Computer Forensics - 2
Computer Forensics - 2
GROUP 16
HARINDER SINGH CHOHAN
PRIYADHARSHAN TAMIL ARASU
RAGHAV MAHAJAN
COMPUTER FORENSICS
WINDOWS LIVE RESPONSE
Project proposal:
ABSTRACT
Windows live response for collecting and analyzing forensically sound evidence in
which that
Sometimes your victim cannot afford to remove the system or the only evidence of
duplication is impossible. This chapter will address a technique for collecting and
analyzing forensically sound evidence from what is known as the Live Incident
Response Process.
What we do?
Initially as security analyst that monitor the photograph computer screen which
record the current system time and note this against an accurate time source.
Record current system time for twice, message digest of gathered evidence using
data in a way that is legally admissible. It can be used in the detection and
found in computers and digital storage media. The goal of computer forensics is to
examine digital media in a forensically sound manner with the aim of identifying,
preserving, recovering, analyzing and presenting facts and opinions about the
digital information.
guidelines and practices of other digital evidence. It has been used in a number of
high-profile cases and is becoming widely accepted as reliable within U.S. and
of service attacks or they may hold evidence in the form of emails, internet history,
documents or other files relevant to crimes such as murder, kidnap, fraud and drug
trafficking.
It is not just the content of emails, documents and other files which may be of
interest to investigators but also the ‘metadata’ associated with those files. A
computer, when it was last edited, when it was last saved or printed and which user
* Industrial espionage
* Employment disputes
* Fraud investigations
* Forgeries
* Bankruptcy investigations
* Inappropriate email and internet use in the work place
* Regulatory compliance
GUIDELINES
For evidence to be admissible it must be reliable and not prejudicial, meaning that
A widely used and respected set of guidelines which can guide the investigator in
this area is the Association of Chief Police Officers Good Practice Guide for
Digital Evidence, or ACPO Guide for short. Although the ACPO Guide is aimed at
United Kingdom law enforcement, its main principles are applicable to all
computer forensics.
The four main principles from this guide (with references to law enforcement
1. No action should change data held on a computer or storage media which may
able to give evidence explaining the relevance and the implications of their actions.
should be able to examine those processes and achieve the same result.
4. The person in charge of the investigation has overall responsibility for ensuring
FORENSIC PROCESS
are performed on static data (i.e. acquired images) rather than "live" systems. This
is a change from early forensic practices where a lack of specialist tools led to
much has been written on the many techniques used by law enforcement in
CROSS-DRIVE ANALYSIS
A forensic technique that correlates information found on multiple hard drives. The
process, still being researched, can be used to identify social networks and to
LIVE ANALYSIS
The examination of computers from within the operating system using custom
when dealing with Encrypting File Systems, for example, where the encryption
keys may be collected and, in some instances, the logical hard drive volume may
Modern forensic software have their own tools for recovering or carving out
deleted data. Most operating systems and file systems do not always erase physical
file data, allowing investigators to reconstruct it from the physical disk sectors. File
carving involves searching for known file headers within the disk image and
STOCHASTIC FORENSICS
activities lacking digital artifacts. Its chief use is to investigate data theft.
STEGANOGRAPHY
One of the techniques used to hide data is via steganography, the process of hiding
not want to have discovered. Computer forensics professionals can fight this by
looking at the hash of the file and comparing it to the original image (if available.)
While the image appears exactly the same, the hash changes as the data changes.
VOLATILE DATA
When seizing evidence, if the machine is still active, any information stored solely
in RAM that is not recovered before powering down may be lost. One application
of "live analysis" is to recover RAM data (for example, using Microsoft's COFEE
Gateway bypasses Windows login for locked computers, allowing for the analysis
RAM can be analyzed for prior content after power loss, because the electrical
charge stored in the memory cells takes time to dissipate, an effect exploited by the
cold boot attack. The length of time that data is recoverable is increased by low
temperatures and higher cell voltages. Holding unpowered RAM below −60 °C
examination.
