Buy the Complete Book: Buy the Complete Book: HANDS-ON INCIDENT RESPONSE and DIGITAL FORENSICS
Total Page:16
File Type:pdf, Size:1020Kb
Buy the complete book: www.bcs.org/books/digitalforensics Buy the complete book: www.bcs.org/books/digitalforensics HANDS-ON INCIDENT RESPONSE AND DIGITAL FORENSICS Buy the complete book: www.bcs.org/books/digitalforensics BCS THE CHARTERED INSTITUTE FOR IT BCS, The Chartered Institute for IT, champions the global IT profession and the interests of individuals engaged in that profession for the benefit of all. We promote wider social and economic progress through the advancement of information technology science and practice. We bring together industry, academics, practitioners and government to share knowledge, promote new thinking, inform the design of new curricula, shape public policy and inform the public. Our vision is to be a world-class organisation for IT. Our 70,000-strong membership includes practitioners, businesses, academics and students in the UK and internation- ally. We deliver a range of professional development tools for practitioners and employ- ees. A leading IT qualification body, we offer a range of widely recognised qualifications. Further Information BCS, The Chartered Institute for IT, First Floor, Block D, North Star House, North Star Avenue, Swindon, SN2 1FA, United Kingdom. T +44 (0) 1793 417 424 F +44 (0) 1793 417 444 www.bcs.org/contact http://shop.bcs.org/ Buy the complete book: www.bcs.org/books/digitalforensics HANDS-ON INCIDENT RESPONSE AND DIGITAL FORENSICS Mike Sheward Buy the complete book: www.bcs.org/books/digitalforensics © BCS Learning & Development Ltd 2018 The right of Mike Sheward to be identified as author of this Work has been asserted by him in accordance with sections 77 and 78 of the Copyright, Designs and Patents Act 1988. All rights reserved. Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted by the Copyright Designs and Patents Act 1988, no part of this publication may be repro- duced, stored or transmitted in any form or by any means, except with the prior permission in writing of the publisher, or in the case of reprographic reproduction, in accordance with the terms of the licences issued by the Copyright Licensing Agency. Enquiries for permission to reproduce material outside those terms should be directed to the publisher. All trade marks, registered names etc. acknowledged in this publication are the property of their respective owners. BCS and the BCS logo are the registered trade marks of the British Computer Society, charity number 292786 (BCS). Published by BCS Learning & Development Ltd, a wholly owned subsidiary of BCS, The Chartered Institute for IT, First Floor, Block D, North Star House, North Star Avenue, Swindon, SN2 1FA, UK. www.bcs.org PDF ISBN: 978-1-78017-4211 ePUB ISBN: 978-1-78017-4228 Kindle ISBN: 978-1-78017-4235 Paperback ISBN: 978-1-78017-4204 British Cataloguing in Publication Data. A CIP catalogue record for this book is available at the British Library. Disclaimer: The views expressed in this book are of the author(s) and do not necessarily reflect the views of the Institute or BCS Learning & Development Ltd except where explicitly stated as such. Although every care has been taken by the authors and BCS Learning & Development Ltd in the preparation of the publication, no warranty is given by the authors or BCS Learning & Development Ltd as publisher as to the accuracy or completeness of the information contained within it and neither the authors nor BCS Learning & Development Ltd shall be respon- sible or liable for any loss or damage whatsoever arising by virtue of such information or any instructions or advice contained within this publication or by any of the aforementioned. Publisher’s acknowledgements Reviewers: Martin Heyde and Dale McGleenon Publisher: Ian Borthwick Commissioning Editor: Rebecca Youé Production Manager: Florence Leroy Project Manager: Sunrise Setting Ltd Cover work: Alexander Wright Picture credits: ArtOlympic Typeset by Lapiz Digital Services, Chennai, India. iv Buy the complete book: www.bcs.org/books/digitalforensics CONTENTS List of figures viii Author ix Foreword x Acknowledgements xi Glossary xii Useful websites xvi Preface xviii INTRODUCTION 1 Incident response 2 Digital forensics 4 Why both? 6 Hands-on 6 How this book fits in 7 PART 1 INCIDENT RESPONSE 9 1. UNDERSTANDING INFORMATION SECURITY INCIDENTS 11 What is an information security incident? 11 Types of incident 12 Detecting security incidents 19 Why do security incidents happen? 