SlideShare une entreprise Scribd logo
1  sur  110
Télécharger pour lire hors ligne
CNIT 121:
Computer
Forensics
17 Remediation Introduction
Part 1
Basic Concepts
• Remediation plan has two parts
• First part
• Remediating the current incident
• Posturing, containment, and eradication
• Second part
• Improving security posture
• Strategic actions
Revisions
• Draft remediation plan will be revised many times
• Action items that seem easy turn out to be more
difficult
• Shift those items into strategic recommendation
• Example: switch to two-factor authentication
(2FA)
• Very difficult to do for whole organization, so
do a subset of users first
1. Form the Remediation
Team
• After incident has been declared an incident
ownership is assigned
• Remediation team needs representatives from
• Legal, IT (both infrastructure and help desk),
security, and business line managers
2. Determine Timing
• Business leaders must decide what actions
begin immediately, and what is delayed until the
investigation is over
• In coordination with legal, remediation, and
investigation teams
• Timing varies widely depending on the incident,
rate of investigation, and type of information
that could be in jeopardy
3. Remediation Posturing
Actions
• Posturing actions are implemented while the
incident is ongoing
• Enhancements to system and network
monitoring
• Mitigating critical vulnerabilities
• Preparing support teams for enterprise-wide
changes such as password resets or 2FA
deployment
• Looks like normal maintenance to an attacker
4. Incident Containment
Actions
• Designed to deny the attacker access to specific
environments or sensitive data during an
investigation
• Often disruptive short-term solutions
implemented quickly
5. Develop Eradication
Action Plan
• Goals: remove attacker's access and mitigate
the vulnerabilities the attacker used to gain
access
• Clearly document and rehearse actions
• This step will be executed near the end of the
investigation, once the attacker's Tools, Tactics,
and Procedures (TTP) are well understood
6. Determine Eradication Event Timing
and Implement Eradication Plan
• Investigation reaches "steady state"
• No new tools or techniques are being
discovered
• Perform this step at the right time
• When investigative team has a good grasp of
the TPP being used
• This step also includes post-monitoring and
verification of eradication activities
7. Develop Strategic
Recommendations
• Throughout the investigation and remediation
process
• Document areas for improvement
• Strategic recommendations consist of
• Remedial actions that cannot be implemented
prior to, or during, the investigation
• They may disrupt business and be expensive
• Typically occur months or years after eradication
8. Document Lessons
Learned
• Store documentation in a central location
• Restricted to incident responders only
• Because information is sensitive
• Examples: reports developed, notes about the
environment
Remediation Effort
• Should be concise and effective
• It's risky to enact significant changes in a tactical
situation
• Result may be rushed and incomplete
• Understand what your team and organization can
do quickly
• Push other tasks into the strategic
recommendations documentation
Factors to Consider
Incident Severity
• Determines remediation implemented
• A bank experiencing real-time loss requires
more immediate containment than a defense
contractor breached by an unknown attacker
• Breached web server containing only public
information is much less severe than an
attacker who gained domain admin credentials
Remediation Timing
• Efforts to immediately remove attacker's access
to sensitive systems or data
• Efforts designed to allow investigative team
time to gather information
• So they can comprehensively remove the
attacker and strengthen defenses
The Remediation Team
• Three concerns: size, skill level, and
management support
• Large teams are harder to coordinate
• Experienced teams are more comfortable taking
customized approaches
• Less skilled teams may want to stay within
their comfort zone
• Management support controls authorization and
available resources
Technology
• Security technology and enterprise management
technology
• Software may be available to assist changing
local administrator passwords throughout the
enterprise
• Otherwise, you must develop a script
• Implementing new technology during an incident
usually causes more problems than it solves
Budget
• Remediation effort must make sense
• Spending more money protecting assets than
the assets are worth is bad business
Management Support
• Remediation will affect day-to-day operations
• Changing password policies will change how
administrators interact with systems
• Management support helps ensure that even
painful remediation actions are implemented
and supported by the organization
Public Scrutiny
• Legal or PR team may be required to disclose
information due to regulatory requirements
• Sometimes information is leaked, or discovered by
third parties
• Attacker may try to extort the company by threatening
