+ All Categories
Home > Technology > Forensics for the Defense

Forensics for the Defense

Date post: 28-Nov-2014
Category:
Upload: hurricane-labs
View: 819 times
Download: 0 times
Share this document with a friend
Description:
Forensic techniques are not just for law enforcement. You need to supplement your existing security package and provide evidence of due diligence in the event of an incident. Test your security before someone else does.
26
Tom Kopchak orensics for the Defense (of your network)
Transcript
Page 1: Forensics for the Defense

Tom Kopchak

Forensics for the Defense (of your network)

Page 2: Forensics for the Defense

•Who am I?

•Why am I here, and what got me here?

•Why I am passionate about computer security?

About the Presenter – Who am I?

Page 3: Forensics for the Defense

You do "forensics"?!? That sounds awesome!!

Page 4: Forensics for the Defense

The Truth• Evidence can be hard to come by

• Any and all evidence must be carefully accounted for and documented

• Cases involving movie-like circumstances are few and far between

Page 5: Forensics for the Defense

Forensics = Valuable• Traditional - Law enforcement

• Emerging - Security

Page 6: Forensics for the Defense

Traditional Forensics – Disks

Page 7: Forensics for the Defense

Next Steps – Memory

Page 8: Forensics for the Defense

Expanding the Scope

Page 9: Forensics for the Defense

Leveraging Forensics for Business

Page 10: Forensics for the Defense

Commonalities

Page 11: Forensics for the Defense

Practical Applications

Page 12: Forensics for the Defense

• Forensic Verification

• Forensic Penetration Testing

• Malware/Exploit/Breach Analysis

Practical Applications

Page 13: Forensics for the Defense

A word of caution...• Permission!

Page 14: Forensics for the Defense

Why Forensics?• Security is not a checkbox

• Simulate attack

• Identify shortcomings

Page 15: Forensics for the Defense

Forensic Verification• Applications might store temporary/cached data

• PCI implications

Page 16: Forensics for the Defense

Test Configuration• Control image

• Test Cases

• Analysis

Page 17: Forensics for the Defense

Encrypted Laptop – Stolen!

It’s safe, right?

Page 18: Forensics for the Defense

The Solution – Forensics Penetration Testing

Zero Knowledge vs. Authenticated Testing

Page 19: Forensics for the Defense

The Real Test

Fully Encrypted – Administrator Confidence 100%

Page 20: Forensics for the Defense

Starting the Attack

Machine Powered Off – Full Disk Images Created

Page 21: Forensics for the Defense

Breakthrough

• Grace period for pre-boot authentication lockout

Page 22: Forensics for the Defense

Mounting the attack

Downgrade memory – Leverage DMA – Exploit OS

Result: Full Admin Access to Entire System

Page 23: Forensics for the Defense

Failure of Encryption?

• Encryption Did Not Fail!

• Convenience vs. Security

• Zero knowledge attack

Page 24: Forensics for the Defense

Forensics for the Defense – One System at a Time

• System vulnerabilities unknown until tested

• Forensic Penetration testing = same purpose as traditional penetration test

• Learn and improve from mistakes

Page 25: Forensics for the Defense

Conclusions• Forensic techniques are

not just for law enforcement

• Supplement your existing security package

• Provide evidence of due diligence in the event of an incident

• Test your security before someone else does

Page 26: Forensics for the Defense

Wrap Up/QA


Recommended