Information Networking Security and Assurance Lab National Chung Cheng University Live Data Collection from Unix Systems.

Slides:



Advertisements
Similar presentations
COEN 250 Computer Forensics Unix System Life Response.
Advertisements

2-UNIX L IVE R ESPONSE John P. Abraham Professor University of Texas Pan American.
Chapter One The Essence of UNIX.
Lesson 10-Controlling User Processes. Overview Managing and processing processes. Managing jobs. Exiting/quitting when jobs have been stopped.
Unix Refresher This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added material. Dr. Stephen.
COEN 250 Computer Forensics Windows Life Analysis.
Information Networking Security and Assurance Lab National Chung Cheng University Investigating Hacker Tools.
Introduction to Unix (CA263) File System
Exploring the UNIX File System and File Security
Introducing the Command Line CMSC 121 Introduction to UNIX Much of the material in these slides was taken from Dan Hood’s CMSC 121 Lecture Notes.
1 Case Study 1: UNIX and LINUX Chapter History of unix 10.2 Overview of unix 10.3 Processes in unix 10.4 Memory management in unix 10.5 Input/output.
2004, Jei Tripwire An Intrusion Detection Tool Information Networking Security and Assurance Lab National Chung Cheng University.
Information Networking Security and Assurance Lab National Chung Cheng University Nessus A Vulnerability Assessment tool A Security Scanner Information.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Host-Based Intrusion Detection software TRIPWIRE & MD5.
Information Networking Security and Assurance Lab National Chung Cheng University F.I.R.E. Forensics & Incident Response Environment.
Jai, 2004 Incident Response & Computer Forensics Chapter 5 Live Data Collection from Windows System Information Networking Security and Assurance Lab National.
Jai, 2004 Incident Response & Computer Forensics Chapter 6 Live Data Collection from Unix Systems Information Networking Security and Assurance Lab National.
Information Networking Security and Assurance Lab National Chung Cheng University 2004/03/031 A Real World Attack: wu-ftp Cao er kai ( 曹爾凱 )
Guide To UNIX Using Linux Third Edition
Guide To UNIX Using Linux Third Edition
Guide To UNIX Using Linux Third Edition
Information Networking Security and Assurance Lab National Chung Cheng University Live Data Collection from Windows System.
Information Networking Security and Assurance Lab National Chung Cheng University Investigating Unix System.
2004, Jei F.I.R.E. Forensics & Incident Response Environment Information Networking Security and Assurance Lab National Chung Cheng University.
Chapter 3 Unix Overview. Figure 3.1 Unix file system.
File System and Directory Structure in Linux. What is File System In a computer, a file system is the way in which files are named and where they are.
Sydney Opera House. Week Three Agenda Administrative Issues Link of the week Review week two lab assignment This week’s expected outcomes Next lab assignment.
Guide To UNIX Using Linux Fourth Edition
Overview of Linux CS3530 Spring 2014 Dr. José M. Garrido Department of Computer Science.
Lesson 7-Creating and Changing Directories. Overview Using directories to create order. Managing files in directories. Using pathnames to manage files.
Hands-On Virtual Computing
Introduction to Unix/Linux Chapter One The Essence of UNIX.
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
File Recovery and Forensics
CT 320 Midterm Study Guide.
Live Forensics Investigations Computer Forensics 2013.
Module 7: Fundamentals of Administering Windows Server 2008.
COEN 250 Computer Forensics Windows Life Analysis.
Guide to Linux Installation and Administration, 2e1 Chapter 10 Managing System Resources.
Chapter Two Exploring the UNIX File System and File Security.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 3: Operating-System Structures System Components Operating System Services.
Lesson 9-Setting and Using Permissions. Overview Describing file permissions. Using execute permissions with a file. Changing file permissions using mnemonics.
Linux Administration. Pre-Install Different distributions –Redhat, Caldera, mandrake, SuSE, FreeBSD Redhat Server Install –Check HCL –Significant issues.
Lesson 2-Touring Essential Programs. Overview Development of UNIX and Linux. Commands to execute utilities. Communicating instructions to the shell. Navigating.
Hands On UNIX II Dorcas Muthoni. Processes A running instance of a program is called a "process" Identified by a numeric process id (pid)‏  unique while.
Unix Security.  Security architecture  File system and user accounts  Integrity management  Auditing and intrusion detection.
Lecture 15: UNIX Forensics 6/25/2003 CSCE 590 Summer 2003.
Core System Services. INIT Daemon The init process is the patron of all processes. first process that gets started in any Linux/ UNIX -based system.
COEN 250 Computer Forensics Windows Life Analysis.
1 LINUX SECURITY. 2 Outline Introduction Introduction - UNIX file permission - UNIX file permission - SUID / SGID - SUID / SGID - File attributes - File.
CSI3131 – Lab 1 Observing Process Behaviour. Running Linux under Virtual PC  Start Virtual PC  This Windows program provides a virtual machine to run.
Λειτουργικά Συστήματα - Lab1 Γιάννης Πετράκης. The Operating System  Unix is a layered operating system  The innermost layer is the hardware that provides.
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
Lesson 3-Touring Utilities and System Features. Overview Employing fundamental utilities. Linux terminal sessions. Managing input and output. Using special.
COEN 250 Computer Forensics Unix System Life Response.
ACCESS CONTROL. Components of a Process  Address space  Set of data structures within the kernel - process’s address space map - current status - execution.
Lecture 02 File and File system. Topics Describe the layout of a Linux file system Display and set paths Describe the most important files, including.
Chapter 7 Live Data Collection Spring Incident Response & Computer Forensics.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Getting Started with Linux
Overview of Linux Fall 2016 Dr. Donghyun Kim
UBUNTU INSTALLATION
UNIX Introduction History Main Features UNIX Operating System
Overview of Unix Jagdish S. Gangolly School of Business
Exploring the UNIX File System and File Security
I have edited and added material.
Shells, Help, and Paths.
Rootkits Jonathan Hobbs.
UNIX Introduction.
Linux and TCP/IP Networking
Presentation transcript:

Information Networking Security and Assurance Lab National Chung Cheng University Live Data Collection from Unix Systems

Information Networking Security and Assurance Lab National Chung Cheng University 2 Outline Preface Obtaining Volatile Data Prior to Forensic Duplication Performing an In-Depth, Live Response /proc File System

Information Networking Security and Assurance Lab National Chung Cheng University 3 Outline Preface Obtaining Volatile Data Prior to Forensic Duplication Performing an In-Depth, Live Response /proc File System

Information Networking Security and Assurance Lab National Chung Cheng University 4 Preface Many Unix versions are not backward or forward compatible Four storage options  Local hard drive  Remote media such as floppy disks, USB drives, or tape drives  Hand  Forensic workstation over the network Best time  All are not online

Information Networking Security and Assurance Lab National Chung Cheng University 5 Outline Preface Obtaining Volatile Data Prior to Forensic Duplication Performing an In-Depth, Live Response /proc File System

Information Networking Security and Assurance Lab National Chung Cheng University 6 The minimum information System date and time A list of the users who are currently logged on Time/Date stamps for the entire file system A list of currently running processes A list of currently open sockets The applications listening on open sockets A list of the systems that have current or recent connections to the system

Information Networking Security and Assurance Lab National Chung Cheng University 7 Follow these steps Execute a trusted shell Record the system time and date Determine who is logged on to the system Record modification, creation, and access times of all files Determine open ports List applications associated with open ports Determine the running processes List current and recent connections Record the system time Record the steps taken Record cryptographic checksums

Information Networking Security and Assurance Lab National Chung Cheng University 8 Executing a trusted shell Avoid to log-in with X-window Set-up your PATH equal to dot (.)

Information Networking Security and Assurance Lab National Chung Cheng University 9 Recording the system Time and Date This is command

Information Networking Security and Assurance Lab National Chung Cheng University 10 Who? command control terminal ttyn: logon at the console ptsn: over the network The local starting time of the connection The time used by all processes attached to that console The processor time used by the current process under the WHAT column

Information Networking Security and Assurance Lab National Chung Cheng University 11 Recording file Modification, Access, and Inode Change Times Access time (atime) Modification time (mtime) Inode change time (ctime)

Information Networking Security and Assurance Lab National Chung Cheng University 12 Access Time $man ls

Information Networking Security and Assurance Lab National Chung Cheng University 13 Inode Change Time Inode change time $man ls

Information Networking Security and Assurance Lab National Chung Cheng University 14 Modification Time Modification time

