CNS 320 Week3 Lab

84
1 CNS 320 COMPUTER FORENSICS & INCIDENT RESPONSE Week 3 – Lab Copyright © 2012, John McCash. This work may be copied, modified, displayed and distributed under conditions set forth in the Creative Commons Attribution-Noncommercial License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc/2.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA.

description

lets go

Transcript of CNS 320 Week3 Lab

Page 1: CNS 320 Week3 Lab

1

CNS 320 COMPUTER FORENSICS & INCIDENT RESPONSE

Week 3 – Lab

Copyright © 2012, John McCash. This work may be copied, modified, displayed and distributed under conditions set forth in the Creative Commons Attribution-Noncommercial License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc/2.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA.

Page 2: CNS 320 Week3 Lab

For convenience, escalate to a root shell

sudo bash You should still have both images

mounted in your Linux SIFT Kit If not, refer to last week’s lab for how to

mount them back up

Page 3: CNS 320 Week3 Lab

Regripper on the Linux SIFT Kit

Page 4: CNS 320 Week3 Lab

So for example:

/usr/local/bin/rip.pl -r "/home/sansforensics/Desktop/mount_points/windows_mount/Documents and Settings/Mr. Evil/NTUSER.DAT" -f ntuser

(Quotes are necessary around file or folder paths that include spaces)

Page 5: CNS 320 Week3 Lab

reglookup-recover (One of the utilities for extracting deleted registry content)

Page 6: CNS 320 Week3 Lab

rip.pl and reglookup-recover on dblake system hive

Page 7: CNS 320 Week3 Lab

Note the complimentary information in the output

See the deleted registry service key for mdd?

That’s a physical memory acquisition tool that was run on this host before the disk image was acquired.

It installs and subsequently removes a device driver

Page 8: CNS 320 Week3 Lab

Lab #3Part 1: Registry Hive Extraction

You have the two parts of a Computer Forensics Reference Dataset image in the files ‘4Dell Latitude CPi(1).E01’ and ‘4Dell Latitude CPi(1).E01’ on your lab system. From your Windows Sift Kit VM, open this disk image in FTK Imager, and extract some of the registry hives

Examine these files using Regedit, AccessData Registry Viewer, and Regripper

8

Page 9: CNS 320 Week3 Lab

Run FTK Imager Add Evidence Item

Page 10: CNS 320 Week3 Lab

Image File

Page 11: CNS 320 Week3 Lab

Browse to First Image SegmentHit Finish

Page 12: CNS 320 Week3 Lab

First Hive to Export:NTUSER.DAT under account: Mr. Evil

Page 13: CNS 320 Week3 Lab

Right-click & select ‘Export Files`

Page 14: CNS 320 Week3 Lab

Select destination E:\Hit OK

Page 15: CNS 320 Week3 Lab
Page 16: CNS 320 Week3 Lab

Select Additional Registry Hives and export the same way

Page 17: CNS 320 Week3 Lab

Lab #2 Part 2:Registry Hive Examination with Regedit

Generally more trouble than it’s worth except on a live system. Even then, lack of date visibility is problematic

Regedit is also not read-only To examine non-native hive files,

you have to mount them, using ‘load hive’ under some other key such as HKEY_USERS

Page 18: CNS 320 Week3 Lab

Run Regedit

Page 19: CNS 320 Week3 Lab

Load Hive

Page 20: CNS 320 Week3 Lab

Select Hive File to Load

Page 21: CNS 320 Week3 Lab

Type key name to mount hive as

Page 22: CNS 320 Week3 Lab

External System hive now visible under local HKEY_USERS

Page 23: CNS 320 Week3 Lab

When finished, select hive mount point, and click ‘Unload Hive’

Page 24: CNS 320 Week3 Lab

Lab #2 Part 3: Registry Examination with AccessData Registry Viewer

Run it Click ‘No’ to run in demo mode Click Open & Select Hive File

Page 25: CNS 320 Week3 Lab

Select Hive File to Examine

Page 26: CNS 320 Week3 Lab

System in AccessData Registry Viewer

Page 27: CNS 320 Week3 Lab

Lab #2 Part 4:Registry Examination with Yaru

Run Yaru Select ‘Open Hive’ Browse to Hive File

Page 28: CNS 320 Week3 Lab
Page 29: CNS 320 Week3 Lab
Page 30: CNS 320 Week3 Lab

Yaru deleted key/value recovery example

Page 31: CNS 320 Week3 Lab

Current System Name

Page 32: CNS 320 Week3 Lab

Current Timezone Information

Page 33: CNS 320 Week3 Lab

Last System Shutdown Date/Time

Page 34: CNS 320 Week3 Lab

Lab #2 Part 5:Registry Examination with Regripper

Run Regripper Select Hive to Process Provide output filename Select Plugin File (type of registry

hive to process) Rip It (Do this for each of the Hive files we

exported)

Page 35: CNS 320 Week3 Lab

Run Regripper on Exported SAM Hive

Page 36: CNS 320 Week3 Lab

Excerpt from SAM Hive Regripper Output (1)

Username : Mr. Evil [1003] Full Name : User Comment : Account Type : Default Admin User Account Created : Thu Aug 19 23:03:54 2004 Z Last Login Date : Fri Aug 27 15:08:23 2004 Z Pwd Reset Date : Thu Aug 19 23:03:54 2004 Z Pwd Fail Date : Never Login Count : 15 --> Password does not expire --> Normal user account

Page 37: CNS 320 Week3 Lab

Excerpt from SAM Hive Regripper Output (2)

Username : Administrator [500] Full Name : User Comment : Built-in account for

administering the computer/domain Account Type : Default Admin User Account Created : Thu Aug 19 16:59:24 2004 Z Last Login Date : Never Pwd Reset Date : Thu Aug 19 17:17:29 2004 Z Pwd Fail Date : Never Login Count : 0 --> Password does not expire --> Normal user account

Page 38: CNS 320 Week3 Lab

Excerpt from SAM Hive Regripper Output (3)

Group Name : Administrators [2] LastWrite : Thu Aug 19 23:03:54 2004 Z Group Comment : Administrators have complete

and unrestricted access to the computer/domain Users : S-1-5-21-2000478354-688789844-1708537768-

1003 S-1-5-21-2000478354-688789844-1708537768-

500

Page 39: CNS 320 Week3 Lab

Lab #2 Part 6:Image Registry Autoruns Extraction

Load image using AccessData Imager

Mount image with read/write caching

Run autoruns against mounted image

Page 40: CNS 320 Week3 Lab

With Image Loaded in FTK Imager, Select ‘Image Mounting’

Page 41: CNS 320 Week3 Lab

Set Parameters

Page 42: CNS 320 Week3 Lab
Page 43: CNS 320 Week3 Lab

Run AutorunsSelect ‘Analyze Offline System’

Page 44: CNS 320 Week3 Lab

Enter Parameters for Windows folder & Mr. Evil Profile

Page 45: CNS 320 Week3 Lab
Page 46: CNS 320 Week3 Lab

Lab #1Part 5: Registry Hive Extraction

You have the two parts of a Computer Forensics Reference Dataset image in the files ‘4Dell Latitude CPi(1).E01’ and ‘4Dell Latitude CPi(1).E01’ on your lab system. From your Windows Sift Kit VM, open this disk image in FTK Imager, and extract some of the registry hives

Examine these files using Regedit, AccessData Registry Viewer, and Regripper

46

Page 47: CNS 320 Week3 Lab

Run FTK Imager Add Evidence Item

Page 48: CNS 320 Week3 Lab

Image File

Page 49: CNS 320 Week3 Lab

Browse to First Image SegmentHit Finish

Page 50: CNS 320 Week3 Lab

First Hive to Export:NTUSER.DAT under account: Mr. Evil

Page 51: CNS 320 Week3 Lab

Right-click & select ‘Export Files`

Page 52: CNS 320 Week3 Lab

Select destination E:\Hit OK

Page 53: CNS 320 Week3 Lab
Page 54: CNS 320 Week3 Lab

Select Additional Registry Hives and export the same way

Page 55: CNS 320 Week3 Lab

Lab #1 Part 6:Registry Hive Examination with Regedit

Generally more trouble than it’s worth except on a live system. Even then, lack of date visibility is problematic

