1 hour 21 minutes
Hello. My name's David. Welcome to analyzing attacks.
Good to see you and hear from you again. Even if it's only virtually one of the things that we don't talk about is
a part of analyzing the attack. We're gonna focus for this episode One memory now, sis. Now, this is merely
One way that you could analyze in attack. Um,
it's true with almost anything else, even out. Invisible world as it is, cyber world are multitude of ways or digital forensics
network forensics. There's Mauer analysis from source intelligence that you could turn Thio and water. They analyzed hack. However, because of our time here, we're going to be looking at memory now. Says so Let me give you a scenario.
Local company contact you regarding some suspicious Snepp traffic that they observed on their regular routine network connections. The I P addresses that they saw traversing their network appeared to the Russians
and is this has no contacts in Russia.
Soup coursing Russian I p addresses peak there
warning bells and because of the suspicious network activity, they asked you to investigate. So has few seconds here. And think about what you might do next.
Drawn over prior modules.
I think about all the different kinds of attacks that you've seen in Qin's courses. Think about the incident response process that you saw in my courses.
What would you do?
It's an important thing to be able to ask yourself, because you need to start pulling in some information from your clients on even if say, this isn't a good party. But it's a company that you're actually working towards the same process. Hopefully, you've already been due process. If you're having,
it's a good time to do submit some tabletop exercises
and he's a preparatory work. Remember, back to the steps of incident Response. Preparation is key. Now when you're looking at an attack like that, Uh, something T keep in mind is that a lot of attacks aren't just now where there's a lot of steps involved in. This is pulled for
ah, and in game report,
just like there is at the bottom of the screen. Uh, the boxes air actually underscores. So if you want to go look that up, please put underscores in there instead of the boxes. I don't know why Power Point did that time changing, but it wouldn't
So you've got your initial exploited Could come in here. Fish email,
malicious thumb drive. Remember the vectors that you saw in some of the prior module? So
craft around that and power shelve its initiated. And you see that a lot Ambition. So but a malicious attachment in it that has power shell code written into it Power show gets initiated, which then injects malicious code into memory
and in memory, it creates this hidden persistence they call it s. So this is what you may call by the little catch for these file this malware, which is floating around a lot out there now, and I say catch word because that's what this fire will smile Where has been around for a long time?
Why it was never really named to talk about. I'm not sure, But there you go on and then remote access is set up the and maintained by this. Now we're now the key here is that all of the evidence is removed and stuff I've, except for the in memory Palin
and the hidden persistence
so that you're coming in to investigate something. This is probably a great way to thank your way through the process
in order to do memory analysis. Now, I'll put a little caviar in here when you're going through your incident response process. If you went through those modules with us, you saw this graph before we've got preparation and identification in school. Now we jump back here
to our scenario.
You're stooping days. You've got questions to ask your right. You want to know you have never traveled. They have packed it captures. Do you have, uh, I d s I P s Do you have, um,
dropped something in there that you think may be important? One of my first questions would be heavy identified. The end points that this communication is coming from, and if so, have you done memory, captors? Because there you go. Unfortunately, in the identification scoping phase,
you'll see memory Forensics is up there at the top of our drop down over there in the real world.
Sad to say, most of the time, memory forensics is per night. Yeah, I think here in cyber security, we need some Deco bill well or something to jog your memories. Because memory forensics is almost an afterthought when it comes to going through the i R. Process with forensics,
Data recovery, bio system analysis you Can we get an image of the hard drive? Always a good question to ask Heinlein Analysis comes into play a lot of times,
but memory forensics is oftentimes forgot. So what I want is to try to glean here is if you're coming in your as an internal cybersecurity, professional or even an external consultant, memory forensics is important. You need to grab that memory even if it's not. File a small where
there can be a lot of evidence that's
stored in memory, that you could recover, that they're not going to get from saying disc examination so you can see
forensics comes into play. Now back to our scenario. We're information for you.
Yeah, Reviewing the network lot activity, you begin to see signs of exploration of data going out to these Russian I P addresses. It's encrypted eso you can't determine what was expatriated. What is your next steps? Now
allow you think about that here for Mr Couple Seconds again in the video, pause it here and jot down some ideas,
interact with this stuff, just breeze through it and they got doesn't matter. That's because this will hopefully help you
cross over into the world and apply some of the lessons that you've learned these courses to your own personal experience and professional experience. Moving on you. D'oh! Forensic preview the registry and other files from the rub server. You don't see any suspicious activity or information there. So what now?
Ooh, memory houses. If you've done it,
I've got a back us up here again. Because here
our memory forensics is often times you looked. It's something for some reason that a lot of systematic mean Is that what the time is? I help this people that even really think about when it comes to this entire I our process
if you watch the incident handling
courses. I talked about the importance for the preparation phase and getting all this set out on doing some training for your people so that they know
bad memory. Forensics is important, and it is a vital step in this entire process in order to be able to determine what happened.
You do your memory forensics. You pop out something for memory, and it looks like this your own your way so you can see This is actually from on actual investigation where our shell was running in memory.
See the little hidden up there? That means it's running. It's not easily observable, and you've got your power shall script there that you could be. Obviously, Onda were more about what this is supposed to do. You can see it's been to start, so
you've got a little better idea of some basic start looking forward
and you've also got some prove it needs the obvious skated and maybe I can get more clues until what you're looking for
were memory now Sister terms First Queen back in 2004. Yes, a long time ago by someone in my report who was writing about you kid activity. Since then, it has grown back in the day. I was a relatively new and unknown step
in. The forensic process is still today. It's primarily the domain of investigators, forensic investigators, an incident response analyst.
It does provide a whole lot of inside on system activity and should be included in everything.
Back in the day. It was strange, and grap on memory captures. Ah, lot of advances have been made in. There are a lot of tools out there available to you to assist and enhance your memory hunting and memory analysis capability. So as we go through this module, we're gonna take a look at incorporating it
in entirely into your incident response process. You have any questions? I'm on cyber. It'd be 13 baht would love to talk to you. There's nothing like a change of information and reeking of contacts. Talk to you soon.
Identifying Web Attacks Through Logs
Log analysis involves reviewing and evaluating system activities to help mitigate risks. If you’re training ...
3 CEU/CPE Hours Available
Certificate of Completion Offered
Attacks and Persistence for Incident Handlers
Hone your incident handling skills by joining Ken Underhill in this Attacks and Persistence for ...
1 CEU/CPE Hours Available
Certificate of Completion Offered