Information Networking Security and Assurance Lab National Chung Cheng University 15 Determine which Ports are Open Command

Information Networking Security and Assurance Lab National Chung Cheng University 16 Applications associated with Open Ports Command You must be root!!!! PID/Program name

Information Networking Security and Assurance Lab National Chung Cheng University 17 Applications associated with Open Ports In some other Unix-Like OS List all running processes and the file descriptors they have open

Information Networking Security and Assurance Lab National Chung Cheng University 18 Determine the Running Processes Command Indicate when a process began

Information Networking Security and Assurance Lab National Chung Cheng University 19 Recording the Steps Taken Command The file that log the keystrokes you type and output!! Another command: history

Information Networking Security and Assurance Lab National Chung Cheng University 20 Outline Preface Obtaining Volatile Data Prior to Forensic Duplication Performing an In-Depth, Live Response /proc File System

Information Networking Security and Assurance Lab National Chung Cheng University 21 The files you want to collect The log files The configuration file The other relevant file

Information Networking Security and Assurance Lab National Chung Cheng University 22 Loadable Kernel Module Rootkits Rootkits  Collections of commonly trojaned system processes and scripts that automate many of the actions attackers want to do!!! LKMs are programs that can be dynamically linked into the kernel after the system has booted up

Information Networking Security and Assurance Lab National Chung Cheng University 23 Loadable Kernel Module Rootkits Rogue LKMs can lie about the results LKM rootkits  knark  adore  heroin When the LKM is installed, the attacker simply sends a signal 31 (kill -31) to the process she wants to hide

Information Networking Security and Assurance Lab National Chung Cheng University 24 The important logs you must collect!! Binary log files  The utmp file, accessed with the w utility  The wtmp file, accessed with the last suility  The lastlog file, accessed with the lastlog utility  Process accounting logs, accessed with the lastcomm utility

Information Networking Security and Assurance Lab National Chung Cheng University 25 The important logs you must collect!! ASCII text log files  Web access logs  Xferlog (ftp log)  History log

Information Networking Security and Assurance Lab National Chung Cheng University 26 The important configuration files you want to collect!! /etc/passwd /etc/shadow /etc/group /etc/hosts /etc/hosts.equic ~/.rhosts /etc/hosts.allow and /etc/hosts.deny /etc/syslog.conf /etc/rc crontab files /etc/inetd.conf and /etc/xinetd.conf

Information Networking Security and Assurance Lab National Chung Cheng University 27 Discovering illicit sniffers on Unix Systems Most Dangerous  More widespread than a single system  Have root-level access

Information Networking Security and Assurance Lab National Chung Cheng University 28 Discovering illicit sniffers on Unix Systems No sniffers Sniffers on your system

Information Networking Security and Assurance Lab National Chung Cheng University 29 Outline Preface Obtaining Volatile Data Prior to Forensic Duplication Performing an In-Depth, Live Response /proc File System

Information Networking Security and Assurance Lab National Chung Cheng University 30 What? Pseudo-file system  An interface to kernel data structure Each process has a subdirectory in /proc that corresponds to it’s PID

Information Networking Security and Assurance Lab National Chung Cheng University 31 Example Start a executed file PID Go into the subdirectory The command you executed

Information Networking Security and Assurance Lab National Chung Cheng University 32 The fd subdirectories Standard Input Standard Output Standard Error The file descriptor opened The file descriptor that socket opened Another socket example!!

Information Networking Security and Assurance Lab National Chung Cheng University 33 Dump System Ram Two files your should collect  /proc/kmem  /proc/kcore

Information Networking Security and Assurance Lab National Chung Cheng University 34 A tech you can use!!!!! The command line is changed at runtime! Two parameter  argc An integer representing in the argv[] array  argv An array of string values that represent the command-line argument

Information Networking Security and Assurance Lab National Chung Cheng University 35 Example tcpdump –x –v –n  argv[0] = tcpdump  argv[1] = -x  argv[2] = -v  argv[3] = -n strcpy(argv[0], “xterm”)

Information Networking Security and Assurance Lab National Chung Cheng University 36 Example 2 The two parameter!

Information Networking Security and Assurance Lab National Chung Cheng University 37 Example 2 The tech you want to learn!!

Information Networking Security and Assurance Lab National Chung Cheng University 38 Example 2 Succeed ^_^