0% found this document useful (0 votes)
19 views30 pages

CH 10

Uploaded by

Sayan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views30 pages

CH 10

Uploaded by

Sayan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

Guide to Computer Forensics

and Investigations
Sixth Edition

Chapter 10
Virtual Machine Forensics, Live Acquisitions, and
Network Forensics

1
An Overview of Virtual Machine Forensics

• Virtual machines are common for both personal and business use
• Investigators need to know how to analyze them and use them to analyze other
suspect drives
• The software that runs virtual machines is called a “hypervisor”
• Two types of hypervisor:
• Type 1 - loads on physical hardware and doesn’t require a separate OS
- Type 1 hypervisors are typically loaded on servers or workstations with a lot of RAM
and storage
• Type 2 - rests on top of an existing OS
- Type 2 hypervisors are usually the ones you find loaded on a suspect machine

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 2
classroom use.
Type 2 Hypervisors (1 of 2)

• Before installing a type 2 hypervisor, enable virtualization in the BIOS before


attempting to create a VM
• Virtualization Technology (VT) - Intel’s CPU design for security and performance
enhancements that enable the BIOS to support virtualization
• Virtualization Machine Extensions (VMX) - instruction sets created for Intel
processors to handle virtualization

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 3
classroom use.
Type 2 Hypervisors (2 of 2)

• Most widely used type 2 hypervisors:


• Parallels Desktop - created for Macintosh users who also use Windows applications
• KVM (Kernel-based Virtual Machine) - for Linux OS
• Microsoft Hyper-V - new hypervisor built into Windows 10
• VMware Workstation and Player - can be installed on almost any device, including
tablets
- Can install Microsoft Hyper-V Server on it
- Can create encrypted VMs
- Can support up to 16 CPUs, 8 TB storage, and 20 VM
• VirtualBox - supports all Windows and Linux OSs as well as Macintosh and Solaris
- Allows selecting types associated with other applications, such as VMware VMDK
type or the Parallels HDD type
• Type 2 hypervisors come with templates for different OSs

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 4
classroom use.
Conducting an Investigation with Type 2
Hypervisors (1 of 7)
• Begin by acquiring a forensic image of the host computer as well as network
logs
• By linking the VM’s IP address to log files, you may determine what Web sites the VM
accessed
• To detect whether a VM is on a host computer:
• Look in the Users or Documents folder (in Windows) or user directories (in Linux)
• Check the host’s Registry for clues that VMs have been installed or uninstalled
• Existence of a virtual network adapter

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 5
classroom use.
Conducting an Investigation with Type 2
Hypervisors (2 of 7)

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 6
classroom use.
Conducting an Investigation with Type 2
Hypervisors (3 of 7)
• In addition to searching for network adapters, you need to determine whether
USB drives have been attached to the host
• They could have live VMs running on them
• A VM can also be nested inside other VMs on the host machine or a USB drive
• Some newer Windows systems log when USB drives are attached
• Search the Windows Registry or the system log files

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 7
classroom use.
Conducting an Investigation with Type 2
Hypervisors (4 of 7)

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 8
classroom use.
Conducting an Investigation with Type 2
Hypervisors (5 of 7)
• Follow a consistent procedure:
• 1. Image the host machine
• 2. Locate the virtualization software and VMs, using information learned about file
extensions and network adapters
• 3. Export from the host machine all files associated with VMs
• 4. Record the hash values of associated files
• 5. Open a VM as an image file in forensics software and create a forensic image or
mount the VM as a drive

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 9
classroom use.
Conducting an Investigation with Type 2
Hypervisors (6 of 7)
• Live acquisitions of VMs are often necessary
• They include all snapshots, which records the state of a VM at a particular moment
(records only changes in state, not a complete backup)
• When acquiring an image of a VM file, snapshots might not be included
• In this case, you have only the original VM
• Doing live acquisitions of VMs is important to make sure snapshots are
incorporated

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 10
classroom use.
Conducting an Investigation with Type 2
Hypervisors (7 of 7)
• Other VM Examination Methods
• FTK Imager, Magnet AXIOM and OSForensics can mount VMs as an external drive
- By mounting a VM as a drive, you can make it behave more like a physical computer
- Allows you to use the same standard examination procedures for a static hard drive
• Make a copy of a VM’s forensic image and open the copy while it’s running
- Start it as a live VM so that forensics software can be used to search for clues

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 11
classroom use.
Working with Type 1 Hypervisors (1 of 2)

• Having a good working relationship with network administrators and lead


technicians can be helpful
• Type 1 hypervisors are installed directly on hardware
• Can be installed on a VM for testing purposes
• Capability is limited only by the amount of available RAM, storage, and throughput

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 12
classroom use.
Working with Type 1 Hypervisors (2 of 2)

• Common type 1 hypervisors:


• VMware vSphere
• Microsoft Hyper-V 2016
• XenProject XenServer
• IBM PowerVM
• Parallels Desktop for Mac

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 13
classroom use.
Performing Live Acquisitions (1 of 2)

