clearing the brush lessons learned in gutting a cirt and
play

Clearing the Brush: Lessons Learned in Gutting a CIRT and Rebuilding - PowerPoint PPT Presentation

Clearing the Brush: Lessons Learned in Gutting a CIRT and Rebuilding with Free Tools Mike La Pilla Slide Warning These are draft slides, not the ones presented Most images have been removed from draft If you are reading these you


  1. Clearing the Brush: Lessons Learned in Gutting a CIRT and Rebuilding with Free Tools Mike La Pilla

  2. Slide Warning • These are draft slides, not the ones presented • Most images have been removed from draft • If you are reading these you should check the FIRST portal for the latest ones

  3. About This Presentation • Everyone Has Their Own Take • Plenty of Papers on This Subject • Focus on Building 10 Essential Tools/Systems – Preferably without spending money

  4. If You Want Organization and Structure • http://first.org/resources/guides/ – CSIRT Setting up Guide – CERT-in-a-box • http://www.sans.org/reading_room/whitepap ers/incident/ • Also stuff on Auscert, CERT/CC, GFIRST, etc

  5. Past vs Present

  6. Past vs Present

  7. Preparation by Preservation • Picture of frozen hard drive

  8. Preparation by Obliteration • Picture of Bar

  9. Know Your Scope • Areas of Response • Actions Allowed • Contact List

  10. Know Your People

  11. Beware of Certifications

  12. Attack Categories

  13. 10 Systems You Need To Build

  14. 1: Automatic Malware Analysis System • Purpose: Automatically process malware samples • Recommended Features: Fast, Exe and DLL, Memory Dumps

  15. 1: Automatic Malware Analysis System

  16. 1: Automatic Malware Analysis System

  17. 2: Automatic JS Analyzer • Purpose: Unpack/Analyze/Interpret Javascript • Recommended Capabilities: Network replay, live site analysis, copy and paste

  18. 2: Automatic JS Analyzer

  19. 3: Automatic Document Analyzer • Purpose: Analyze non-executable documents • Recommended Capabilities: Exploit matching, decompression, javascript/flash parsing

  20. 3: Automatic Document Analyzer

  21. 4: Document Database • Purpose: Archive documents • Recommended Capabilities: Store name, file properties, metadata, link malware info

  22. 4: Document Database

  23. 5: Malware Repository • Purpose: Store malware • Recommended Capabilities: Search, store properties, link to other systems

  24. 5: Malware Repository

  25. 6: IP and Hostname Tracker • Purpose: Track network information over time • Recommended Capabilities: Passive DNS, active checking, search, ASN, GeoIP

  26. 6: IP and Hostname Tracker

  27. 7: Forensics System/Lab • Purpose: Forensic analzye drives, memory • Recommended Capabilities: Scanning, automation, hashing

  28. 7: Forensics System/Lab

  29. 8: Image Repository • Purpose: Replicate machines in production environment

  30. 8: Image Repository

  31. 9: Tiny Tools Server • Purpose: Collection of scripts and tools that increase efficiency

  32. 9: Tiny Tools Server

  33. 10: Documentation Portal • Purpose: Self-explanatory Recommended Capabilities: Revisions, author tracking

  34. 10: Documentation Portal

  35. Final Workflow Diagram

  36. Questions? • mlapilla@netcentrics.com

  37. References

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend