• Tidak ada hasil yang ditemukan

CEHv6 Module 57 Computer Forensics and Incident Handling pdf pdf

N/A
N/A
Protected

Academic year: 2019

Membagikan "CEHv6 Module 57 Computer Forensics and Incident Handling pdf pdf"

Copied!
66
0
0

Teks penuh

(1)

Ethical Hacking and

Counterm easures

Counterm easures

Version 6

Mo d u le LVII

(2)

Scenario

OrientRecruitm entInc is an online hum an resource recruitm ent firm .

The web server of the firm is a critical link.

Neo, the network adm inistrator sees som e unusual activity that is

targeted towards the web server. The web server is overloaded with a ge ed o a ds e eb se e e eb se e s o e oaded

connection requests from huge num ber of different sources.

Before he could realize the potential of the attack, the website of

O i tR it tI f ll t th h f D i l f

OrientRecruitm entInc falls prey to the m uch fam ous Denial of

Service Attack.

The com pany m anagem ent calls up the local Incident Response

Team to look into the m atter and solve the DoS issue.

What steps will the incident response team take to investigate the

(3)

Module Objective

This m odule will fam iliarize you with:

• Com puter Forensics

• What is an Incident

This m odule will fam iliarize you with:

• What is an Incident

• Categories of Incidents

• Incident Response Checklist

• Procedure for Handling Incident

g

• Incident Managem ent

• Incident Reporting

• What is CSIRT

• Types of Incidents and Level of Support

• Incident Specific Procedures

• Best Practices for Creating a CSIRT

W

ld CERT

(4)

Module Flow

Com puter Forensics Incident Reporting

What is CSIRT What is an Incident

Categories of Incidents Types of Incidents and Level of Support

Incident Response Checklist Incident Specific Procedures

Best Practices for Creating a CSIRT Procedure for

(5)

To Kn o w Mo re Ab o u t

To Kn o w Mo re Ab o u t

Co m p u te r Fo re n s ics ,

A

d EC C

il’ CH FI

Atte n d EC-Co u n cil’s CH FI

P ro gra m

(6)

C

t

F

i

(7)

What is Com puter Forensics

“The preservation, identification, extraction, interpretation, and

docum entation of com puter evidence to include the rules of evidence

docum entation of com puter evidence, to include the rules of evidence,

legal processes, integrity of evidence, factual reporting of the

inform ation found, and providing expert opinion in a court of law or

other legal and/ or adm inistrative proceeding as to what was found.”

"Forensic Com puting is the science of capturing, processing and

(8)

Need for Com puter Forensics

“Com puter forensics is equivalent of surveying a crim e scene or perform ing an

autopsy on a victim ”

p y

{Source: J am es Borek 20 0 1}

Presence of a m ajority of electronic docum ents

Presence of a m ajority of electronic docum ents

Search and identify data in a com puter

Search and identify data in a com puter

Digital Evidence can be easily destroyed if not handled properly

Digital Evidence can be easily destroyed, if not handled properly

(9)

Objectives of Com puter Forensics

To recover, analyze and present com

puter-To recover, analyze and present com puter

based m aterial in such a way that it can be

p re s e n te d a s e vid e n ce in a co u rt o f la w

(10)

Stages of Forensic Investigation in

Tracking Cyber Crim inals

Tracking Cyber Crim inals

An Incident occurs in Whi h h C ’

The Client contacts the C ’ Ad

The Advocate contracts E l F i Which, the Com pany’s

Server is com prom ised

Com pany’s Advocate for Legal Advice

an External Forensic Investigator

The Forensic Investigator Prepares First Response

of Procedures (FRP) The FI seizes the

evidences in the Crim e scene & transports them to the Forensics Lab The Forensic Investigator

(FI) prepares the Bit-Stream im ages of the files

The Forensic Investigator creates an MD5 #

of the files

The Forensic Investigator exam ines the evidence files for proof of a Crim e

The FI prepares Investigation reports and concludes the

Investigation, enables the Advocate identify required proofsdvocate de t y equ ed p oo s

