Step 1: Incident Response Preparation.
Step 2: Incident Documentation.
Step 3: Policy Verification.
Step 4: Volatile Data Collection Strategy.
Step 5: Volatile Data Collection Setup.
Step 6: Volatile Data Collection Process.
These steps are designed to be used by an investigator to investigate
intrusion cases common to larger networks. For purposes of this document, our focus is on
Step 6. Steps in the Volatile Data Collection Process Step 6, Volatile Data
Collection Process, involves the following five steps:
- Collect uptime, date, time, and command history for the security incident.
- As you execute each forensic tool or command, generate the date and time to establish an audit trail.
- Begin a command history that will document all forensic collection activities.
- Collect all types of volatile system and network information.
- End the forensic collection with date, time, and command history.
- Maintain a log of all actions conducted on a running machine.
- Photograph the screen of the running system to document its state.
- Identify the operating system running on the suspect machine.
- Note date and time, if shown on screen, and record with the current actual time.
- Dump the RAM from the system to a removable storage device.
- Check the system for the use of whole disk or file encryption.
- Collect other volatile operating system data and save to a removable storage device.
- Determine evidence seizure method (of hardware and any additional artifacts on the hard drive that may be determined to be of evidentiary value).
- Complete a full report documenting all steps and actions taken.
These basic
steps allow the on-scene investigator to collect data that was previously overlooked
as unnecessary or simply lost out of ignorance. Open source and commercial tools
are currently available that easily allow for this methodology to be followed
on a running system. The RAM is dumped first to capture the greatest amount of
evidence available. It must be noted that inserting any device into the running
system (flash drive, removable drive, or CD) will make minor changes to the
system, albeit very small changes. The proper use of these tools does not add
evidence or contraband to the system. Running a program to dump the RAM
requires that a very small amount of RAM be occupied by the tool to conduct the
RAM dump. Inserting a removable drive into a USB port adds an entry to the
Microsoft Registry. All of these changes have no effect on the overall state of
the evidence and can be further documented at a later time by a traditional
forensic examination. Some small changes are made during the process of using
some of the available tools that require interaction with the Windows operating
system. These changes however, occur to the operating system files only and do
not fundamentally change the content of the data saved on the system.
- Step 1: Incident Response Preparation.
- Step 2: Incident Documentation.
- Step 3: Policy Verification.
- Step 4: Volatile Data Collection Strategy.
- Step 5: Volatile Data Collection Setup.
- Step 6: Volatile Data Collection Process.
These steps are designed to be used by an investigator to investigate
intrusion cases common to larger networks. For purposes of this document, our focus is on
Step 6. Steps in the Volatile Data Collection Process Step 6, Volatile Data
Collection Process, involves the following five steps:
- Collect uptime, date, time, and command history for the security incident.
- As you execute each forensic tool or command, generate the date and time to establish an audit trail.
- Begin a command history that will document all forensic collection activities.
- Collect all types of volatile system and network information.
- End the forensic collection with date, time, and command history.
- Maintain a log of all actions conducted on a running machine.
- Photograph the screen of the running system to document its state.
- Identify the operating system running on the suspect machine.
- Note date and time, if shown on screen, and record with the current actual time.
- Dump the RAM from the system to a removable storage device.
- Check the system for the use of whole disk or file encryption.
- Collect other volatile operating system data and save to a removable storage device.
- 8. Determine evidence seizure method (of hardware and any additional artifacts on the hard drive that may be determined to be of evidentiary value).
- Complete a full report documenting all steps and actions taken.
Nice blog post on incident response. Incident response tools can help automate your security. Thanks for sharing
ReplyDelete