Some of the tools needed to extract volatile data, however, require that a computer
moves the mouse rapidly in small movements and prevents the computer from
However, one of the easiest ways to capture data is by actually saving the RAM
data to disk. Various file systems that have journaling features such as NTFS and
ReiserFS keep a large portion of the RAM data on the main storage media during
operation, and these page files can be reassembled to reconstruct what was in
DIGITAL INVESTIGATION:
It covers a broad array of subjects related to crime and security throughout the
computerized world. The primary pillar of this publication is digital evidence, with
the core qualities of provenance, integrity, and authenticity. This widely referenced
publication promotes innovations and advances in utilizing digital evidence for legal
and regulatory matters, and privacy protection. Relevant research areas include
forensic science, computer science, data science, artificial intelligence, and smart
knowledge and experiences, including current challenges and lessons learned in the
following areas:
Novel research and development in forensic science, computer science, data science,
and artificial intelligence applied to digital evidence and multimedia. New methods
analyzing digital evidence and multimedia, exploiting specific technologies, and into
CYBER-RISK MANAGEMENT:
information systems, and to perform cyber threat intelligence. The techniques and
which are vital feedback components of the security policy development process.
PRACTITIONER REPORTS:
Investigative case studies and reports describing how practitioners are dealing with
SCIENTIFIC PRACTICES:
EFFECTIVE PRACTICES:
Studies that assess new practices in digital investigations and propose effective
SURVEY PAPERS:
technology, mobile phones, memory, malware, network traffic, as well as systems that
survey, examine, analyze or present digital evidence and multimedia, deepening our
FUTURE CHALLENGES:
opportunities for criminality and/or computer security incidents, but which require
further work in order to determine how their use can be investigated and the
REGISTERED REPORTS:
Studies that assess methods critically, and evaluating the reliability, statistical power,
and reproducibility of results. Such reports can include tests and experiments with
A live response collects all the relevant data that will be used to confirm
whether an incident occurred.
The data which are retrieved while the live response consists of two main subsets:
➢ Volatile data
• Current network connections
• Running processes
• Open files
➢ Non-volatile data
• System event logs in an easily readable format in which instead of
default raw binary format.
o The live response data is collected by running a series of commands.
o Under normal circumstances, the response would be sent to the console.
o It must save the data further analysis, so it must transmit the data to your
forensics workstation to avoid overwriting the evidence on the device.
Netcat in os
windows Listening
the port
Connecting
to IP address
TCP/UDP port
listening
Md5checksum
Current network
connections
NetBIOS Name
EXECUTED Tables
Internal routing
Users log files table
Running process
Running
services
Scheduled jobs
Process memory dumps
Full System
Memory DATE STAMPS
Dumps
REGISTRY
DATA
SUSPICIOUS
FILES
LOCAL LAB BULDED: PERFORM THE FORENSICS IN WINDOWS 7 IN
VM WARE:
• Among Ncat’s vast number of features there is the ability to chain Ncats together,
redirect both TCP and UDP ports to other sites, SSL support, and proxy
connections via SOCKS4 or HTTP (CONNECT method) proxies (with optional
proxy authentication as well). Some general principles apply to most applications
and thus give you the capability of instantly adding networking support to software
that would normally never support it.
• Ncat is integrated with Nmap and is available in the standard Nmap download
packages (including source code and Linux, Windows, and Mac binaries) available
from the Nmap download page. You can also find it in our SVN source code
repository.
This section, method, or task contains steps that tell you how to modify the registry.
However, serious problems might occur if you modify the registry incorrectly.
Therefore, make sure that you follow these steps carefully. For added protection, back
up the registry before you modify it. Then, you can restore the registry if a problem
occurs. For more information about how to back up and restore the registry, click the
following article number to view the article in the Microsoft Knowledge Base:
322756 How to back up and restore the registry in Windows
3) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Terminal
Server\WinStations\RDP-Tcp\PortNumber
Ultimately, we would like to know what processes the attacker executed on JBRWWW
because they could contain backdoors or further the attacker's efforts into the victim's
network. We can list the process table with the pslist tool from the PsTools suite distributed
from http://www.sysinternals.com. Executing pslist without flags gives us the following
information:
➢ In this screen shot itself we are performing the same netstat
command to check the open connections.
It seems as if the attacker has not only iroffer on the system but a netcat session as well.
We cannot tell what the attacker is doing with the netcat session with only these two
lines. It could be an outbound connection, or it could be in listening mode, allowing
inbound connections free access to a command shell. When we reexamine the netstat
output shown earlier, we see that port 60,906 is actively listening. Therefore, we could
conclude through netcat and FPort that the attacker's backdoor on 60,906 is currently
listening for connections and is actively connected to a rogue IP address.