The FI handles the sensitive Report to the The Advocate studies the

report and m ight press charges The Forensic Investigator

usually destroys sensitive Report to the

(11)

Key Steps in Forensic

Investigations

Investigations

1

• Com puter crim e is suspected

2

• Collect prelim inary evidence

3

• Obtain court warrant for seizure (if required)

4

• Perform first responder procedures

4

p p

5

• Seize evidence at the crim e scene

6

• Transport them to the forensic laboratory

(12)

Key Steps in Forensic

Investigations (cont’d)

Investigations (cont d)

8

• Generate MD5 checksum on the im ages

9

• Prepare chain of custody

10

• Store the original evidence in a secure location

11

• Analyze the im age copy for evidence

12

• Prepare a forensic report

13

• Subm it the report to the client

(13)
(14)

I

id

H

dli

(15)

Present Networking Scenario

Increase in the num ber of com panies venturing into e-business

l d ith

hi h

I t

t

coupled with high Internet usage

Decrease in vendor product developm ent cycle and product

i

l

testing cycle

Increase in the com plexity of Internet as a network

Increase in the com plexity of Internet as a network

Alarm ing increase in intruder activities and tools, expertise of

g

,

p

hackers, and sophistication of hacks

(16)

What is an Incident

Com puter security incident is defined as “Any real or suspected adverse

event in relation to the security of com puter system s or com puter

event in relation to the security of com puter system s or com puter

networks”

• Source: www.cert.org

It also includes external threats such as gaining access to system s,

disrupting their services through m alicious spam m ing, execution of

m alicious codes that destroy or corrupt system s

(17)

Category of Incidents: Low Level

Low level incidents are the least severe kind of incidents

Low level incidents are the least severe kind of incidents

They should be handled within one working day after the event occurs

They should be handled within one working day after the event occurs

They can be identified when there is:

Loss of personal password

Suspected sharing of organization ’s accounts Suspected sharing of organization s accounts

Unsuccessful scans and probes

(18)

Category of Incidents: Mid Level

h i

id

hi l

l

i

l

i

d h

h

ld b

The incidents at this level are com paratively m ore serious and thus, should be

handled the sam e day the event occurs

• Violation of special access to a com puter or com puting

They can be identified by observing:

Violation of special access to a com puter or com puting facility

• Unfriendly em ployee term ination

• Unauthorized storing and processing data

• Destruction of property related to a com puter incident (less p p y p ( than $ 10 0 ,0 0 0 )

• Personal theft of data related to com puter incident($ 10 0 ,0 0 0 )

• Com puter virus or worm s of com paratively larger intensity Ill l t b ildi

(19)

Category of Incidents: High Level

These are the m ost serious incidents and are considered as “Major” in nature

High level incidents should be handled im m ediately after the incident occurs

These include:

• Denial of Service attacks

• Suspected com puter break-in

• Com puter virus or worm s of highest intensity; e.g. Trojan back door

back door

• Changes to system hardware, firm ware, or software without authentication

• Destruction of property exceeding $ 10 0 ,0 0 0

• Personal theft exceedin g $ 10 0 ,0 0 0 and illegal electronic g g fund transfer or download/ sale

(20)

How to Identify an Incident

A system alarm from an intrusion detection tool indicating security breach

Suspicious entries in a network

Accounting gaps of several m inutes with no accounting log

Other events like unsuccessful login attem pts, unexplained new user or files, attem pts to write s stem files m odification or deleting of data

system files, m odification, or deleting of data

(21)

How to Prevent an Incident

A key to preventing security incidents is to elim inate as m any vulnerabilities

ibl

as possible

Intrusions can be prevented by:

Intrusions can be prevented by:

• Scanning the network/ system for security loopholes

• Auditing the network/ system

• Deploying Intrusion Detection/ Prevention System s on the network/ system

• Establishing Defense-in-Depth

(22)

Defining the Relationship between Incident

Response, Incident Handling, and Incident

Managem ent

(23)

Incident Response Checklist

Potential Incident Verified

Contact departm ent/ agency security staff

• I.T. Manager

-• [designee/ others by departm ent procedure] -[ g / y p p ]

