Wednesday, March 14, 2012

Incident Response Essentials p1

Obviously there are multiple layers and scenarios to consider when responding to incidents. And the tools you use to detect/collect/analyze/mitigate really depend on the threat scenario.

So what are the basics?  What do I need for the bare minimum for response operations? (w/ a focus on Windows systems)

Below is a list of the items I like to collect for response operations: (your mileage may vary)
  • $MFT- Master File Table for later parsing/analysis
  • Prefetch files
  • ntuser.dat(s) - just grab em all...
  • AutoRuns - reg entries/startup folders/services/etc.
  • Network info - ipconfig/netstat - dnscache - hosts file
  • Event Logs - OS logs - AV logs - other app logs (if applicable)
  • Scheduled Tasks 
  • Loaded DLLs
  • Memory Dumps**  If possible I like to capture the running memory from the system if space and time allows. A lot of good stuff can be pulled out of running memory if you want to learn about the malware/attack more. Will go deeper into this topic in a later post.
BTW, you can get this information easily utilizing some scripting and free tools. I'll cover those tools (free & not free) in another blog post.


No comments:

Post a Comment