COEN 252 Computer Forensics: Incident Response
COEN 252 Computer Forensics: Incident Response
Incident Response
Incident Response
Business Continuity Planning: deals with
Outage: Due to natural disasters, electrical
failures, …
Incident Response: deals with
Adverse events that threaten security.
Incident Response
CIA related incidents:
Confidentiality
Integrity
Availability
Other Types
Reconnaissance Attacks
Repudiation
Someone takes action and denies it later on.
Incident Response
Harassment
Extortion
Pornography Traficking
Organized Crime Activity
Subversion
Bogus financial server
Hoaxes
Incident Response
Incident Response: Actions taken to
deal with an incident.
Detection
Countermeasures
Incident
Response
Rationale for
Incident Response
Abundance of Security-Related Vulnerabilities.
Availability of Attack Systems and Networks.
Actual and Potential Financial Loss
Potential for Adverse Media Exposure
Need for Efficiency
Limitations in Intrusion Detection Capabilities.
Legal Considerations
Due care.
Provisions of Law
Incident Response
Architecture
Policy
High-level description of essential elements
of information security.
Do’s and Don’ts for users and sys admins.
Sanctions for infractions.
Describes security stance of the
organization.
Sanctioning of incident response capability: IR
is a required function of inform
Incident Response
Risk Analysis
Annual Loss Expectancy (ALE)\
Quantitative
Qualitative
Incident Response
Risk Analysis
No generally accepted methodology for
assessing risks.
Criteria:
Monetary costs.
Operations impact.
Public relations fallout.
Impact on humans.
Incident Response
Risk Analysis
Risk Categories:
Break-in.
Break-in in a single system at NASA delayed a launch.
System was mission critical.
Needed to be recertified before launch.
Unauthorized execution of programs or
commands.
Privilege Escalation.
Exploitation of CGI
Web servers have frequently cgi scripts installed for
demonstration purposes.
These have known weaknesses.
Incident Response
Risk Analysis
Denial of Service attacks
Web Defacement
Virus and worm attacks
Malicious active content
Back door attacks
Spoofing
Session tampering, hijacking, replay
Incident Response
Risk Analysis
Determining Risk Probabilities
Collect data within the organization.
Collect data by other organizations.
CERT Coordinating Center
National Infrastructure Protection Center NPIC
Vulnerability Analysis
CERT, ALLDAS, ANTIONLINE
Incident Response
Methodology
Structure and Organization
Incidents create pandemonium
Incidents occur in bursts
Efficiency
Facilitates the process of responding to
incidents.
Facilitates dealing with the unexpected.
Legal Considerations.
Incident Response
Methodology
Preparation
Setting up a reasonable set of defenses
and controls based on threads.
Creating a set of procedures to deal with
the incident efficiently.
Obtaining the resources and personnel to
deal with the problem.
Establish an infrastructure to support
incident response activity.
Incident Response
Methodology
Detection
Intrusion Detection Systems
Detection Software
Reporting
Incident Response
Methodology
Containment
Strategies
Shutting down a system
Disconnect from the network
Change filtering rules of firewalls
Disabling or deleting compromised accounts
Increasing monitoring levels
Setting traps
Striking back at the attacker’s system
Adhering to containment procedures.
Record all actions
Define acceptable risks in advance
Incident Response
Methodology
Eradication: Eliminate the cause of the
incident.
Software available for most virus, worm
attacks.
Procedures are very important.
Incident Response
Methodology
Eradication in UNIX System
Check .forward for unauthorized entries
Use ps to find stray processes
.profile
Ensure that essential files are not modified /etc/profile
/etc/exports
.cshrc
.login /etc/rc directory
.logout .rhosts
/etc/hosts.equiv
at
Incident Response
Methodology
Eradication in UNIX System
amine system commands for changes
netstat
Discover real modification times for files
ls
sum
Discover suid programs
find
diff
Ensure that all password files are the same
/etc/nsswitch.conf
/etc/resolv.conf
Ensure that there are no unauthorized entries in the .rhost files
/var/spool/cron
kerb.conf Ensure that there are no unauthorized services running
Incident Response
Methodology
Eradication in UNIX System
Search for all files created or modified during the time of the attack.
Use the strings command to inspect binaries for clear text that might
indicate mischief
Incident Response
Methodology
Eradication in Window System
Ensure that the following have not been modified
All logon scripts
Security Accounts Manager (SAM) Database
The integrity of all registry keys and values below Winlogon and LSA in the registry.
Services Run entries in registry.
All .dll files
Dial-in settings
Membership in all privileged groups.
User manager for domain settings. System and user profiles.
Incident Response
Methodology
Eradication in Windows 2000
Ensure that the following have not been modified
All logon scripts
Security Accounts Manager (SAM) Database
All security options
Services
Identify constituency
Sys Ads are different than general user
population
Failure of dealing adequately with
constituency leads to long-term failure
Incident Response:
Determining / Dealing with Constituency
Failures:
Not getting back to an incident reporter.
Spreading misinformation.
Becoming too intrusive.
Causing embarrassment or leaking
information without authorization.
Betrayal.
Incident Response:
Success Metrics
Good security No incidents.
Makes success metrics difficult:
Nr. of incidents
Estimated financial loss.
Self-evaluation / questionnaires
Written or verbal reports by constituency
Average time and manpower per incident
Documentation by team members
Awards / other forms of external recognition
Incident Response:
Organization of IR Team
Training the team
Mentoring
Self-Study
Courses
Library
Exercises
Testing the team / procedure
Dealing with resistance
Budget: not a revenue source, hard to quantify impact
Management reluctance
Organizational resistance: rival organizations, turf warfare
Internal politics
User awareness
Incident Response:
Organization of IR Team
External Coordination
Law Enforcement
Media
Other Incident Response Teams
Infraguard
Managing Incidents
Bursty load: surviving the long haul
Assigning incident ownership
Tracking charts
Priorization
Incident Response:
Role of Computer Forensics
Determines policies:
Ethical boundaries of response
Legal boundaries of response
To protect right’s of insiders and outsiders
To preserve evidence as legal evidence
Rules for thorough documentation
Protect evidence against accidental or intentional
tampering / destruction
Technical Response
How to document
How to establish chain of custody
How to gather all possibly important evidence