Security designee will contact CSIRT m em ber

• Call 8 0 2-250 -0 525 (GOVnet Beeper)

• GOVnet will then contact CSIRT m em bers ([email protected])( @ ) • If no response within ten m inutes call the Office of the CIO

Isolate system (s) from GOVnet [unless CSIRT decision is to leave the system connected to m onitor active hacker]

Begin a log book - who/ what / when / where

Identify the type of Incident - Virus, worm , and hacker

(24)

Incident Response Checklist

(cont’d)

(cont d)

Contact local police authority with jurisdiction at location of incident (This MUST BE coordinated with CSIRT)

Follow server/ operating system specific procedures to snapshot the system Inoculate/ restore the system

Inoculate/ restore the system

Close the vulnerability and ensure that all patches have been installed Return to norm al operations

Prepare report and conduct follow-up analysis Revise prevention and screening procedures

(25)

Handling Incidents

Incident handling helps to find out trends and patterns regarding intruder activity by analyzing it

intruder activity by analyzing it

It involves three basic functions:

• Incident reporting, • Incident analysis, and • Incident response

It recom m ends network adm inistrators for recovery, containm ent, and prevention to constituents

It ll i id t t t b th d i l ti th t t

It allows incident reports to be gathered in one location so that exact trends and pattern can be recognized and recom m ended strategies can be em ployed

I h l h di ff d d h f

(26)

Procedure for Handling Incident

The incident handling process is divided into six stages

These stages are:

• Preparation

• Identification

• Containm ent

E

di

ti

(27)

Stage 1: Preparation

Preparation enables easy coordination am on g staff

p

y

g

Create a policy

Develop preventive m easures to deal with threats

Obtain resources required to deal with incidents

effectively

Develop infrastructure to respond and support

Develop infrastructure to respond and support

activities related to incident response

(28)

Stage 2: Identification

Identification involves validating, identifying, and

reporting the incident

reporting the incident

Determ ining the sym ptom s given in ‘how to identify an

incident’

Identifying the nature of the incident

Identifying events

(29)

Stage 3: Containm ent

Containm ent lim its the extent and intensity of an incident

Containm ent lim its the extent and intensity of an incident

It avoids logging as root on the com prom ised system

It avoids logging as root on the com prom ised system

Avoid conventional m ethods to trace back as this m ay alert the

k

attackers

Perform the backup on the system to m aintain the current state of

the system for facilitating the post-m ortem and forensic

the system for facilitating the post-m ortem and forensic

investigation later

(30)

Stage 4: Eradication

Investigate further to uncover the cause of the incident by analyzing system logs

of various devices such as firewall, router, and host logs

Im prove defenses on target host such as:

• Reloading of a new operating systemReloading of a new operating system • Enabling firewalls

• Assigning new IP address

Install all the latest patches

Install all the latest patches

Disable any unnecessary services

Install anti-virus software

(31)

Stage 5: Recovery

Determ ine the course of actions

Determ ine the course of actions

Monitor and validate system s

y

Determ ine integrity of the backup itself by m aking an

attem pt to read its data

attem pt to read its data

Verify success of operation and norm al condition of system

Monitor the system by network loggers, system log files, and

potential back doors

(32)

Stage 6: Follow-up

Post-m ortem analysis:

• Perform a detailed investigation of the incident to identify the

extent of the incident and potential im pact prevention m echanism s

Revise policies and procedures from the lessons learned from the past

Determ ine the staff tim e required and

f th f ll i t l i

• Extent to which the incidents disrupted the organization • Data lost and its value

perform the following cost analysis:

(33)

Stage 6: Follow-up (cont’d)

Docum ent the response to incident by finding answers to the

following:

Was the preparation for the incident sufficient?

Whether the detection occurred prom ptly or not, and why?

Using additional tools could have helped or not? Using additional tools could have helped or not?

Was the incident contained?

What practical difficulties were encountered?

(34)

Incident Managem ent

Incident m anagem ent is not just responding to an incident when it happens but

includes proactive activities that help prevent incidents by providing guidance

includes proactive activities that help prevent incidents by providing guidance

against potential risks and threats

Includes the developm ent of a plan of action, a set of processes that are consistent,

p

p

,

p

,

repeatable, of high quality, m easurable, and understood within the constituency

Who perform s Incident Managem ent?

