication related files
●
Recovering deleted files
●
Finding hidden information
©SecurityTube.net
Course Contents (cont.)
The Sleuth Kit (TSK) and Autopsy
●
Volume information
●
Filesystem information
●
FAT 12/16/32
●
NTFS
●
Directory entries
●
Constructing timelines
©SecurityTube.net
Course Contents (cont.)
Timeline Analysis
●
When was system installed, upgraded,
booted, etc.
●
Newly created files (malware)
●
Changed files (trojans)
●
Files in the wrong place (exfiltration)
©SecurityTube.net
Course Contents (cont.)
Digging deeper into Windows filesystems
●
Disk editors
●
Active@ Disk Editor
●
Autopsy
●
FAT 12/16/32
●
NTFS
●
Searching unallocated space
©SecurityTube.net
Course Contents (cont.)
Network forensics
●
Using snort on packet captures
●
Using tcpstat
●
Seperating conversations with tcpflow
●
Tracing backdoors with tcpflow
©SecurityTube.net
Course Contents (cont.)
File forensics Unknown files
●
Using file signatures
●
Comparing hashes to
●
Searching through know values
swap space ●
File and strings
●
Web browsing commands
reconstruction ●
Log files
●
Cookies ●
Recycle bin
●
Search history ●
Prefetch files
●
Browser caches ●
Alternate data streams
©SecurityTube.net
Course Contents (cont.)
Registry forensics ●
Past & present
●
RegRipper mounted devices
●
Python ●
User activity
●
System information ●
System restore
●
Autostart programs points
●
USB Devices
●
User info
©SecurityTube.net
Course Contents (cont.)
Memory Forensics
●
Retrieving process information
●
Windows objects
●
Looking for malware
●
Event logs
●
Registry in memory
●
Reconstructing network artifacts
●
Windows services
●
Windows GUI
●
Filesystems in memory
●
Detecting kernel rootkits
●
Creating timelines
©SecurityTube.net
Course Contents (cont.)
Reversing Windows ●
Command line analysis
Malware tools
●
Windows executables
●
strings
●
Headers ●
Running malware
●
Imports (carefully)
●
Exports
●
Virtual machine setup
●
Capturing network
●
Resources
traffic
●
Obfuscation ●
Leveraging debuggers
●
Dynamic linking
©SecurityTube.net
Course Contents (cont.)
Writing the reports
●
Autopsy
●
Dradis
●
OpenOffice
©SecurityTube.net
Overall Goals
●
Leverage open source (or at least free)
software
●
Hands on practical exercises and demos
throughout
●
Provide the most comprehensive
Windows forensics course available
©SecurityTube.net