NCDAA Seminar: Digital Forensics AM Session
Total Page:16
File Type:pdf, Size:1020Kb
NCDAA Seminar: Digital Forensics AM Session: Understanding the Data Context & Correlation Professor Matthew Miller, PhD University of Nebraska Kearney PM Session: Context & Correlation Shawn Kasal, Digital Forensic Expert 12 Points Technologies LLC Wednesday, October 9, 2019 Embassy Suites Hotel – La Vista Conference Center This page intentionally left blank. Text ~Learning ~ Outcomes INTRODUCTION • DOD • NC4 Cybercop • In-Q-Tel at University of Nebraska Kearney and Omaha • Expert Witness • GM, Ford Motor Company and Daimler Benz What does it take to construct, design and build a work product? A mix of ability, talent and skill is needed to construct and de- construct systems A system is larger and more complex than a computer network GeoPolitics is a system Our diversity, talent & backgrounds Our Team allow us to accomplish what others can not do. Arab Spring Election Reality Winner JP 3-13 • Computer Network Operations (CNO) consist of: • Computer Network Attack (CNA) • Computer Network Defense (CND) • Computer Network Exploitation (CNE) Computer Network Operations (CNO) • Broad term • Military and civilian application • Information is power • More critical decision-based information is digitized and conveyed over an ever- expanding network of computers and other electronic devices • Deliberate actions taken to leverage and optimize these networks to improve human endeavor and enterprise or, in warfare, to gain information superiority and deny the enemy this enabling capability CNO ≈ CNA ≈ CND ≈ CNE • What’s the difference? • Computer Network Operations • Computer Network Attack • Computer Network Defense • Computer Network Exploitation Computer Network Attack (CNA) • Includes actions taken via computer networks to: • Disrupt • Deny • Degrade • Destroy Computer Network Defense(CND) • Includes actions taken via computer networks to: • Protect • Monitor • Analyze • Detect • Respond Computer Network Exploitation(CNE) • Includes enabling actions to: • Gather Intelligence • Exploited Data • From Target or Adversary • Information Systems or Networks Cyber Threat Intelligence Cyberwarfare Digital Forensic Incident Response (DFIR) OSINT Legal Aspects from criminal defense and civil litigation Fall out Growth of Cybersecurity Companies Cyber Threat Focus Cyber Threat Intelligence Real-Time Cyberthreat Mapping Every cyber attack is related to geopolitical conditions Fire Eye CEO Kevin Mandia Google hired Fire Eye to protect against state-sponsored cyber attack. The “dead reality” - every major cyberattack is state condoned. Whoa, slow your roll Rock Starz! Before we can get to the shell-poppin’ ‘make da sexy-time’ (joke) {Borat} hacking adventures that Red/Blue Teams have come to be known for, there is some homework to be done. OSINT A professional Investigator: 1. Intel gathering 2. Identify weakness & potential vulnerability 3. Evaluate exploitability These may be physical, social engineering, logical or a combination. Information is the new exchange commodity and such, there is literally a plethora of information about almost any subject freely available on the Internet or in the Public Domain. What exactly does OSINT mean? OSINT Open-source intelligence (OSINT) is using publicly available sources to collect information (i.e., intelligence) about persons or entities from a wide array of sources including the Internet. OSINT is usually performed during the Reconnaissance phase of hacking and pertinent information collected from this phase is carried over into the network Enumeration phase. Due to the vast amounts of information available to sift through on the Web, attackers must have a clear and defined search framework as well as a wide array of OSINT collection tools to facilitate this task and assist with processing the data; otherwise they risk getting lost in the overwhelming sea of information that has become the Internet. OSINT reconnaissance can be further broken down into the following 5 sub-phases: Phases of the OSINT Process; image courtesy of Chiheb Chebbi Source Identification • Starting point of this initial phase • Attacker identifies potential sources from which information may be gathered • Sources internally documented throughout process • Detailed notes for documentation & reference Data Harvesting • Attacker collects • Attacker harvests • From various available sources Data Processing & Integration • Attacker processes collected information • Seeks actionable intelligence • Identifies targeted information • Integrates Data Analysis • Attacker performs data analysis • Uses a variety of OSINT tools Results Delivery • OSINT Analysis is complete • Findings presented and/or reported to other members of the Red Team Legalese • While performing OSINT is legal, using the