Introduction to Microsoft Windows Live Forensics Flashcards

1
Q

There are a number of reasons why the current contents of a live system and its volatile information are of great interest:

A
  • Assistance with static analysis
  • Obtain passwords, key material, unencrypted data
  • Reconstruct session and application information
  • Identify network traffic and applications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In other cases taking down a system is undesirable:

A
  • Forensic investigation may need to be conducted clandestinely
  • Mission-critical systems may not be shut down, or downtime must be kept to a minimum
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Most applications are not designed to minimise exposure of sensitive data in volatile memory:

A
  • Passwords, cryptographic material but also application data is typically retained
  • Even when memory is released, it is typically not overwritten for performance reasons
  • Particularly on relatively quiescent systems with large amounts of RAM, this can result in retention of data long after a process has finished
  • If such memory is re-used without being zeroed out, other processes may also leak this information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Most straightforward mechanisms for obtaining live memory require some level of operating system support:

A
  • Physical memory access, dumping of memory content

* This typically implies synchronisation or locking, but may not always be feasible or desirable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Live Imaging Techniques - Two key problems are unavoidable in this context:

A

Volatility: Even if the target system is frozen during a snapshot, some background volatility inevitably remains
Artefacts: The very fact that observations are conducted will result in artefacts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Live Imaging Tool - Networking:

A

Various network interface activity monitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Live Imaging Tool - Security:

A

Access rights checks, local and remote shares and access to these

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Live Imaging Tool - Processes:

A

Real-time DLL, thread and process activity monitoring and dependencies among components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Live Imaging Tool - System Information:

A

Review Active Directory structures, memory mapping, file handles, live kernel debugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Live Imaging Tool - File and Disk:

A

File system activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Live Imaging Tool - Disk2VHD:

A

Capture an image and convert it to a virtual drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Live Imaging Tool - Sysmon:

A

Allows logging and tracking of process activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Live Imaging Tool - ProDiscover IR:

A

Agent running on target system performs low-level capture of RAM and disk content. This accesses the low-level interfaces and does not make use of interpretation layers such as device driver but may still be susceptible to subversion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Live Imaging Tool - EnCase:

A

OpenTex EnCase are parts of Open Text offerings. Law enforcement modules also capture memory and kernel structures whilst running an agent on local systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Live Imaging Tool - FTK:

A

Access Data’ Forensic Toolkit also memory capture using an agent-based architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

More tools on Windows systems will go through regular APIs:

A

1) ReadFile
2) Transition to kernel mode, call via KiSystemService
3) Call to NtReadFile, call to I/O subsystem and generation of IRP in the I/O Manager
4) Calls to file system drivers, volume managers
5) Calls to disk drivers, port drivers, miniport drivers

17
Q

The Blue Screen of Death crash dumps provide valuable information as do applications:

A
  • These also suffer from similar problems as tools for live forensics
  • One key issue is that of consistent kernel virtual memory dumps - this is possible only when the system is halted and even then is incomplete
  • Tools such as WinDD and Fast Dump Pro can also help, but are rather more crude than the commercial offerings