Tool Names: 1. VISION 2. PASCO 3. GALLETA. Tool 1 VISION.

Slides:



Advertisements
Similar presentations
Intel® RPIER 3.1 User Training Joe Schwendt Steve Mancini 7/31/2006.
Advertisements

COMPUTERS: TOOLS FOR AN INFORMATION AGE Chapter 3 Operating Systems.
Forensic Analysis of Internet Explorer Activity Files Based on article by Keith J. Jones Foundstone
Computer Forensics Internet Artifacts.
CSN11121 System Administration and Forensics Web Browser Forensic
Lesson 10: Starting Windows Applications start an application program move between open application programs start an application using the Run command.
Snort & ACID. UTSA IS 6973 Computer Forensics SNORT.
Getting Started: Ansoft HFSS 8.0
Internet Artifacts Dr. John Abraham Professor UTPA.
X-Ways Trace Prepared By: Leen F. Arikat Supervisor: Dr. Lo’ai Tawalbeh.
Getting Started with Windows ® XP 1 Getting Started with Windows ® XP By Robert T. Grauer Maryann Barber.
(NHA) The Laboratory of Computer Communication and Networking Network Host Analyzer.
Information Networking Security and Assurance Lab National Chung Cheng University F.I.R.E. Forensics & Incident Response Environment.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
2004, Jei F.I.R.E. Forensics & Incident Response Environment Information Networking Security and Assurance Lab National Chung Cheng University.
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
® IBM Software Group © 2003 IBM Corporation How to Download and Install RMC 7.5 David Trent RMC Product Manager.
Operating System & Application Files BACS 371 Computer Forensics.
Simple Web SQLite Manager/Form/Report
OS and Application Files BACS 371 Computer Forensics.
Nikto LUCA ALEXANDRA ADELA. Nikto  Web server assessment tool  Written by Chris Solo and David Lodge  Released on December 27, 2001  Stable release:
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Forensic analysis of Windows hosts using UNIX-based tools Source : Digital Investigation (2004) 1, Writer : Cory Altheide Reporter : Yao Professor.
2440: 141 Web Site Administration Remote Web Server Access Tools Instructor: Enoch E. Damson.
LEARN THE QUICK AND EASY WAY! VISUAL QUICKSTART GUIDE HTML and CSS 8th Edition Chapter 2: Working with Webpage Files.
Using the “CLI” Unix / Linux Preparation Course May 25 Djibouti.
Eucalyptus Virtual Machines Running Maven, Tomcat, and Mysql.
Linux Operations and Administration
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 3 Windows File Management 1 Morrison / Wells / Ruffolo.
Software Quality Assurance 2/20 WELCOME Graphic User Interface Testing.
1 Web Server Administration Chapter 9 Extending the Web Environment.
Classroom User Training June 29, 2005 Presented by:
Session 10 Windows Platform Eng. Dina Alkhoudari.
File Recovery and Forensics
LIST OF WEB ACCESSIBILITY TOOLS GRANT MUKAI. WEB BROWSERS.
The In’s and Out’s of the IIS 6.0 Migration Tool The In’s and Out’s of the IIS 6.0 Migration Tool Chris Adams Web Platform Supportability Lead Microsoft.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
Isecur1ty training center Presented by : Eng. Mohammad Khreesha.
1 Working with MS SQL Server Textbook Chapter 14.
COEN 250 Computer Forensics Windows Life Analysis.
Lesson 2-Touring Essential Programs. Overview Development of UNIX and Linux. Commands to execute utilities. Communicating instructions to the shell. Navigating.
Setting up Cygwin Computer Organization I 1 May 2010 ©2010 McQuain Cygwin: getting the setup tool Free, almost complete UNIX environment emulation.
COEN 250 Computer Forensics Windows Life Analysis.
1 Computer Forensics Dr. Randy M. Kaplan. 2 Browser Forensics.
Chapter Eleven The X Window System. 2 Lesson A Starting and Navigating an X Window System.
Greenstone Building your own collection. Overview Installation Usage Building a collection.
Introduction to KE EMu
Using the “CLI” Unix / Linux Preparation Course June 9, 2013 Lusaka, Zambia.
Web Forensics Matthew M. Kimball.
Introduction to KE EMu Unit objectives: Introduction to Windows Use the keyboard and mouse Use the desktop Open, move and resize a.
PAYware Transact Terminal Interface Manager
FTP COMMANDS OBJECTIVES. General overview. Introduction to FTP server. Types of FTP users. FTP commands examples. FTP commands in action (example of use).
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 3 Windows File Management 1 Morrison / Wells / Ruffolo.
Don’t Duck Metadata March 2005 Introducing Setting Up a Clearinghouse Node Topic: Introduction to Setting Up a Clearinghouse Node Objective: By.
File Transfer Protocol (FTP) CIS 130. File Transfer Protocol (FTP) Copy files from one internet host (server) to your account on another host –Need domain.
Microsoft Office 2008 for Mac – Illustrated Unit D: Getting Started with Safari.
1 Working with MS SQL Server Beginning ASP.NET in C# and VB Chapter 12.
Computer Operating Systems And Software applications.
Forensic Investigation Techniques Michael Jones. Overview Purpose People Processes Michael Jones2Digital Forensic Investigations.
Proctor Caching and System Check September 4, 2014 Becky Hoeft Conference Number: (877) Conference Pin:
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
An introduction to Cygwin Lili He Booth Engineering Center for Advanced Technology (BECAT) Seminar.
Indispensable tools for research at its best RefWorks 2.0 fundamental Alan Tang
Introduction to Web programming
Chapter 3 Software Interfaces.
SNORT.
Extract and Correlate Evidences in Computer Forensics
Tivoli Common Reporting v1.2 Overview
Forensic Analysis of Internet Explorer Activity Files
Download from Zotero Home Page
Presentation transcript:

Tool Names: 1. VISION 2. PASCO 3. GALLETA

Tool 1 VISION

UTSA IS 6353 Incident Response Overview Tool Description Where You Can Find it Applicability to Forensics Tool Use/Screen Views Observations Lessons Learned

UTSA IS 6353 Incident Response Technical Description: VISION This Tool provides the following:  Shows all of the open TCP and UDP ports on a machine.  Displays the service that is active on each port.  Maps the ports to their respective applications.  Large amount of supplementary information that is useful for determining host status by displaying detailed system information, applications running, as well as processes and ports in use

UTSA IS 6353 Incident Response Where to Find the Tools Featured in the free tools. Information about Vision provided at /vision.htm /vision.htm

UTSA IS 6353 Incident Response How The Tool Supports Forensics Vision supports live analysis on a host. Vision is a Host based forensic utility. And it allows a forensic investigator to interrogate ports and identify potential “Trojan” services. This tool supports “Incident Response” more than “Forensic Analysis”.

UTSA IS 6353 Incident Response Tool Use Vision is a windows GUI based application. After launching, the application runs in the background and is located in the system tray. Interval for “Auto-Refresh” can be specified in the options. Vision can be used to log all the entries into a CSV file.

Basic Menu Screen View

UTSA IS 6353 Incident Response Observations Easy to download Easy to Install (Windows Installer and easy configuration) Free tool Easy to use navigation menus. Sub-menus can collapse and expand. A single view can represent a LOT of information.

UTSA IS 6353 Incident Response Lessons Learned Doesn’t work on Windows 98, Me Requires ‘psapi.dll’ on Windows NT. Single comprehensive tool which performs the functions of tools like ‘fport’ and ‘pstools’. CSV log file can be a good resource for future reference.

Tool 2 PASCO

UTSA IS 6353 Incident Response Technical Description of Pasco This Tool provides the following: –Command line utility that parses information in the IE activity files (index.dat). –Index.dat files are in binary form and special tools, like Pasco, are required to view them. –Pasco is built to work on multiple platforms and will execute on Windows (through Cygwin), Mac OS X,Linux, and *BSD platforms.