25 Summary 27 2. BEFORE THE INCIDENT 28 Building the incident response playbook 28 Testing the playbook 34 Incident planning and compliance 37 Forensic readiness 38 Summary 39 3. THE INCIDENT RESPONSE PROCESS 40 Identification 41 Containment 52 Eradication 57 Recovery 59 Summary 59 v Buy the complete book: www.bcs.org/books/digitalforensics CONTENTS 4. THINGS TO AVOID DURING INCIDENT RESPONSE 60 Eradication and preservation 61 An incident from an incident 67 The blame game 69 It’s not over until it’s over 70 Summary 70 5. AFTER THE INCIDENT 71 Post mortem 71 Quantify the impact 76 Forensics 79 Summary 79 6. THE BUSINESS OF INCIDENT RESPONSE 81 Request for proposal 81 The power of PR 84 Mergers and acquisitions 87 Escape the technical bubble 87 Incident response service providers 88 Summary 90 PART 2 DIGITAL FORENSICS 91 7. INTRODUCING THE DIGITAL FORENSICS INVESTIGATION 93 The investigator 94 Forensics fundamentals 96 Arriving at an investigation 100 Investigative process 100 Summary 104 8. THE LAWS AND ETHICS OF DIGITAL FORENSICS 105 Crimes without borders 105 Laws applicable to forensics 107 Ethical considerations 115 Summary 116 9. DIGITAL FORENSICS TOOLS 117 Grab bag 117 Forensic hardware 120 Forensic software 124 Summary 128 10. EVIDENCE ACQUISITION BASICS 129 The hard disk drive 129 Removable media 134 Processing disk images 135 File systems 136 Operating systems 139 Files 143 vi Buy the complete book: www.bcs.org/books/digitalforensics CONTENTS Analysis of artefacts 144 Summary 146 11. CAPTURING A MOVING TARGET 147 Incident response and digital forensics 147 Live acquisition drivers 148 Live acquisition technique 152 Order of volatility 152 Network forensics 155 Summary 158 12. MEMORY FORENSICS 160 Understanding memory devices 160 Capturing 164 Analysis 166 Summary 168 13. CLOUD FORENSICS 169 Cloud computing terminology 169 Acquisition in the cloud 171 Container forensics 177 Forensics in the cloud? 178 Summary 178 14. MOBILE DEVICE FORENSICS 179 Mobile phone terminology 179 Seizing mobile devices 182 Acquisition types and tools 184 Smartphones 186 Summary 188 15. REPORTING AND PRESENTING YOUR FINDINGS 189 Layout and content 190 Audience 194 Summary 195 16. THE HUMAN ELEMENTS OF AN INVESTIGATION 196 Victims 196 Perpetrators 201 Investigators 203 Summary 204 Index 205 vii Buy the complete book: www.bcs.org/books/digitalforensics LIST OF FIGURES Figure 1.1 A command injection vulnerability is used to expose the Linux /etc/passwd file via a web application 18 Figure 1.2 The ExtraHop wire-data analytics platform 22 Figure 1.3 AlienVault’s OSSIM product 24 Figure 2.1 An example of a simple data flow diagram 32 Figure 3.1 ThreatConnect’s TC Analyze threat intelligence tool 50 Figure 4.1 Cb Response by Carbon Black, an example of a threat-hunting tool 65 Figure 13.1 The split in responsibility between cloud service provider and customer 171 viii Buy the complete book: www.bcs.org/books/digitalforensics AUTHOR Mike Sheward CISSP, CISM, CCFP-US, CISA, HCISPP, CEH, OSCP, CHFI is Director of Information Security at Seattle-based Accolade Inc., and runs a digital investigation consultancy, Secure Being LLC. Mike has worked in information security, primarily in incident response and digital forensics roles, in both the UK and USA, and in both the public and private sectors. ix Buy the complete book: www.bcs.org/books/digitalforensics FOREWORD Industry definitions have been in place for as long as there have been industries: auto, travel, finance, fashion or technology. But when the chief executive officer (CEO) of General Motors (GM) announces that they are hiring 12,000 IT engineers, the world has clearly changed. GM is no longer just a car company – it is a technology company. And the same could be written about companies in every industry. With technology comes opportunity, innovation and efficiency. And risk. Today, information security issues are more complex than most executives have the knowledge and experience to compre- hend, in just about every industry. The reality of today’s business climate is that information security needs to be a core focus of every business, in every industry. When every company in the world is a tech- nology company, every company requires the culture of awareness created by a strong information security focus. As a co-founder of Concur and the current CEO of healthcare tech company Accolade, I’ve had the pleasure of working with Mike Sheward for nearly 10 years, and in that time we’ve watched the haphazard scramble of companies working to leverage the power of the internet, followed almost immediately by massive information security incidents that put their customers and employees at risk. Throughout it all, Mike has been an excellent advocate and practitioner of information security while at the same time acknowledging the needs of a business to continue to innovate and move with pace. Information security in today’s age requires that balance. And it also requires the ability to partner with executive management as well as with every employee in the business to create a culture of awareness and vigilance. In my experience, there is no better practitioner of those skills than Mike Sheward. The lessons outlined in this book express those skills with Mike’s trademark dry English wit and I am confident you will find them valuable. Rajeev Singh CEO, Accolade x Buy the complete book: www.bcs.org/books/digitalforensics ACKNOWLEDGEMENTS A lot of people are responsible for supporting, encouraging and allowing me to work in this field that I love so dearly.