Intel (R) Regimented Potential Incident Examination Report: An - - PowerPoint PPT Presentation

intel r regimented potential incident examination report
SMART_READER_LITE
LIVE PREVIEW

Intel (R) Regimented Potential Incident Examination Report: An - - PowerPoint PPT Presentation

Intel (R) Regimented Potential Incident Examination Report: An information gathering windows framework Steve Mancini Joe Schwendt 2006 FIRST Conference R.P.I.E.R. ? R egimented P otential I ncident E xamination R eport June 29, 2006 RAPIER


slide-1
SLIDE 1

Intel (R) Regimented Potential Incident Examination Report: An information gathering windows framework

Steve Mancini Joe Schwendt 2006 FIRST Conference

slide-2
SLIDE 2

June 29, 2006 RAPIER - 2006 FIRST Conference 2

R.P.I.E.R. ?

Regimented Potential Incident Examination Report

slide-3
SLIDE 3

June 29, 2006 RAPIER - 2006 FIRST Conference 3

What’s in a Name?

RAPIER vs RPIER Intel (R) RPIER is the name of the

  • fficial GPL release of the tool.

So please erase the A from all your presentations when you get home so we don’t get fired. ☺

slide-4
SLIDE 4

June 29, 2006 RAPIER - 2006 FIRST Conference 4

Introduction to RPIER

RPIER is.. RPIER is a modular incident response framework designed to acquire commonly requested information during an internal event, incident, or investigation in an easy, consistent manner. RPIER is not.. RPIER is not a forensics tool. It does not honor most industry guidelines for a proper forensics examination with regard to not affecting the image

  • r files upon the system

RPIER was a way for a unix guy (Steve) to gather windows data in the environment.

slide-5
SLIDE 5

June 29, 2006 RAPIER - 2006 FIRST Conference 5

Attribution

Jesse Kornblum FRED First Responders Evidence Disk

slide-6
SLIDE 6

June 29, 2006 RAPIER - 2006 FIRST Conference 6

Purpose for RPIER

  • The worst time to learn how to acquire information from

a system is during the incident.

  • Common reaction to an event is to patch, run AV

scanners, spyware scanners, automatic OS updater, etc to get it working condition as soon as possible.

  • Not everyone
  • (1) knows how to acquire the requested information nor
  • (2) do they acquire it in the same fashion

4:25

slide-7
SLIDE 7

June 29, 2006 RAPIER - 2006 FIRST Conference 7

Incident Handling BKMs

Introduce a limited number of decisions by the 1st responder that could result in differing results Automate where possible to free up incident handler’s focus for bigger event issues Provide a complete lifecycle for information gathering from start to delivery of data Expedite the acquisition of information since time is of the essence Comprehend all data that could be requested by analysts and gathers it during 1st execution

  • f the tool
slide-8
SLIDE 8

June 29, 2006 RAPIER - 2006 FIRST Conference 8

RPIER: Work Flow

Analysis Notify Upload Execute Select Update Download

slide-9
SLIDE 9

June 29, 2006 RAPIER - 2006 FIRST Conference 9

RPIER Features

  • Stand Alone
  • Modular Design
  • Fully configurable GUI
  • SHA1 verification checksums
  • Auto-update functionality
  • Results can be auto-zipped
  • Auto-uploaded to central

repository

  • Email Notification when

results are received

  • 2 Quick Scan Modes –

Fast/Slow

  • Separated output for faster

analysis

  • Pre/Post run changes report
  • Fully automatable via

command line and conf file

  • Process affinity throttling
slide-10
SLIDE 10

June 29, 2006 RAPIER - 2006 FIRST Conference 10

Command Line Arguments

Data Bundling Options Program Execution Priority Email Header Information Path Definitions Webservice URLs Integrity Check options And a whole lot more...

slide-11
SLIDE 11

June 29, 2006 RAPIER - 2006 FIRST Conference 11

Under the Hood:

RPIER Architecture

slide-12
SLIDE 12

June 29, 2006 RAPIER - 2006 FIRST Conference 12

RPIER Requirements

Windows NT* based Operating System Microsoft .NET* Framework 1.1+ Microsoft WSH* (Windows Scripting Host) 5.6+ Microsoft WMI* (Windows Management Interface) 1.5+

slide-13
SLIDE 13

June 29, 2006 RAPIER - 2006 FIRST Conference 13

Engine Operational Flow - Launch

Load RPIER.Conf file Interpret command line options Auto Update check (Optional) Auto Update if necessary (Optional) Restart EXE (if updated) Load Modules Display GUI (Optional)

slide-14
SLIDE 14

June 29, 2006 RAPIER - 2006 FIRST Conference 14

Engine Operational Flow - Execute

Pre-Run Forensics Checkpoint (Optional) Run Each Selected Module Compress results (Optional) Upload results (Optional) Post-Run Forensics Checkpoint and Differential Analysis (Optional) Send Email Notification (Optional)

slide-15
SLIDE 15

June 29, 2006 RAPIER - 2006 FIRST Conference 15

RPIER Networking

  • Uses the http (optionally https) protocol for all

communication

  • Port is configurable (non-port 80 is recommended)
  • Webserver can be IIS or Apache on Windows
  • Multiple servers can be setup for redundancy/load balancing
  • Enables the following features:
  • RPIER distribution
  • Auto-update functionality
  • Auto-upload functionality
  • Central Results Repository
  • Central Documentation Resource

(Manual/Training/FAQ)

  • Manual RPIER upload and non-RPIER upload
slide-16
SLIDE 16

June 29, 2006 RAPIER - 2006 FIRST Conference 16

Gathering Information

RPIER Modules

slide-17
SLIDE 17

June 29, 2006 RAPIER - 2006 FIRST Conference 17

RPIER Module Architecture

Based on VBScript RPIER.vbi is a large library of VBScript functions to reference Modules can have individual conf files to allow for end user configuration Modules are stand alone

Can be added/removed at will Allows for independent development/testing

slide-18
SLIDE 18

June 29, 2006 RAPIER - 2006 FIRST Conference 18

Feature Module Output

Volatile Information

  • complete list of running processes
  • locations of those processes on disk
  • ports those processes are using
  • Net (start/share/user/file/session)
  • Layer3 traffic samples
  • Output from nbtstat and netstat
  • Dump memory for all running

processes

  • Checksums for all running

processes

  • Capture last Modify/Access/Create

times for designated areas

  • Document all open shares/exports
  • n system
  • All files that are currently open
  • Capture current routing tables
  • All DLLS currently loaded and their

checksum

  • capture logged in users
  • list of all network connections

Static Information

  • System Name
  • System Startup Commands
  • Copies of application cache

(temporary internet files)

  • Uptime
  • Local account and policy

information

  • List of all files with alternate data

streams

  • Capture list of services installed on

the system

  • Discover files marked as hidden
  • Export entire registry
  • Current patches installed on system
  • Current AV versions
  • List of all installed software on

system (known to registry)

  • Capture all logs (system +

application specific)

  • MAC address
  • Search/retrieve files based on

search criteria.

slide-19
SLIDE 19

June 29, 2006 RAPIER - 2006 FIRST Conference 19

Output

Output is stored in directory path: SystemName\DATE\TIME\ Format: ASCII text

slide-20
SLIDE 20

June 29, 2006 RAPIER - 2006 FIRST Conference 20

How to Interpret the Results

To teach you this would require several months (years?) of training and education in

  • perating systems internals,

hacking techniques, malware behavior, etc. Ultimately, the results must be reviewed by people with sufficient knowledge of your environment to be able to discern the odd from the routine.

slide-21
SLIDE 21

June 29, 2006 RAPIER - 2006 FIRST Conference 21

Start Demo Here

slide-22
SLIDE 22

June 29, 2006 RAPIER - 2006 FIRST Conference 22

Over the Horizon

Where do we go from here? Validate on VISTA *NIX. Ask us after the talk... More Modules! (of course) Alternate output formats Program to parse

  • utput for interesting

results

slide-23
SLIDE 23

June 29, 2006 RAPIER - 2006 FIRST Conference 23

Release of the Tool

https:// https://sourceforge.net/projects/rpier sourceforge.net/projects/rpier/ /

Build Notes: Certain modules rely upon licensed software, or on tools we could not get permission to bundle with a GPL license. We’ve made it as easy as possible – acquire these on your own and drop into Module folders to get them working.

slide-24
SLIDE 24

June 29, 2006 RAPIER - 2006 FIRST Conference 24

Contributions & Feedback

Have an idea for module? Have code ready to drop into a module we don’t already have? Have ideas how to improve it? Contact us:

RPIER.securitytool@gmail.com RPIER.securitytool@gmail.com

http://groups.google.com/group/rpier

slide-25
SLIDE 25

June 29, 2006 RAPIER - 2006 FIRST Conference 25

Questions?

slide-26
SLIDE 26

June 29, 2006 RAPIER - 2006 FIRST Conference 26

Caveat

The opinions expressed in this presentation are those of the authors and may not reflect the opinions of

  • ur employer.