Hum an resource personnel

Legal council

(35)

Incident Managem ent (cont’d)

(36)

Why don’t Organizations Report

Com puter Crim es

Com puter Crim es

Misunderstanding the scope of the problem

• This does not happen to other organizations

Proactive reporting and handling of the incident will allow m any

organizations to put their spin on the m edia reports

Potential loss of custom ers

Desire to handle things internally

(37)

Estim ating Cost of an Incident

Tangible: Can be quantified

• Lost productivity hours

• Investigation and recovery efforts

L f b i

g

q

• Loss of business

• Loss or theft of resources

Intangible: More difficult to identify and

• Dam age to corporate reputation • Loss of goodwill

Intangible: More difficult to identify and

quantify

Loss of goodwill

• Psychological dam age

• Those directly im pacted m ay feel victim ized • May im pact m orale or initiate fear

• Legal liabilityLegal liability

(38)

Whom to Report an Incident

Incident reporting is the process of reporting the inform ation regarding p g p p g g g the encountered security breach in a proper form at

The incident should be reported to the CERT Coordination center, site security m anager, or other sites

It can also be reported to law enforcem ent agencies such as FBI,USSS Electronic crim es branch, or Departm ent of Defense Contractors

(39)

Incident Reporting

When a user encounters any breach, report the following:

Intensity the security breach

Circum stances, which revealed the vulnerability

Sh t i i th d i d i t l l f k Shortcom ings in the design and im pact or level of weakness

Entry logs related to intruder’s activity

Specific help needed should be clearly defined

(40)

Vulnerability Resources

US-CERT Vulnerability Notes Database:

• Descriptions of these vulnerabilities are available from this web page in a searchable database form at, and are published as "US-CERT Vulnerability Notes".

• Integrates all publicly available U.S. Governm ent vulnerability resources and provides references to industry resources

NVD (National Vulnerability Database):

• List or dictionary of publicly known in form ation security vulnerabilities and

l d f f bl

CVE (Com m on Vulnerabilities and Exposures List):

exposures international in scope an d free for public use

OVAL (Open Vulnerability Assessm ent Language):

(41)

What is CSIRT

Com puter Security Incident Response Team (CSIRT):

p

y

p

(

)

Incident Response Services 24x7

CSIRT provides 24x7 Com puter Security

Incident Response Services to any user,

com pany, governm ent agency or organization

CSIRT provides a reliable and trusted single

point of contact for reporting com puter

security incidents worldwide

security incidents worldwide

CSIRT provides the m eans for reporting

i

id

d f di

i

i

i

(42)

CSIRT: Goals and Strategy

CSIRT’s goals:

• To organize the m anagem ent of security problem s by taking a proactive approach to our custom ers’ security vulnerabilities and by responding effectively to potential inform ation security i id t

CS

s goa s:

incidents

• To m inim ize and control the dam age

• To provide or assist with effective response and recovery • To help prevent future events

• It provides a single point of contact for reporting local

Strategy of CSIRT:

t p o des a s g e po t o co tact o epo t g oca problem s

• It identifies and analyzes what has happened including the im pact and threat

• It researches solutions and m itigation strategiesg g

(43)

Why an Organization needs an

com puter security

b

h

d h

It is a form alized team

that perform s incident

response work as its

m ajor job function

As an ad-hoc team , it

is responsible for

ongoing com puter

(44)

CSIRT Case Classification

(45)

Types of Incidents and Level of

Support

The Com puter Security Incident Response Team will assign

resources according to the following priorities, listed in the

Support

• Threats to the physical safety of hum an beings

• Root or system -level attacks on an y m achine either m ulti-user or

dedicated-resources according to the following priorities, listed in the

decreasing order:

y y

purpose

• Com prom ise restricted confidential service accounts or software

installations, in particular those with authorized access to confidential data • Denial of service attacks on any of the above two item s e a o se v ce attac s o a y o t e above t o te s