• Live acquisitions are especially useful when you’re dealing with active network
intrusions or attacks
• Live acquisitions done before taking a system offline are also becoming a
necessity
• Attacks might leave footprints only in running processes or RAM
• Live acquisitions don’t follow typical forensics procedures
• Order of volatility (OOV)
• How long a piece of information lasts on a system

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 14
classroom use.
Performing Live Acquisitions (2 of 2)

• Steps
• Create or download a bootable forensic CD or USB drive
• Make sure you keep a log of all your actions
• A network drive is ideal as a place to send the information you collect
• Copy the physical memory (RAM)
• The next step varies, depending on the incident you’re investigating
• Be sure to get a forensic digital hash value of all files you recover during the live
acquisition

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 15
classroom use.
Performing a Live Acquisition in Windows

• Several tools are available to capture the RAM.


• Mandiant Memoryze
• Belkasoft RamCapturer
• Kali Linux (updated version of BackTrack)
• GUI tools are easy to use
• But they often require a lot of system resources
• Might get false readings in Windows OSs
• Command-line tools give you more control

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 16
classroom use.
Network Forensics Overview

• Network forensics
• Process of collecting and analyzing raw network data and tracking network traffic
- To ascertain how an attack was carried out or how an event occurred on a network
• Intruders leave a trail behind
• Knowing your network’s typical traffic patterns is important in spotting variations in
network traffic
• Can also help you determine whether a network is truly under attack

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 17
classroom use.
The Need for Established Procedures

• Network forensics examiners must establish standard procedures for how to


acquire data after an attack or intrusion
• Essential to ensure that all compromised systems have been found
• Procedures must be based on an organization’s needs and complement
network infrastructure
• NIST created “Guide to Integrating Forensic Techniques into Incident Response”
to address these needs

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 18
classroom use.
Securing a Network (1 of 2)

• Layered network defense strategy


• Sets up layers of protection to hide the most valuable data at the innermost part of
the network
• Defense in depth (DiD)
• Similar approach developed by the NSA
• Modes of protection
- People
- Technology
- Operations

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 19
classroom use.
Securing a Network (2 of 2)

• Testing networks is as important as testing servers


• You need to be up to date on the latest methods intruders use to infiltrate
networks
• As well as methods internal employees use to sabotage networks
• Small companies of fewer than 10 employees often don’t consider security
precautions against internal threats necessary
• Can be more susceptible to problems caused by employees revealing proprietary
information

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 20
classroom use.
Developing Procedures for Network
Forensics (1 of 2)
• Network forensics can be a long, tedious process
• Standard procedure that is often used:
• Always use a standard installation image for systems on a network
• Fix any vulnerability after an attack
• Attempt to retrieve all volatile data
• Acquire all compromised drives
• Compare files on the forensic image to the original installation image

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 21
classroom use.
Developing Procedures for Network
Forensics (2 of 2)
• In digital forensics
• You can work from the image to find most of the deleted or hidden files and partitions
• In network forensics
• You have to restore drives to understand attack

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 22
classroom use.
Reviewing Network Logs

• Network logs record ingoing and outgoing traffic


• Network servers
• Routers
• Firewalls
• Tcpdump and Wireshark - tools for examining network traffic
• Can generate top 10 lists
• Can identify patterns

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 23
classroom use.
Using Network Tools

• Variety of tools
• Splunk
• Spiceworks
• Nagios
• Cacti

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 24
classroom use.
Using Packet Analyzers
• Packet analyzers
• Devices or software that monitor network traffic
• Most work at layer 2 or 3 of the OSI model
• Most tools follow the Pcap (packet capture) format
• Some packets can be identified by examining the flags in their TCP headers
• Tools
• Tcpdump
• Tethereal
• Tcpslice
• Tcpreplay
• Etherape
• Netdude
• Argus
• Wireshark
© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 25
classroom use.
TCP Header

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 26
classroom use.
IP Header

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 27
classroom use.
Investigating Virtual Networks

• Virtual switch is a little different from a physical switch


• There’s no spanning tree between virtual switches
• Additional complications
• Hypervisors can assign MAC addresses to virtual devices
• Devices can have the same MAC address on different virtual networks
• Cloud service providers host networks for several to hundreds of companies
• Tools
• Wireshark
• Network Miner

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 28
classroom use.
Examining the Honeynet Project (1 of 2)

• The Honeynet Project was developed to make information widely available in


an attempt to thwart Internet and network attackers
• Provides information about attacks, methods and how to protect against them
• Objectives are awareness, information, and tools
• Distributed denial-of-service (DDoS) attacks
• A major threat that may go through other organizations’ networks, not just yours
• Hundreds or even thousands of machines (zombies) can be used

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 29
classroom use.
Examining the Honeynet Project (2 of 2)

• Zero day attacks


• Another major threat
• Attackers look for holes in networks and OSs and exploit these weaknesses before
patches are available
• Honeypot
• Normal looking computer that lures attackers to it
• Honeywalls
• Monitor what’s happening to honeypots on your network and record what attackers
are doing

© 2019 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for 30
classroom use.

You might also like