Incident Response Kits Introduction

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

52 minutes
Video Transcription
Hello, My name's David and welcome to pre incident response
you're moving alone on. And we have looked at the incident response process
we talked about which primarily I should say. Primarily we talked about
which two standards or the incident response process?
Yes, very good Sands and
missed. Yes. Now
they aren't the only two. Of course, there are other standards out there that you can refer to, but Sands and Nest there are pretty well known, pretty heavily relied appointing use when it comes to the response process.
Now, part of the process is preparation. Now, as we move here in the Module three, where we thought about instant response kids
that's going to fall more in line with preparation. However, it is also going to come in tow line with detection, containment, recovery on analysis, because what you're going to do with these kits is gather evidence for analysis,
analyze that evidence and then crack your recovery process around what you learn from that. So
the kids kind of
move across the spectrum of the incident response process. They're a vital part of it that I gave you a task of going out into the yard and chopping down a tree.
One of the first things that you're going to do is say, well, what tool am I going used to talk street out?
If you say it spoon,
it's obvious that you're in the wrong career.
If you say
an axe,
Congratulations, you're you're a little closer. It can get the job done. It's a little more labor intensive than, say, a chains. All would be.
You can see the same process picking your tools to help you in your job dollars through from
a physical job, like chopping a tree into the cyber world.
These tools and these kids are essential.
They are what you're going to use to do your job. Of course,
um, the right tools
help you do your job faster. Easier.
But in order to pick those tools, you need to keep the job. Focus. Which kind of Parker's back to the entire preparation stage of the incident response process? I'm going to give you a short example for my own life is in its response.
Ah, analyst toe hopefully share a mistake or my can't really say it's a state, but I was definitely un prepared for this scenario when I walked into it,
I was working my own business as a penetration tester and cyber security consultant.
I was contacted by local businesses. Said, Hey, we have an issue. Hopefully, you can help us. Sure. Much problem.
Well, we host one pages for a wide variety of customers, and we discovered that several of those Web pages happened based
buying attacker. And we need somebody to come in and help us do the incident response so that we can assure, but our customers on ourselves that nothing else happened. It was just a Web page to basement campaign and they didn't get into our network. Hey, great,
fantastic. I'll be happy. Help! I'll be there whatever time you need to be seven meeting. Go ahead, sit down with Brooke Customer. His IittIe staff were discussing the issue, so I began to ask questions pertinent to my function. Which was the incident? Respond or
position? So I asked first and foremost what you use. What kind of operating systems are your environment?
They said Matt,
In the end, he said, No, just Matt.
Oh, I said, How about your service? We use Apple service,
Instantaneous problem,
because I had very little experience in conducting forensic. So Max, even knowing how an Apple server was set up, operate the all systems were involved in any kind of hardware I might have needed in order to conduct imaging or forensic imaging. And that kind of thing has zero
of that.
So, as you see, I kind of stumbled into a position
liability because without those tools and without that knowledge, I wasn't going to be able to provide them with the best
incident response analysis that he needed Now, fortunately, I was able to gather logs from the servers there Patty logs and Web server logs, firewall logs.
And what do those on and discover that there have actually been there deeper penetration that way. So there was no other need for forensics. Ernie, I got to come into black. However, that kind of highlights the need for youto have tool kit set up adequately in order to deal with whatever problem you might
space, which leads us to our first bullet on this slide is know your environment.
I'm working as a consultant or 1/3 party. That's kind of difficult for you to do. Uh, if you're gonna do that just by yourself for starting your own small company. It's a big investment. You'll you'll see that some of these tools are rather
costly. But you can't skip on that, because if you do your clients or something,
remember the preparation stage. Survey your environment. See what you might need. What think could come into play and get it. So you have it on hand.
Um, ask. You know, potential clients. What kind of operating systems to use? What kind of network hardware do you have? What programs do you rely a lot? Just 3 65 Email, huh?
Hey, it's cloud based. What knowledge do I have about conducting forensics in the cloud? Do I know Office 3 65 cannot conduct since that response in that program? These were things that you need to be building your knowledge and technical expertise sense so you could have the right tools.
Asked what kind of threats are facing, financial institutions face different threats than, say, medical institutions. Your doctor's offices
there are also governed by different regulatory body, so you need to know what regulatory body is going to want to know so that you have tools and the ability to be able to provide that knowledge regarding any incidents that you may investigate for you.
Point of set sail machines have been big cards and restaurants.
Another quick case study after I retired from law enforcement, I still continue to do vulnerability scans, penetration, testing. And
I went is, ah, local credit union was talking to one system managers, and they started telling me about credit card breach at a local restaurant
and how our local criminal investigators were going out to interview please, because breach find out who was stealing great for data. I had just read a Brian Krebs article saying that this particular restaurant brand tag suffered a breach nationwide and it wasn't a local problem.
Contacted law enforcement shared that knowledge with them and with credit unions that I worked with, had managed to avoid a huge block, overblown criminal investigation into our local teenage restaurant. Who eats that?
Be prepared, uh,
always be expanding your knowledge and know how to respond to brand somewhere. For example, um,
you'll be able to help your customers your clients to recover from Ransomware, of course, is mostly preparation, but what your crypt. Reserve it.
You have access to them. You have the ability to conduct forensics on a partially encrypted computer to help them re mediate. Problem.
All these things come into play when you're picking and choosing your tool kit.
Look over reports like this one from CNN's, which was, ah, white paper put out about their its response, surveyed 2000 King
Ah, and identify different areas that you may face a CZ, an incident response analyst and craft your tool kit around these kinds of incidents so that you are ready and able to respond to them if they come. For instance, some places have mostly
smartphones and tablets in their environment, so you need a whole different
physical token in order to be able to deal with them. Now they're two methods of approach to this, the first software. You have to be able to handle a wide variety of software along with conducting network. So keep that in mind. And then there's hardware,
which in our next episode I'll be showing you some examples of different kinds of arbor to kids that you can purchase and by, uh, they're very hardware specific. For instance, cell phones come in a wide variety of different formats and with different connectors. So you need to have a good tool kit to handle that
as well as your network and Versace
network versus host based. You may need a network tap. You may need a switch to you, maybe germ router hook into the network in order to conduct package captures to watch network traffic, etcetera, etcetera, etcetera. In order to be able to help your client. Now for software,
there's a lot of different forensic software is. After that, you could turn to to you sip this morning example, which is a screen capture.
There's in case there's F K. There's autopsy. I'll give you a look in a couple of those as well in one of our future episodes that you can see what's available and start building your own knowledge Base
wire. Shark Network. Minor ex ways. Ah, whole host of different kinds of software that you as an incident responders need to be familiar with, and it worked.
How do you choose?
I want a budget
Areas of interest is the criminal case. Are they in turn, um, internal investigations or any legal liability involved with it?
Uh, your own skill set and familiarity with the tools come into play as well. Don't buy the boat without the yours. If you do, you'll be stuck out there in the middle of the ocean and unable to return to shore.
You have any questions on the answer response Kid Intro Here. Reach out to me on Cyberia, baby 135 would be happy to talk to you.
Up Next
Incident Response Planning

In Incident Response Planning, David Biser describes the different aspects to consider when creating and implementing an incident response plan. These different aspects act as tools that help an organization create a thorough incident response plan.

Instructed By