• Large-scale attacks of any kind, e.g. sniffing attacks, IRC "social engineering" attacks, password cracking attacks, and destructive virus outbursts

• Com prom ise of individual user accounts, i.e. unauthorized access to a user or service account

service account

• Forgery and m isrepresentation, and other security-related violations of local rules and regulations, e.g. Netnews and e-m ail forgery, unauthorized use of IRC bots

(46)

Incident Specific Procedures-I

(Virus and Worm Incidents)

(Virus and Worm Incidents)

Step 1: Isolate the system

Step 2: Notify appropriate people

Step 3: Identify the problem

Step 4: Include the virus or worm

Step 5: Inoculate the system (s)

Step 6: Return to a norm al operating m ode

(47)

Incident Specific Procedures-II

(Hacker Incidents)

(Hacker Incidents)

(A) Attem pted Probes into a State of Verm ont System

• Step 1: Identify the problem

• Step 2: Notify appropriate people • Step 3: Identify the Hacker

• Step 4: Notify CERT

• Step 5: Follow up analysis • Step 5: Follow up analysis

• Step 1: Notify Appropriate People

(B) Active Hacker Activity

p y pp p p

• Option 1: Rem oval of Hacker from the system • Step 2: Snap-shot the System

• Step 3: Lock out the Hacker • Step 4: Restore the System • Step 5: Notify other Agencies • Step 5: Notify other Agencies • Step 6: Follow up Analysis

• Option 2: Monitoring of Hacker Activity

(48)

Incident Specific Procedures-III

(Social Incidents, Physical Incidents)

(Social Incidents, Physical Incidents)

Social Incidents:

• Step 1: Identify Potential Risk

• Log all actions*

• Step 2: Notify Appropriate People

Physical Incidents:

(49)

How CSIRT Handles Case: Steps

KEEP A LOG BOOK

INFORM THE

APPROPRIATE PEOPLE

MAINTAIN LIST OF CONTACTS

RELEASE THE INFORMATION

O FOLLOW UP ANALYSIS

(50)

Exam ple of CSIRT

In te rn a l CS IRT provides services to their parent organization such as

bank, m anufacturing com pany, university, or any governm ent agencies

N a tio n a l CS IRT provides services to the entire nation exam ple being

J apan Com puter Em ergency Response Team Coordination Center J apan Com puter Em ergency Response Team Coordination Center (J PCERT/ CC)

An a lys is Ce n te rs synthesize data, determ ine trends, and patterns in an

incident activity to predict future activity or provide early warnings

Ve n d o r te a m s identify vulnerabilities in software and hardware products

Ve n d o r te a m s identify vulnerabilities in software and hardware products

In cid e n ts Re s p o n s e P ro vid e rs offer services to paid clients

(51)

Best Practices for Creating a

CSIRT

CSIRT

1

• Obtain m anagem ent support and buy-in

1

2

• Determ ine the CSIRT strategic plan

3

• Gather relevant inform ation

4

• Design the CSIRT vision

4

5

• Com m unicate the CSIRT vision and operational plan

6

• Begin CSIRT im plem entation

(52)

Step 1: Obtain Managem ent

Support and Buy-in

Support and Buy in

Without m anagem ent approval and support, creating an

effective incident response capability can be extrem ely difficult

and problem atic

Once the team is established, how is it m aintained and

d d ith b d

t

l d q i

t

?

expanded with budget, personnel, and equipm ent resources?

(53)

Step 2: Determ ine the CSIRT

Developm ent Strategic Plan

Developm ent Strategic Plan

Are there specific tim efram es to be m et? Are they realistic, and if

p

y

,

not, can they be changed?

Is there a project group? Where do the group m em bers com e from ?

How do you let the organization know about the developm ent of the

CSIRT?

If you have a project team , how do you record and com m unicate the

inform ation you are collecting, especially if the team is

hi

ll di

d?

(54)

Step 3: Gather Relevant

Inform ation

Inform ation

Meet with key stakeholders to discuss the expectations, strategic direction,

definitions, and responsibilities of the CSIRT

i

The stakeholders could include:

• Business m anagers

• Representatives from IT

• Representatives from the legal departm ent

• Representatives from hum an resources

Representatives from hum an resources

• Representatives from public relations

(55)

Step 4: Design your CSIRT

Vision

Vision

In creating your vision you should:

• Identify your constituency: Who does the CSIRT support and service?

• Define your CSIRT m ission, goals, and objectives: What does the CSIRT do

In creating your vision, you should:

y , g , j

for the identified constituency?

• Select the CSIRT services to provide to the constituency (or others): How does the CSIRT support its m ission?

• Determ ine the organizational m odel: How is the CSIRT structured and g organized?

• Identify required resources: What staff, equipm ent, and infrastructure is needed to operate the CSIRT?

(56)

Step 5: Com m unicate the CSIRT

Vision

Vision

Com m unicate the CSIRT vision

Com m unicate the CSIRT vision

and operational plan to

m anagem ent, constituency, and

others who need to know and

understand its operations

(57)

Step 6: Begin CSIRT

Im plem entation

Im plem entation

Hire and train initial CSIRT staff Hire and train initial CSIRT staff

Buy equipm ent and build any necessary network infrastructure to support y q p y y pp the team

Develop the initial set of CSIRT policies and procedures to support your Develop the initial set of CSIRT policies and procedures to support your services

D fi h ifi i f d b ild i id ki

Define the specifications for and build your incident-tracking system

(58)

Step 7: Announce the CSIRT

When the CSIRT is operational, announce it to the

constituency or parent organization

It is best if this announcem ent com es from sponsoring

m anagem ent

Include the contact inform ation and hours of operation for the

CSIRT in the announcem ent

(59)

World CERTs

http:/ / www.trusted-introducer.nl/ team s/ country.htm l

http:/ / www.trusted introducer.nl/ team s/ country.htm l

Asia Pacific CERTs

• Australia CERT (AUSCERT) • Hong Kong CERT (HKCERT/ CC) • Indonesian CSIRT (ID-CERT) • J apan CERT-CC (J PCERT/ CC)p / • Korea CERT (CERT-KR)

• Malaysia CERT (MyCERT) • Pakistan CERT(PakCERT) • Singapore CERT (SingCERT) • Taiwan CERT (TWCERT) • Taiwan CERT (TWCERT) • China CERT (CNCERT/ CC)

North Am erican CERTs

• CERT-CC • US-CERT • Canadian Cert • CancertCancert

(60)

World CERTs (cont’d)

South Am erican CERTs

• CAIS

(61)
(62)
(63)

IRTs Around the World

f / Courtesy of CERT/ CC

(64)

Sum m ary

Increase in the num ber of products and relative increase in the num ber of

hacking tools has put security in the spotlight

hacking tools has put security in the spotlight

Com puter security incident is defined as any real or suspected adverse event in

relation to the security of com puter system s or com puter networks

Handling Incidents involves three basic functions: incident reporting, incident

analysis, and incident response

Incident reporting is the process of reporting the inform ation regarding the

encountered security breach in a proper form at

CSIRT provides rapid response to m aintain the security and integrity of the

system s

(65)
(66)

Gambar

Figure : Five High-Level Incident Management Processesggg

Referensi

Dokumen terkait

Bersikap objektif, guru yang memiliki kualifikasi akademik yang sesuai dengan bidangnya yaitu Sarjana Pendidikan Agama Islam, memiliki empat kompetensi (Kompetensi

[r]

When it comes down to it the only thing you need to remember is to pick the casket that you think is best for your family, never let a funeral director or anyone else try to make

Kita dapat membuat sekumpulan strategi yang mungkin bagi perusahaan konveksi berdasarkan kombinasi tertentu dari empat kumpulan faktor tersebut. Kita

4.13 Perbandingan Data Awal Pelaksanaan Pembelajaran Dengan Data Hasil Observasi Pelaksanaan Pmbelajaran Siklus III

[r]

Dalam skripsi ini penulis mengemukakan permasalahan bagaimana konsep kebijakan hukum pidana dalam kebijakan penanggulangan kejahatan dan bagaimana kebijakan hukum pidana

[r]