WiebeTech RTX800-UR Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour PC/postes de travail WiebeTech RTX800-UR. Datagram-and-Vidiot Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer

Résumé du contenu

Page 1 - Forensics

Volatile MemoryForensicsby datagram & VidiotMay 18, [email protected][email protected]

Page 2 - About Us

Software Dumping• UNIX/Solaris: /dev/mem• Linux: /proc/kcore, /dev/mem• OS X: /var/vm, /dev/mem*• Windows: \\.\PhysicalMemory*• e.g.dd if=/dev/mem of=

Page 3 - Our Agenda

Software Preparation• Create trusted toolkit– Statically compiled binaries (gcc –static) • Prepare remote system (for nc) • Consider scripts• Understa

Page 4 - Live Forensics?

Software Basics• Gather live info :) • Use trusted commands– statically compiled, read only media• Remember $PATH!• nc/cryptcat data to remote system–

Page 5 - Good…and Bad

Software Basics• Rootkit hunting:– chkrootkit– rkhunter*– Hunter.o (kernel mod) – 99luftballons– Manual inspection

Page 6 - In-Memory Data

Offline Dump Analysis• More or less Rev. Eng• String searching• Carving• Interpreting Kernel structures

Page 7 - Live Forensics Process

String Searching• Tried and true : ) – strings –a –t x dump.img– grep * dump.img• Specialized Algorithms: EnCase, etc• Hilarious (sometimes)

Page 8 - Memory Dumping

Hilarity Often Ensues696195554 ]0;newb@x:/dev/shm/newb/newb <--------------Full path from PS1 696195591 [newb@x newb]$ rm -rf acycmech.tar69619567

Page 9 - Hardware Dumping

Hilarity Often Ensues (2) • Attempts at logging out:696194744 [newb@x acycmech]$ unset HISTFILE;exit696194789 logout696194797 There are stopped jobs.6

Page 10 - Software Dumping

File Carving• Grab memory-mapped files• Affected by Kernel security• Free tools: Scalpel, Foremost• Commercial: EnCase, FTK, etc.

Page 11 - Software Preparation

Interpreting Kernel Structures• Un-fucking /dev/mem--/proc/kcore dump• Few ready-to-use Linux tools… : (• IDETECT (http://forensic.seccure.net) • Read

Page 12 - Software Basics

About Us• We really don’t have time for this– it would suck anywaysP.S. – We like beer.

Page 13

Cold Boot Attacks• Not our research• Developed at Center for Information Technology Policy, Princeton University– Read: “Lest We Remember: Cold Boot A

Page 14 - Offline Dump Analysis

Cold Boot Attacks• DRAM remanence effects– Different from the Gutmann “burn in” effect.– Assuming memory loss is instantaneous = FAIL– Memory decay oc

Page 15 - String Searching

Cold Boot Attacks5 sec. 30 sec. 60 sec. 5 min.Image excerpt from: Lest We Remember: Cold Boot Attacks on Encryption Keys, Princeton University, 2008,

Page 16 - Hilarity Often Ensues

Cold Boot Attacks• 3 Types of attack– Reboot to custom kernel• Pros: Fast and easy• Cons: Data destruction during OS shutdown, potential to overwrite

Page 17 - Hilarity Often Ensues (2)

Cold Boot Attacks• Locating keys in memory dump– Search for known contents or known structure– Example: Locating an RSA private key• Searching memory

Page 18 - File Carving

Cold Boot Attacks• Hamming Distance– The number of positions for which the corresponding symbols are different between two strings of equal length.– F

Page 19 - Structures

Countermeasures• Scrubbing memory– Avoid storing keys in memory and overwrite them when no longer needed.– Alternatively, systems can be configured to

Page 20 - Cold Boot Attacks

Countermeasures• Pass/key required to wake system– Suspending (sleep mode) a system will not protect keys already in memory.– Hibernation mode also vu

Page 21

Countermeasures• Avoid precomputation– Precomputing can speed cryptographic operations, but often leads to redundant storage of key information.• Key

Page 22 - 5 sec. 30 sec. 60 sec. 5 min

Countermeasures• Architectural changes– Build DRAM with faster decay rate– Build key management hardware into motherboard– Encrypt the contents of RAM

Page 23

Our Agenda• What is Live Forensics?• Live Forensic Process• Hardware vs. Software• Offline Analysis Basics• Cold Boot Attacks (the new hotness) • Coun

Page 24

Countermeasures• Encryption in disk controller– Enable a write-only key register into which software can write a user derived symmetric key.– Data blo

Page 25

Countermeasures• Advances in Trusted Computing– Current TPM’s do not implement bulk encryption• Instead they monitor the boot sector to determine if i

Page 26 - Countermeasures

Countermeasures• Physical Defenses– Encase RAM (epoxy, etc) to frustrate transplant attack.– Trip switches, accelerometers, motion sensors, RFID, etc.

Page 27

Conclusions• Exercise caution• Understand your actions• Not a solution, an addition• Think about physical security• Have fun• Good luck!

Page 29

More!• Google :D• Mariusz Burdach, (forensic.seccure.net) – IDETECT tool• Joanna Rutkowska, Black Hat Feb 2007– Anti-DMA Forensics Attacks• FATKit fra

Page 30

What isLive Forensics?

Page 31

Good…and BadGood…• Scope of information• Availability• Combats modern anti-dead forensicsBut…• No data integrity• All actions affect memory• Cannot be

Page 32

In-Memory Data• Running Kernel/modules info• Running/dead processes• Network connections/configuration• Memory-mapped files• User logins• Firewall set

Page 33 - Conclusions

Live Forensics Process• Regular rules apply : ) • Dump live memory (software/hardware) • Gather volatile data (software) – Optional• Offline analysis

Page 34 - Q&A?

Memory Dumping• Hardware– Custom hardware devices– Access memory directly (DMA) – Can also be cheated : (• Software– Trusted toolkit– WILL alter memor

Page 35

Hardware Dumping• DMA can subvert OS• Custom DMA device– PCI, PCMCIA, USB, Firewire– http://www.csoonline.com/read/050106/ipods_pf.html• But…can be de

Commentaires sur ces manuels

Pas de commentaire