We neglected to mention the UDP ports in the previous section, for good reason. UDP
is typically used less than TCP because it is a stateless protocol, so UDP ports may be
un-familiar to you. One way of determining open UDP ports is to
check http://www.portsdb.org along with the analysis of a similarly configured
Windows 2000 server with IIS and basic Unix services installed. Of course, that is the
hard way of doing it. If you compare the executable files that open UDP ports with the
legitimately opened TCP ports on JBRWWW, you will see that they are opened by
similar system binaries. Of course, to truly make sure they are system binaries, we must
compare the MD5 checksum of these files with a known, trusted source such as
Microsoft or by comparing them to copies found on an uncompromised server
➢ Displaying with the open connections.
When we examine the system event logs later in this chapter, we will see that Windows
(up until version 2003) stored connection specifics by NetBIOS name rather than IP
address. As an investigator, this does us no good. An attacker can easily change his
NetBIOS name to "HACKER," do damage to your system, and then change it back to the
original value. Your logs would have the word "HACKER" as the connecting machine.
• fport reports all open TCP/IP and UDP ports and maps them to the owning
application. This is the same information you would see using the 'netstat -an'
command, but it also maps those ports to running processes with the PID,
process name and path. Fport can be used to quickly identify unknown open
ports and their associated applications.
➢ By using netstat -rn we will display the routing table and network
addresses as a number.
➢ Netstat-b Causes -i to report the total number of bytes of traffic.
It seems as if the attacker has not only iroffer on the system but a netcat session as well.
We cannot tell what the attacker is doing with the netcat session with only these two
lines. It could be an outbound connection, or it could be in listening mode, allowing
inbound connections free access to a command shell. When we reexamine the netstat
output shown earlier, we see that port 60,906 is actively listening. Therefore, we could
conclude through netcat and FPort that the attacker's backdoor on 60,906 is currently
listening for connections and is actively connected to a rogue IP address.
We neglected to mention the UDP ports in the previous section, for good reason. UDP
is typically used less than TCP because it is a stateless protocol, so UDP ports may be
un-familiar to you. One way of determining open UDP ports is to
check http://www.portsdb.org along with the analysis of a similarly configured
Windows 2000 server with IIS and basic Unix services installed. Of course, that is the
hard way of doing it. If you compare the executable files that open UDP ports with the
legitimately opened TCP ports on JBRWWW, you will see that they are opened by
similar system binaries. Of course, to truly make sure they are system binaries, we must
compare the MD5 checksum of these files with a known, trusted source such as
Microsoft or by comparing them to copies found on an uncompromised Sites.
When we examine the system event logs later in this chapter, we will see that Windows
(up until version 2003) stored connection specifics by NetBIOS name rather than IP
address. As an investigator, this does us no good. An attacker can easily change his
NetBIOS name to "HACKER," do damage to your system, and then change it back to
the original value. Your logs would have the word "HACKER" as the connecting
machine.
• The default information listed includes the time the process has
executed, the amount of time the process has executed in kernel and
user modes, and the amount of physical memory that the OS has
assigned the proces
PSLIST-M:
PSLIST –t:
• It seems that the attacker ran PSEXECSVC, which is the result of a PsExec command channel
initiated to JBRWWW. PsExec is a tool distributed from http://www.sysinternals.com that enables a valid
user to connect from one Microsoft Windows machine to another and execute a command over a
NetBIOS connection. (That could explain the connections to port 445 that we discovered in an earlier
section.) Attackers use this tool to typically run cmd.exe. Knowing that the attacker is running PsExec tells
us a lot about this intrusion. First, PsExec will only open a channel if you supply proper administrator-level
credentials. Therefore, the attacker has an administrator-level password. Second, the attacker knows one
of JBR’s passwords, and that password may work on other machines throughout JBR’s enterprise. Third,
the attacker must be running a Microsoft Windows system on his attacking machine to execute PsExec.
We also see that the attacker is running the ftp command. One of the first things attackers usually do
when they gain access to a system is to transfer their tools to the victim machine. Perhaps this process is
part of the standard hacker methodology. We also see nc, which we will find out is netcat, and iroffer, a
program we discussed previously.
The last three lines were part of our live response process, and we expected to see them. This process
list will be used again when we acquire memory dumps of the rogue processes we discovered in this
section
PSLIST -4:
To list the processes of a system, use the pslist command. This walks the
doubly-linked list pointed to by PsActiveProcessHead and shows the offset,
process name, process ID, the parent process ID, number of threads, number of
handles, and date/time when the process started and exited. As of 2.1 it also
shows the Session ID and if the process is a Wow64 process (it uses a 32 bit
address space on a 64 bit kernel).