OSINT tools & techniques outlined here are intended to be used in conjunction with sanctioned Red Team activities as part of a contracted service & with the permission of the target. • You should always protect yourself with a contract that is signed giving permission to “hack” their organization for the purposes of vulnerability assessment. • NEVER skip this step OSINT TOOLS • Both free & paid OSINT tools available • Using OSINT, you identify information using tools & pull any threads that may lead you to another avenue of investigation • OSINT tools can look at the tech aspect or personal aspect of a person or corporation • Buckle up Google Search & Dorking • You can explore a targeted webpage the old fashioned way - by clicking through link by link by link • But what aren’t you seeing? What are you missing? • With specialized searches you can identify more about the pages on that site, as well as outgoing and incoming links, documents and other files Personal Identifying Information (PID) • Some sites publish compiled PID. PID comes from the data harvested by the ad industry • PID = Name(s), Relatives, address, date of birth, where you lived in the past, work history, income, etc. • Spokeo, Family Tree Now, Pipl, That’s Them, IntelTechniques, ZoomInfo, ZabaSearch, US Search, Snoop Station & Radaris • As a Red Team member, you should regularly run yourself through these tools to minimize your damaging PID footprint Maltego by Paterva • Paid & Free versions that can investigate relationships between people, organizations (businesses) & website infrastructure • Query personal information, social media footprint & interactions, DNS records, WhoIs, IPs, net blocks, search engines, API, corporate data, off shore leaks db, cryptocurrency, affiliations, documents & files • Maltego helps you visualize these relationships in various formats • For the geek in you, it is also possible to manually input data for complex visualizations or to create your own machines Social Media • Social Media sites are full of a wealth of personal information • LinkedIn, Facebook, Twitter, Instagram, Snapchat, Peerlyst, Google+, etc • SM should be one of the first stops for a Red Team • LinkedIn = ScrapedIn Facebook = StalkScan Twitter = GeoChirp, TweetsMap, Creepy for geolocation Tinfoleak for images • Dating sites: Tinder, OKCupid, Match.com, eHarmony, Plenty of Fish, Ashley Madison, Grindr Deep Web • The Deep Web consists of websites that are not regularly indexed • Search engines: PubPeer, Google Scholar, Cornell University’s arXiv.org & Harvard’s Think Tank Search • Main focus: Articles, white papers, studies, research and thesis that publish primarily in academic and professional journals Dark Web • Search Engines: DeepDotWeb, Reddit Deep Web, Reddit DarkNetMarkets, Hidden Wiki, Core.onion (Tor browser) & Tor Scan • Some sites & services on the dark web are invitation only & this can make them hard to find • Network travel pattern analysis from within the Dark Web is the only way to find them • Browsers: Tor, FreeNet, I2P Limited to your Imagination • OSINT is only limited to your imagination • You can use these tools, add others, mix and match and get creative • Tweak your tools and methods to your own needs • More tools are found in Linux - Kali & BlackArch distributions • At the end of your OSINT collection, you should have plenty of information to enumerate in the next phase Phases • Phase 1: Open Source Intelligence • Phase 2b: Host Recon: Host, host Reconnaissance controls & logging, host controls bypass, tools transfer, short term persistence, host privilege • Phase 2: Enumeration escalation, credential theft • Phase 2a: External Recon: Passive • Phase 2c: Internal Recon: Network, information gathering, active domain, asset, admin, network information gathering, port security scanning, service enumeration, network/application vulnerability identification Phases • Social Engineering Attacks: Spear • Maintaining Dominance: Gain phishing domain admin, gain asset admin, sensitive asset access, exfiltrate sensitive data, long-term • Privilege escalation persistence • Lateral Movement: Evade network • Exfiltration techniques security controls, network exploitation, elevate network privileges • Evasion & obfuscation techniques • Attacking Linux/Unix environments • Virtualization attacks Loose Lips & all that Jazz In the air on the land and sea: CYBER! After this Course, You Should Be Able To: • Explain the origins of forensic science • Explain the difference between scientific conclusions & legal decision-making • Explain the role of digital forensics & its relationship to traditional forensic science, traditional science & appropriate use of scientific methods • Outline a range of situations where digital forensics may be applicable • Identify & explain at least 3 current issues in