UTSA IS 6353 Incident Response Technical Description of Pasco –Relevant Fields in index.dat header Field Length Contains the length of the index.dat file Hash Table Offset Contains the offset (in bytes) for the beginning of the HASH table Cache Directories Contains the directories where files are stored that make up the content of the cache

UTSA IS 6353 Incident Response How Pasco Supports Forensics This Tool supports off-line analysis Allows a forensic investigator to reconstruct a subject’s web browsing habit. Provide evidentiary material for abuse of internet corporate usage policies, pornographic content, other illegal activities.

UTSA IS 6353 Incident Response Where to Find Pasco On the web –Free utility – Loaded on my directory –D:\Pasco

UTSA IS 6353 Incident Response Tool Use For Windows, must first install CYGWIN – a Linux like environment for Windows. –Cygwin can be found at Download and install Pasco from Foundstone site. Search for index.dat files on system and copy into D:\pasco\bin.

UTSA IS 6353 Incident Response Tool Use For Windows XP, index.dat file can be found at these locations or do a search: TIF Index \Documents and Settings\ \Local Setting\Temporary Internet Files\Content.IE5| Cookies Index \Documents and Setting\ \Cookies\ History Index \Documents and Settings\ \Local Settings\History\History.IE5\

UTSA IS 6353 Incident Response Tool Use Pasco Usage: pasco [options] index.dat file to be parsed > output file.txt Options: -d Undelete Activity Records -t Field Delimiter (TAB by default)

UTSA IS 6353 Incident Response Tool Use Command line –Execute default mode of Pasco $./pasco tif.dat > tif.txt (Parse the index.dat file and output result to index.txt file) –Execute undeletion mode of Pasco $./pasco –d –t, tif.dat > tifdtoptions.txt

UTSA IS 6353 Incident Response Typical command line usage of Pasco.

UTSA IS 6353 Incident Response Text file output from Pasco.

UTSA IS 6353 Incident Response Text file output from Pasco exported into spreadsheet for further analysis.

UTSA IS 6353 Incident Response Observations Easy to download –Small download – 460 Kb zipped file Easy to Install –For Windows must first install CYGWIN Simple command line use –Only two options available Can be use to parse cookies and history index.dat files as well White paper available for in-depth technical approach to Pasco development –

UTSA IS 6353 Incident Response Lessons Learned Works better when index.dat file is copied into wherever Pasco directory is located. Run both default and undeletion mode to make sure no entries are missed.

Tool 3 GALLETA

UTSA IS 6353 Incident Response Technical Description: Galleta Galleta provides the following: –Internet Cookie analysis utility Parses the contents of a Windows cookie file and outputs the result to a tab delimited file –Small download (<500Kb) –Requires CYGWIN to run UNIX Bash Shell

UTSA IS 6353 Incident Response Where to Find the Tools CYGWIN installs to the root directory – –Large download (6.5MB) –Install from Internet Galleta installs in Program Files directory or wherever you put it – lleta.htmlwww.foundstone.com/resources/proddesc/ga lleta.html

UTSA IS 6353 Incident Response How The Tool Supports Forensics Galleta supports off-line analysis –Tedious, cumbersome Recovers the contents of a single Internet cookie file Allows the investigator to categorize and/or sort cookies within Excel

UTSA IS 6353 Incident Response Tool Use Start CYGWIN –START  All Programs  CYGWIN  CYGWIN Bash Shell Change directories to the location where the Internet cookies are –Put the Galleta executable file in this same directory From the UNIX prompt in CYGWIN type: –./galleta cookiename.txt > newname.txt

UTSA IS 6353 Incident Response

Observations Easy to download Easy to Install Command line use was cryptic depending on level of experience No Help support Don’t forget to download CYGWIN Very labor intensive

UTSA IS 6353 Incident Response Lessons Learned Watch out for location of Galleta executable UNIX tool that works in Windows via CYGWIN Best used in conjunction with string search utility (Pasco) to isolate questionable cookies