This plugin does not detect hidden or unlinked processes (but psscan can do
that).
If you see processes with 0 threads, 0 handles, and/or a non-empty exit time,
the process may not actually still be active. For more information, see The
Missing Active in PsActiveProcessHead. Below, you'll notice regsvr32.exe has
terminated even though its still in the "active" list.
Also note the two processes System and smss.exe will not have a Session ID,
because System starts before sessions are established and smss.exe is the
session manager itself.
Tasklist
1. pstree
To view the process listing in tree form, use the pstree command. This enumerates processes
using the same technique as pslist, so it will also not show hidden or unlinked processes.
Child process are indicated using indention and periods.
2. psscan
To enumerate processes using pool tag scanning (_POOL_HEADER), use the psscan command.
This can find processes that previously terminated (inactive) and processes that have been
hidden or unlinked by a rootkit. The downside is that rootkits can still hide by overwriting the
pool tag values (though not commonly seen in the wild).
If a process has previously terminated, the Time exited field will show the exit time. If you
want to investigate a hidden process (such as displaying its DLLs), then you'll need physical
offset of the _EPROCESS object, which is shown in the far left column. Almost all process-related
plugins take a --OFFSET parameter so that you can work with hidden processes.
• Here we are showing the logon history it is used to dds a new table
which stores information about individual user logins, including a
timestamp, IP address, user agent information, and whether or not the
login was via a reset password link.
• As investigator noted the affected machine in which it contains the batch file
that are affected in driver file I had installed netcat in windows.
• Nc -l -v -p 2222 > dir txt.
• Displayed the directory and we are going to verify suspicious folder
It can be executable file and it will batch file.
Affected file in which that will run virus or trojan file.
• An executable virus is a non-resident computer virus that stores itself in
an executable file and infects other files each time the file is run. The majority
of all computer viruses are spread when a file is executed or opened
Now we have the application memory of the suspect processes, but we also want to
capture all of the system memory, which may have remnants of other intruder
processes or previous sessions. We can obtain it using a program you are probably
already familiar with—dd.
George M. Garner, Jr. has modified dd, along with several other useful utilities,
specifically for forensic investigation. Enhancements include built-in md5sum,
compression, and logging abilities, to name a few. By incorporating these frequently
used options that are normally associated with separate commands, he significantly
reduces I/O, thus increasing acquisition speed. For more information, and to download
his tools, go to his Forensic Acquisition Utilities page
at http://users.erols.com/gmgarner/forensics. Some of Garner’s utilities are based on the
UnxUtils distribution, which provides many useful GNU utilities. The UnxUtils are
available at http://unxutils.sourceforge.net.
By using the /dev/kmem file on Unix systems, we can obtain a logical view of physical
memory from a live Unix operating system. Unfortunately, Windows NT operating
systems do not provide such a file object, but Garner’s version of dd creates a
/Device/PhysicalMemory section object. A section object, also called a file-mapping
object, represents a block of memory that two or more processes can share, and it can
be mapped to a page file or other on-disk file. By mapping the
/Device/PhysicalMemory section object to virtual address space, Garner’s version of dd
enables us to generate a dump representing system memory.
During a review, the strings command revealed several pieces of information relevant
to the intrusion response.
The following are some of the commands the attacker executed during the intrusion. It
would appear that the intruder pinged himself at192.168.179.138, initiated an ipconfig
/all command, initiated an FTP session, and executed iroffer.exe.
Reference:
https://www.google.ca/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact
=8&ved=0ahUKEwjZ-
MGn3tfVAhUp04MKHfU7DRAQFggoMAA&url=https%3A%2F%2Fwww.symantec.
com%2Fconnect%2Fblogs%2Fprefetch-analysis-live-
response&usg=AFQjCNEQXhKRxXNCMdCf_srYe5cGixnEwg
https://www.google.ca/url?sa=t&rct=j&q=&esrc=s&source=web&cd=5&cad=rja&uact
=8&ved=0ahUKEwjZ-
MGn3tfVAhUp04MKHfU7DRAQFghBMAQ&url=http%3A%2F%2Fwhat-when-
how.com%2Fwindows-forensic-analysis%2Flive-response-collecting-volatile-data-
windows-forensic-analysis-part-
1%2F&usg=AFQjCNHI3qyf8dSeOJtsd0chN4_8hy0rtQ