Incident Response Kits Software

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

52 minutes
Video Transcription
Hello, My name's David and welcome to pre incident Response.
We have been talking about instant response kids. And when we look at hardware in our last episode, we looked at a lot of different kits and configurations on the documentation For the course, you'll be able to go out to some different websites to look at some
pricing on some of these items
in forensics incident response. Some of the tools of free some little Zahra pay,
so you gotta balance it with your budget. Happier working for a company, of course, you need to be able to make business justification for purchasing your instant response kit. And so she 80 aid materials with it. If you're gonna try to start your own consultancy, then you're gonna have to invest your money very wisely
because these things can rapidly get very expensive as you move along.
Now, we looked at hardware, so I do want us to spend a little bit of time together looking at some software
because software again is a very important part of incident response and doing
a good job.
So you need to be prepared again in order to know what software unique it's based on a lot of different issues within the environment. Remember back to my story that I told you when I walk into a client site?
Yeah, sort of pre supposing that I was gonna be dealing with Windows Lennox about that. It was an apple shop entirely, so I wouldn't have needed to a purchase. Different kinds of forensic materials in order to burst Forensic software, not here. Knows something more specific in mind. Burbage there.
Ah, in order to image and analyze the apple
system files. So you have to take that into account. Is that the network based investigation? Then you may need Swire sharp insult. Or you may need network minor war. You may have to purchase access to a cloud based group. For example, packets let
eyes ah, network analyzers, last security.
But again, knowing your environment is vital, so you have to take those kinds of things into account. Now
again, if you're working for an employer for a company, then you should have a pretty good idea of what is in your environment.
If you're gonna work as a consultant
again, you're going to have to deal with the unknown
now and be able to deal with it, but quickly and also professionally, so keep that in mind as you belong. Now, some areas for you to consider in the incident response brown,
uh, are a wide variety of things. Memory forensics, for example. There's volatility and the Indians red line that are available to, uh, for free that you can have installed leader on your laptop thumb drive, eh? So that when you go in
a customer site, it's experienced on incident. You can do memory captures and then when forensics if need be digital forensics as a big part off
incident response, we haven't moved away from that yet, although there were rumblings that Quentin happened not so long ago. So you have in case an autopsy your examples of software
Ah, that you may need to consider purchasing or installing and utilizing. Now lies
separated those there because in case is a pay software, uh, it can be expensive.
Um, it comes in a variety of formats for network internal use. On also stand alone for excuse Autopsy, on the other hand, is a free where bad you can download so on your system free, very robust.
Surprisingly so when you hear
free, Sometimes the old maxim comes to mind. You get what you paid for on that can't be true when it comes to software. Uh, but what we're finding in the incident response last digital forensics world is a lot of times the free tools or just a robust and
filled with options as hate can be.
Now, if you're looking at happing to do network investigation or network forensics, of course, for software wire Shark Network Minor. Just just two examples of software that you need to both be familiar with and also have access to so that you could utilize them during its
It pays to be prepared. So making these kinds of determinations prior to getting that call
that we've had an incident in the hit panic button and they're throwing lifelines out everywhere looking for help. It's important to have these things down in your NDE repertoire before you get that call. So, um,
on Zay Berry, we have courses on visual forensics and also on that work examinations of sharks specifically,
um, that you can take two.
Give yourself a bit of abuse there if you need it. So take Obama's on Siberia again. Hey, it's free train. Why not use it right now? One thing that is often times overlook is that last bullet up there on the screen. Later analysis of the data that you gather seeing
that's if you get the call to go out to a seed which I used to get so kind to share How that goes.
Third party provider. We would get a call usually 34 o'clock on a Friday afternoon. Hey, we think we got breach. We need help. What are we gonna do? Jump on a call with the client and do a triage
on basically
information gathering? Yeah. What are the symptoms? What have you identified? What tools? If we didn't know what tools air in your network, where are you located?
Because in that kind of scenario, we're probably going to do what? Stealing a military term. Air put boots on the ground? Um, one of our analysts would be heading to the nearest airport with their hardware hit kit. Your software, it get
jumping on an airplane and flying to the customer's sight.
Ah, in order to be on the scene. And that's where you would need your tools there for that memory. Forensics and digital forensics. Already pre loaded on a laptop. A robust laptop
that you can take to the scene. I had one incident. Similar role, actually. One where we would go on site. That way on every now and then you would get caught flat footed.
Ah, and have to purchase something either there or have it shipped to you. Hopefully avoid that. More than you actually engage in it.
Moving back down to that data. You're not there long term. You're there gathering information,
gathering evidence, and then you're flying home. And that's where your analysis occurs. So you need to be able to analyze the ones that you got dot meme files from memory captures that you gathered. You need the ability to analyze logs,
and take that data, correlate it, build out timelines on, identify symptoms of the breach and help your customer about remediated and correct and recover from the breach. Remember back we talked about this steps. They're all covered all throughout this process.
So here's an example.
Um, this is back from my law enforcement days child *** case. We walked in. This was the guy's house.
Um, yeah, I know. Lovely, right? But look at those systems have been torn apart and put back together. There's hard drive sitting outside in case there's hard top sitting on top desk not use. Ah, and in this instance, when we went in, he had just left for work. We kind it to go. And after he had left and its system was running
and I had never done live forensic
captured at that point time in my career's brand new to me. Thankfully, I had Speed Dial Thio local lab where they actually did those kinds of things immediately or all the time. I called them on, and they walked me through the process of doing screen captures and capturing running processes and all that.
this is the kind of thing you may find yourself involved in unnecessarily, hopefully, child ***. But you may be dealing with live systems systems of the shutdown systems that have been quarantined, so
you have to have the ability and your kids to deal with that. Here's another one. Ah, customer contact you regarding a new vulnerability at is allowing Attackers to exploit a flow, and remember, that's not critical night Sound familiar? Gain access. The customer believes their network was breached and wants you to investigate. What do you do?
Pause it there and think about that. What kind of tools That you need. What kind of information would you need?
How would you prepare to go into that customers environment and basically go threat hunting? Looking for a problem?
Now there are a lot of portable software examples out there. Paladin Pro puts out a bootable USB drive that you carry with you in order to help you in these kinds of processes.
There are a lot of people like to build around. They'll do their own scripting and all that. I have included a list of different websites, uh, with this course that can help you determine what you need or want how to go out by them or get them for free.
Ah, in order to be able to conduct analysis. Ray Pierre by Google was one of those Justin example of it that you could download
installing a thumb drive and take out use
again. If you have any questions at Christmas
review of software and its function. Alan, reach out to me on cyber am a day be 13 pot. We happy to talk to you have a fantastic day
Up Next