Skip to content

Lucho-A/Auditing-Forensic

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

42 Commits
 
 

Repository files navigation

Auditing-Forensic

The main idea of the repo is, simply, provide an essential set of tools for carrying out an starter forensic activity in line with the RFC 3227: "Guidelines for Evidence Collection and Archiving"

For this purpose, when OS system particularities arise, I'll cover AIX/Linux and Windows system, only, and the software referred will be, in all the cases, free ones.

Finally, as we already know, one thing is obtain the information and, other, interpretate it and obtaining particular conclusions. The idea of the repo is covering, essentially, regardless of technical aspects, just the first part. For deeper and more exahustive analysis, in particular, about memory and Volatility framework, I recommend the reading of "The Art of Memory Forensics".

Let's start

According to the RFC, some of the most important aspects to take into consideration are:

  • make a bit-level copy of the system's media to be audited.
  • do it, taking into consideration the volatility order.

In this regard, I'll cover: RAM and Hard Disk1, in this order.

1In this context, the term "hard disk" means any device that can keep storaged the information for a long period of time (HDD/SSD/USB, etc.).

Image creation

Referred to this topic, is for pointing out that is recommended not to save the images created into the same system. Instead, as good practice, save the images in a different partition than the system under revision, and the system that you are using for performing the analysis. For instance: if you are analyzing a plausible malware infected windows system from a Kali USB device, it's recommendable store the images in a third, let' say, USB device that operate like a sand box.

"RAM"

For performming RAM images, I could recommend:

Linux/AIX:

  • LiME. Due to its simplicity, and the probed compatibility with Volatility, this is my first option. It's an LKM, and its usage is very well descripted into the repo. For instance:
git clone https://github.com/504ensicsLabs/LiME
cd src/
make
sudo insmod lime-X.XX-XX.ko "path=/home/userId/.../.../dumpRAM.lime format=lime"
  • fmem. This is other great software that load a module into the kernel in order to allow the creation of a device (/dev/fmem) that can be used for dumping the memory with, for instance, 'dd' command. Into the README file of the fmem repo, you can find the way of usage.

Note: if you run the 'dd' command for dumping the memory, take into consideration the use of count parameter. Indeed, if not, as is mentioned in the fmem repo, the dumping could never stop or, even worst, a segmentation fault can arise. So, I recommend you using 1MB as bs, and the sum of the sizes displayed by 'fmem' command after loaded as count.

Win32/64:

  • winpmem. Other very simple tool for creating RAM images. Just:
winpmem_mini_x64_rc2 [path_to_outputImage.raw]

... and that's all.

"Hard Disks"

In this case, I recommend just using 'dd' command. Remember creating images for the entire filesystem involved (including different partitions, and USB's devices). If you are running an AIX/Linux machine, for sure, you already have it, but if you are running a Windows system, maybe you need to download it. Here you can find it.

Example of usage for an USB device:

Linux/AIX1:

sudo dd.exe if=/dev/sdc1 of=path_to_outputImage.dd bs=4M

Win32/64:

dd.exe if=\\.\G: of=path_to_outputImage.dd bs=4M
1 remember, you can find the USB devices loaded by using the 'lsusb' command, and/or the partitions using 'fdisk -l'.

Next steps. Analizing Data.

Now, we are ready for analyzing the created images.

"RAM"

In order to analyze the RAM image, I'll show you the usage of the well-known software Volatility. The software can be downloaded from its website. You can find the standalone versions (2.6) for Linux and Windows. However, I encourage you to obtain the latest version cloning the repo:

git clone https://github.com/volatilityfoundation/volatility

Some useful queries

Maybe, the first "query" that you can run, in order to obtain suggestions about the image is:

python2 vol.py -f imageRAM.lime imageinfo

However, this query takes too long and if you already know the OS associated with the image, maybe you want to skip this query and search for a profile according to the OS, for instance:

python2 vol.py --info | grep Linux

As you can observe, running --info query, is that there are generics profiles. It's highly recommended to make a particular one, according to the version of the kernel associated to the image. It's very simple, I'll add the way to do it in future versions of the document. However, the generic profiles works pretty well for obtaining useful information.

Now, let's suppose that the image correspond to a linux, so you could use the generic profile called "LinuxSystemProfilex64".

  • linux_pslist: in order to list the processes, you can use this "plugin" (you can access to the plugin list by running the program with parameter "--info":
python2 vol.py -f imageRAM.lime --profile=LinuxSystemProfilex64 linux_pslist

Note: if you run the command, you can see that in the field "Start Time" the UTC used for showing the information. This is very aligned with the contents of the RFC 3227, section 2.

  • linux_netstat, for showing opened sockets:
python2 vol.py -f imageRAM.lime --profile=LinuxSystemProfilex64 linux_netstat
  • linux_ifconfig, for showing active interfaces:
python2 vol.py -f imageRAM.lime --profile=LinuxSystemProfilex64 linux_ifconfig
  • linux_malfind, for showing suspicious processes:
python2 vol.py -f imageRAM.lime --profile=LinuxSystemProfilex64 linux_malfind

These are just some examples. The list of plugins is very extensive and you can develope your own ones if you want (the web is plenty of site where you can find useful information about it and how to do it).

It remains to say that for Win32/64 is the same. Taking about Windows, let me tell you that into the book I recommended (more precisely, page 118), you can find very well described a list of objects and structures that you can find interestings at the moment of analysing an image.

Summarizing: with python (v2 preferred) installed, you clone the Volatility repo, find the info of the image with "imageinfo" option (if you don't know the OS spec of the image or if you want to document the process for working-papers or evidence recording), find the most appropriate "profile" (even better, create your own1), and starting the analysis by using the plugins.

1 keep in mind the recommendation of profiles generation in thirds devices and avoid the information processing in the device to be audited.

"Hard Disks"

In this case, I'll cover the subject using the software Autopsy. This soft is pretty simple to use, and is very aligned to forensic formal procedures. Moreover, it allows you to create "Cases" when you start an investigation allowing the incorporation of useful information in order to keep well-documented the revision.

The interface is, let say, very auto-descriptive and, among its features, you can find filters of any type making easier the obtaining of useful information, for instance:

  • OS Users
  • Emails
  • Deleted files
  • File sizes & types filters, among others.

Others nice features are:

  • Geolocation: in case that files have incoporated geolocation information, you can track it.
  • Timeline: you can show the "evolution" of files in the time.

Anyway, that's all folks! (at least, for now... hhaha). I hope you've found useful the contents of this repo. Any suggestion, comments, or whatever hhahah, just let me know! (luis.alfie@gmail.com)

About

Essential set of tools for carrying out a forensic activity in line with the RFC 3227: "Guidelines for Evidence Collection and Archiving".

Topics

Resources

Stars

Watchers

Forks