to make compromise or stolen data public
• Carefully review public statements
• Hasty statements that are revised later may cause
embarrassment and public backlash
Example: HIPAA
• Health Insurance Portability and Accountability
Act
• Loss of Protected Health Information (PHI) or
Personally Identifiable Information (PII) triggers
notifications
• Often it helps to also disclose containment or
eradication steps to reassure the public
• Include legal and PR from the beginning of the
incident
Remediation Pre-Checks
• 1. Ensure organization has committed to a
formal incident response
• Response will require staff and time
commitments
• 2. An incident owner has been assigned
• Provides leadership for key stakeholders,
incident investigation team, and incident
remediation team
1 Form the Remediation
Team
When to Create the
Remediation Team
• As soon as an investigation is initiated
• Start planning the remediation effort
immediately
• Run investigation and remediation teams in
parallel
Mean Time to Remediate
(MTTR)
• Time to Remediate
• Time from incident discovery to eradication
• If malware is discovered on Jan 25
• Investigation finds the system was
compromised on Jan 15
• System rebuilt on Jan 26
• Time to remediate is 24 hours
Assigning a Remediation
Owner
• Responsible for the overall remediation effort
• Interacts with both technical and nontechnical
personnel
• Usually a senior technical person is the best
choice
• Needs full management support
Remediation Efforts
• Often difficult and disruptive
• Such as coordinated login password changes
throughout the environment
• Unpopular, creates pushback
Remediation Owner
Desirable Qualities
Members of the
Remediation Team
• Required
• Someone from investigation team
• System, network, and application representatives
• Other subject matter experts (as applicable)
• Ancillary
• Legal, compliance officers, business line
managers, HR, PR, and executive management
2. Determine Timing of the
Remediation
• Three types: immediate, delayed, and combined
action
• Usually the best choice is delayed action
Immediate Action
• Used to stop the incident from continuing
(containment)
• Often alerts the attacker that the organization is
aware of his activities
• Appropriate for incidents with an active attacker
• Organization is losing money in real time
• Malicious insider is stealing data right now
• Incident is small, such as a single compromised
system
• Not appropriate if attacker has compromised
hundreds of systems and installed multiple
backdoor families
• Immediate action would only cause the
attacker to change tools and techniques
• Cause the investigation team to re-scope the
compromise
Immediate Action
Delayed Action
• Allow investigation to conclude before any direct
actions are taken against the attacker
• Appropriate when the investigation is at least as
important as the remediation
• Most common approach for incidents involving
Intellectual Property (IP) theft
• Where intelligence gained from monitoring
attacker's activity outweighs need to contain the
activity
• Law enforcement may ask you to delay
remediation
• In order to allow their investigation to continue.
so they may learn more about the attacker, or to
provide time to make an arrest
• This may be beneficial because it may allow you
to delay public notifications
Delayed Action
Combined Action
• Implements containment on only a specific
aspect of the incident
• Letting the rest of the incident continue
• Used when containment is more important than
remediation
• However, full investigation and remediation is
still warranted
• Example
• Near real-time theft of money or critical
business data
• Attacker has credentials used for ACH
(Automated Clearing House) transactions
• Organization needs to immediately remove
attacker's access to the system
• Also needs to fully scope the compromise and
implement a comprehensive remediation effort
Combined Action
3. Develop and Implement
Remediation Posturing Actions
• Posturing actions
• Additional logging and monitoring
• Intended to have little impact on the attacker
• Enhance the investigation and decrease time
spent on later phases of remediation
3. Develop and Implement
Remediation Posturing Actions
3. Develop and Implement
Remediation Posturing Actions
• Can be implemented by improving the type of
data retained by endpoints
• On Linux
• Enabling command history and process
auditing
• Ensure that all authentications are properly
logged
3. Develop and Implement
Remediation Posturing Actions
• On Windows
• Configure Windows auditing to log success
and failure events for
Windows Logging
• Enabling "success" events for audit policies
• Audit object access
• Audit process tracking
• May quickly fill the local Security event log file
• May need to increase size of log files or send
events to a central auditing system
Windows Logging
• Enabling "failure" events only is not enough
• Once attacker succeeds in getting credentials,
their activities are now successes
3. Develop and Implement
Remediation Posturing Actions
