notes_CSF1
notes_CSF1
Notes 1
includes details of who handled the evidence, when it was transferred, and
how it was stored, ensuring that the integrity of the evidence is not
compromised.
Process:
Live System Analysis: By collecting data from a live system, investigators can
detect current states like network connections or user activity that might
Notes 2
vanish once the system is shut down.
Live Response
Definition: Live response refers to actions taken while the system is still
running to analyze and mitigate threats. It involves gathering volatile data
remotely without shutting down the system, allowing investigators to capture
critical data in real time.
Steps:
Live Response Tools: These include scripts or utilities designed to run in a live
environment without altering system states. Common tools are PowerShell
scripts to retrieve event logs, process data, and network connections, and
other command-line tools for file collection and script execution.
Notes 3
Steps:
1. Gather Trusted Tools: Use trusted forensic software that has been
validated for use in investigations. These tools should be pre-tested to
confirm they don’t leave any traces or modify data.
2. Label Media: Properly label the devices used to collect evidence (e.g.,
external hard drives, USB sticks). Include the case number, date, and
investigator details to maintain proper documentation.
1. Removable Media: Data is often stored on external devices like USB drives
or external hard disks to prevent contamination of evidence on the target
system.
1. System Date and Time: Ensuring time accuracy is critical for correlating
events during an investigation.
2. Logged-in Users: Identify who was logged in at the time of the incident.
Notes 4
4. Running Processes: Capturing all running processes (using tools like
PsList) helps understand what was active during the breach.
Tools for Data Collection: Various command-line tools and utilities are used to
gather this data, such as:
Key Actions:
Memory Artifacts
Definition: Memory artifacts are traces of data stored in volatile memory
(RAM) that reveal the current state of a system, including running processes,
open files, and network connections. These are often overlooked but crucial
pieces of evidence.
Notes 5
Importance: Malware and cybercriminals often operate in memory, and by
analyzing memory artifacts, investigators can detect hidden or temporarily
active threats that don’t leave a footprint on disk.
Command Types:
1. Basic Commands: For simple forensic analysis tasks like listing files or
processes.
Limitations:
Session Limits: Only 25 live sessions can be active at a time.
File Size Limits: File transfers in live response are subject to size restrictions,
which might limit the amount of data retrievable during the session.
Notes 6
netstat , ps , w , and last to capture volatile data.
Data transmission tools like netcat (or cryptcat for secure transfers) for
sending data over networks.
Storing data on the affected system’s hard drive is a quick method, but it
risks overwriting other critical data.
Portable media ensures the isolation of collected data from the system
under investigation.
3. Manual Recording:
Notes 7
Forensic Duplication
Forensic duplication ensures a bit-by-bit mirror image of the target media,
preserving the evidence without altering or destroying potential evidence:
2. Running processes
4. Unlinked files (those marked for deletion but still active in memory)
date
Notes 8
3. Determine logged-in users using the w command to show active sessions:
ls -lt
netstat -an
ps -aux
8. Record recent connections using netstat again for historical network activity.
9. Record current system time again for timestamps to limit the window of
manipulation.
10. Record the steps taken (manual recording or using the script command).
date
Notes 9
This timestamp helps track when specific actions were taken during the
incident response.
Example:
ls -lt
These timestamps help track when files were last accessed or altered.
Notes 10
netstat -an
This lists all open ports, helping identify possible communication channels that an
attacker may use.
netstat -p
This helps determine which applications are responsible for open network
sockets, identifying potential unauthorized services.
ps -aux
This shows process IDs, users, and resources used, providing critical insight into
what is actively running on the system during the response.
netstat -an
This helps identify which systems have connected to the compromised machine,
potentially highlighting the attacker’s machine.
Notes 11
date
This ensures that any modifications to the system’s state are accurately
timestamped.
script
history
md5sum <filename>
sha256sum <filename>
LKMs are dynamically linked into the kernel after system boot, meaning they
can change the system's behavior without requiring a reboot.
To detect LKM rootkits, specialized tools like chkrootkit or rkhunter can be used.
Notes 12
Most Unix systems store their log files in /var/log . These logs provide a history of
system activities, including login attempts and system errors.
Key log files include:
These logs can be retrieved using dd and transferred securely using tools like
netcat or cryptcat .
6. crontab files: Lists scheduled tasks that could indicate malicious activity.
Notes 13