On Monday October
1st, I attended the European edition of the SANS DFIR Summit in Prague.
Normally I try to attend this in Austin, however this year I couldn't
make it so attended this one later in the year instead. I took a couple days
PTO just to spend some time seeing the sights and it was cool getting to take
time visiting the historical sights, instead of my typical shut in routine. If you have
time, I would highly recommend this and definitely book a night time river cruise. Also worth noting, the new Spiderman movie was filming last week which was kinda cool.
A few other
recommendations I would make, would be to stay closer to the city center and
take the subway daily. This has the added benefit of staying at a nicer,
more western hotel (eg Marriott, Hilton), but also being near the old town
square. I'm staying at the Angelo Hotel, but the training is actually split
between two hotels and I don't get the benefit of being able to quickly jet up
the elevator to my room on breaks if I need to.
This year SANS
decided to make the talks shorter and limit the ability to ask questions. I
totally get why they are doing this, to compact in more presentations, however
it wouldn't be my choice. Not only is 30 minutes per talk a little too short,
having to leave and miss a talk to ask the speaker questions isn't optimal.
Jess Garcia
(@j3ssgarcia) kicked off the event and did a great job throughout introducing
the speakers and also covering logistics.
Renato Marinho
(@renato_marinho) gave a very relevant talk on Cryptoacking. He discussed how
he is seeing cyber criminals operate in groups and sharing the burden of mining,
but also the rewards when one of the hashes is matched. He reconstructed a
recent campaign leveraging XMRig and Monero that targeted vulnerable Weblogic
servers. He runs a honeypot as a part of his research and confirmed to me, he
still hasn't seen attackers elevating privileges to patch servers and
keep them all to themselves. Instead other attackers jump on the resource often
leading to detection.
Mattia Epifani
(@mattiaep) gave a talk that was very timely and relevant to my situation. It
was on building your own mobile forensic methodology. His practical approach
broke things up into 4 sections (needs, knowledge, workflow, and methodology).
He referenced the site, imei.info, which can provide great information on a
phone, while being passive. He believes android's latest release, Oreo, makes
recovery of deleted files impossible. He discussed a possible method of
leveraging an AppleTV, which has no password protection, to collect iCloud
information that is shared from a phone, table, or other mac device. Mattia
also referenced digitalforensiccompass.com, which will tell you if a particular
device is supported by forensic tools. Then he walked through about 10 cases
where he did not have the PIN code, but was still able to gain access and do
analysis. This was likely my favorite talk of the conference.
Jason Jordaan,
pronounced Jor-Dawn (@DFS_Jason) covered the need for an evidence
classification model. And really who can argue with that, we all use different
terms, different approaches, and there is a complete dearth of standards. He
prefers to break of evidence into filesystem, OS, App, and User-created, which
makes perfect sense. He also incorporated network evidence, but interesting not
log evidence. The reason being, is that on the source device its actually OS or
Application evidence. Since often as a responder you won't get access to the
source device of all log data in your case, I'm not sure this makes a ton of
sense (e.g. vpn, badge, camera, etc). He also mentioned the Case/UCO project or
Cyber-investigation Analysis Standard Expression & Unified Cyber Ontology.
Olaf Schwarz
(@b00010111) presented on his Project SIRF, which aims to help the part time
incident responder. He talked about the GDPR's requirements for data deletion
which is "reasonable deletion" of data, not advanced, multi-pass,
military grade device destruction into dust. The first attempt at doing this
was to delete the encryption key, but this failed because the master key was
still available. He determined that actually zeroing out the data was 5x faster
than re-encrypting with a new throw away key. He also brought up Mattermost,
which I had not heard of, as being something that is gaining traction by IR
teams. In his jump kit, he chose a Lenovo P320 tiny over a Skull Canyon and MSI
Nightblade. He stated the NUC doesn't have as good of tech specs and MSI is too
heavy. He also chose ESXi for virtualization due to VirtualBox not allowing
free commercial use.
Matt Suiche
(@msuiche) of DumpIt fame, gave an update to his previous talk on
ShadowBrokers. He walked the attendees through a timeline of activities, which
include direct correspondence with them. This included mention of a blog post
alleging the NSA compromised the SWIFT network. He also talked about the
pending Swift 7.2 upgrade (November 2018), which is requiring banks to upgrade
not just software, but hardware. But sadly, doesn't include OS hardening
requirements. There was also some talk about the exponential growth of
offensive-oriented commercial cyber companies.
Adam Harrison
(@harrisonamj) did a talk on the ExFAT filesystem. He recommended updating the
Fuse driver in SIFT to get a more accurate timestamp granularity. FTK imager
lite gives incorrect timestamps, whereas FTK 4.1 is accurate. Like many of
us, he is a fan of Xways, as it will tell you if the time is either local or
UTC. He mentioned Scott Pancoast's Xways template.
Kathryn Hedley from
Khyrenz gave a talk on her efforts to create a Windows triage script. She found
that Xways doesn't parse USBStor correctly. Her script will add the timezone to
USB activity as a separate field. It also gives time in UTC when the USB device
was inserted into the system. Her script (sysprofiler.sh) can also make use of
a local repo to do analysis offline. Since there are a lot of triage tools out
there that are mutli-platform, I'm not sure this will expand, but the process
of creating your own triage tool is definitely worthwhile.
Veronica Schmitt
(@Po1Zon_P1x13) gave a review of 3 prominent ransomware families (Locky,
Cerber, and Maktub). This is in fact her thesis for university. She talked
about her extensive approach to analysis, which went beyond just the classic static and dynamic analysis. She is using the term "DNA", which I
think HBGary used, to track similarities in malware of the same family (eg.
Code re-use). She also covered some of the common anti-forensics techniques
used by malware authors, such as GetLocalTime to wait longer than the typical
sandbox.
Ray Strubinger gave
a talk titled "Statistical Methods for Triaging DFIR Investigations".
His primary use case was having to review tens of thousands of images and the
need for sampling to complete the task. While the math he presented was sound,
this just wasn't a use case that I typically engage in. I tend to zero in on time slices of interest and evidence of execution versus reviewing large lists
of files manually. I think eDiscovery professionals are the likely target audience.
Jessica Hyde
(@B1N2H3X) and Jad Saliba (@JadAtMagnet) gave a great talk on Chromebook and
ChromeOS forensics. I really wish this would have been a workshop. They
mentioned that Google Chrome Enterprise is only $50/client, which is likely why many
cheap/fast orgs are gravitating this way. They also talked about LevelDB or LDB
which is common in ChromeOS and based on NoSQL. They did present some pretty
compelling differences between what is available on the local Chromebook vs
what you can pull from the cloud api via Google Takeout.
Jeff Hamm (@hammjd)
and James Hovious (@JamesHovious) gave what was my second favorite talk of the
day on bypassing MFA controls. My only complaint was there was no time for
questions at the end. They talked about some engagements where they have
obtained seed files out of email. Often searching for .stdid files can yield
good results. They also talked about leveraging a keylogger to capture the PIN
code for a MFA token. And then there was the hilarious story about the webcam
for an MSSP being pointed at a MFA token and being shared out publicly. This
talk may have sparked me to spend time again on getting current on offensive
techniques again. While I did red work in the past, its been awhile so this
might be a fun learning goal.
Overall this was a
pretty solid event with very knowledgeable speakers. It's definitely nowhere near as big as the US version, but
I did enjoy the smaller crowd. I would recommend they go to multitrack and 45m
talks with questions to meet the needs of more attendees.
Comments
Post a Comment