Regedit is also not read-only To examine non-native hive files,

you have to mount them, using ‘load hive’ under some other key such as HKEY_USERS

Page 56: CNS 320 Week3 Lab

Run Regedit

Page 57: CNS 320 Week3 Lab

Load Hive

Page 58: CNS 320 Week3 Lab

Select Hive File to Load

Page 59: CNS 320 Week3 Lab

Type key name to mount hive as

Page 60: CNS 320 Week3 Lab

External System hive now visible under local HKEY_USERS

Page 61: CNS 320 Week3 Lab

When finished, select hive mount point, and click ‘Unload Hive’

Page 62: CNS 320 Week3 Lab

Lab #1 Part 7: Registry Examination with AccessData Registry Viewer

Run it Click ‘No’ to run in demo mode Click Open & Select Hive File

Page 63: CNS 320 Week3 Lab

Select Hive File to Examine

Page 64: CNS 320 Week3 Lab

System in AccessData Registry Viewer

Page 65: CNS 320 Week3 Lab

Lab #1 Part 8:Registry Examination with Yaru

Run Yaru Select ‘Open Hive’ Browse to Hive File

Page 66: CNS 320 Week3 Lab
Page 67: CNS 320 Week3 Lab
Page 68: CNS 320 Week3 Lab

Yaru deleted key/value recovery example

Page 69: CNS 320 Week3 Lab

Current System Name

Page 70: CNS 320 Week3 Lab

Current Timezone Information

Page 71: CNS 320 Week3 Lab

Last System Shutdown Date/Time

Page 72: CNS 320 Week3 Lab

Lab #1 Part 9:Registry Examination with Regripper

Run Regripper Select Hive to Process Provide output filename Select Plugin File (type of registry

hive to process) Rip It (Do this for each of the Hive files we

exported)

Page 73: CNS 320 Week3 Lab

Run Regripper on Exported SAM Hive

Page 74: CNS 320 Week3 Lab

Excerpt from SAM Hive Regripper Output (1)

Username : Mr. Evil [1003] Full Name : User Comment : Account Type : Default Admin User Account Created : Thu Aug 19 23:03:54 2004 Z Last Login Date : Fri Aug 27 15:08:23 2004 Z Pwd Reset Date : Thu Aug 19 23:03:54 2004 Z Pwd Fail Date : Never Login Count : 15 --> Password does not expire --> Normal user account

Page 75: CNS 320 Week3 Lab

Excerpt from SAM Hive Regripper Output (2)

Username : Administrator [500] Full Name : User Comment : Built-in account for

administering the computer/domain Account Type : Default Admin User Account Created : Thu Aug 19 16:59:24 2004 Z Last Login Date : Never Pwd Reset Date : Thu Aug 19 17:17:29 2004 Z Pwd Fail Date : Never Login Count : 0 --> Password does not expire --> Normal user account

Page 76: CNS 320 Week3 Lab

Excerpt from SAM Hive Regripper Output (3)

Group Name : Administrators [2] LastWrite : Thu Aug 19 23:03:54 2004 Z Group Comment : Administrators have complete

and unrestricted access to the computer/domain Users : S-1-5-21-2000478354-688789844-1708537768-

1003 S-1-5-21-2000478354-688789844-1708537768-

500

Page 77: CNS 320 Week3 Lab

Lab #1 Part 10:Image Registry Autoruns Extraction

Load image using AccessData Imager

Mount image with read/write caching

Run autoruns against mounted image

Page 78: CNS 320 Week3 Lab

With Image Loaded in FTK Imager, Select ‘Image Mounting’

Page 79: CNS 320 Week3 Lab

Set Parameters

Page 80: CNS 320 Week3 Lab
Page 81: CNS 320 Week3 Lab

Run AutorunsSelect ‘Analyze Offline System’

Page 82: CNS 320 Week3 Lab

Enter Parameters for Windows folder & Mr. Evil Profile

Page 83: CNS 320 Week3 Lab
Page 84: CNS 320 Week3 Lab

84

Questions?