• Posturing: increase security of an application or system
without alerting the attacker
• Check with investigation team before implementing these
changes, to get their opinion on whether it will alert the attacker
• Removing a compromised system may go
unnoticed, seeming like normal maintenance
• Another posturing action:
• Stop all legitimate use of known compromised
credentials, issue new accounts to users who
were compromised, and implement
monitoring and alerting for the known
compromised accounts
3. Develop and Implement
Remediation Posturing Actions
Implications of Alerting the
Attacker
• Attacker changes Tools, Tactics, and Procedures
• Investigation team must now track the changed TTP
while also continuing to investigate the past activity
• They may lose visibility into attacker's activity
entirely
• Organization may be forced to remediate activity
immediately instead of continuing investigation
• Attacker may install new mechanisms of access,
compromising the entire effort
• Attacker may go dormant
• Incident responders may miss evidence of
malicious activity
• Allowing the attacker to remain hidden during
the eradication event
• Only to become active later
Implications of Alerting the
Attacker
• Techniques to go dormant
• Implant malware that calls Command &
Control (C2) server every few months
• Remove all malware and use remote access
instead, such as business peer connection or
a VPN to implement webshells in the DMZ that
are not used until the attacker believes the
incident response is finished
Implications of Alerting the
Attacker
• Park all malicious domain names in
innocuous-looking IP addresses, such as an
IP address belonging to Google
Implications of Alerting the
Attacker
• Become destructive
• Rare but some attackers do it
• Delete files, deface web pages, crash systems
• Forces responders to focus on recovering
from damages
Implications of Alerting the
Attacker
• Attempt to overwhelm the organization with
compromised systems
• One attacker used scripts to implant multiple
malware families on each of 40 domain controllers
every night
• Organization was forced to remediate every night, an
unsustainable level of work
• Organization rebuilt all servers and implemented
application whitelisting on all domain controllers
and critical servers
Implications of Alerting the
Attacker
• Extreme short-term measures to stop an attacker's
action that cannot be allowed to continue
• Does not remove attacker's access to environment
• Prevents attacker from performing a specific
activity
• Example: take PII database offline to stop data
theft
4 Develop and Implement
Incident Containment Actions
4 Develop and Implement
Incident Containment Actions
• Teams need to understand data or resources
that need to be protected
• Example
• Attacker breached a restricted financial
environment
• Created unauthorized ACH transfers for large
sums to an overseas bank account
4 Develop and Implement
Incident Containment Actions
• Remediation team constrained by these factors
• Also, the company would like to announce a
data when the network is safe to use again
4 Develop and Implement
Incident Containment Actions
• Containment actions
1. Remove attacker's network access to financial
application
• Use access control lists to prevent all systems,
except one "jump system, from interacting with
the server
• Require two-factor authentication on jump
system and only allow local accounts for a small
number of users who absolutely must use it
4 Develop and Implement
Incident Containment Actions
• Containment actions
2. Remove attackers's ability to authenticate to
financial application
•Change all passwords for user accounts that
have access to the financial application
4 Develop and Implement
Incident Containment Actions
• Containment actions
3. Require two-person integrity to create and
authorize ACH transactions
•Separation of duties
•Some accounts can create ACH
transactions
•Other accounts can authorize them
•No account can do both
4 Develop and Implement
Incident Containment Actions
• Containment actions
4. Implement notifications for all ACH
transactions
•Via email to a defined set of users
4 Develop and Implement
Incident Containment Actions
• This approach uses defense in depth (layered
protection)
• But a control was missing
• If attacker had a backdoor into the financial
environment with direct Internet access, new
credentials could easily be stolen to bypass the new
defenses
• Access control lists should be implemented to limit
the financial system's network traffic to only the
systems explicitly required for business
4 Develop and Implement
Incident Containment Actions
4 Develop and Implement
Incident Containment Actions
• When something goes wrong
• Suppose, five days after containment was
implemented, investigation team discovers that
attacker still has access to the financial
application
• Must develop new containment actions
• And revise any public statement that
environment was contained at the earlier date
4 Develop and Implement
Incident Containment Actions
5 Develop the Eradication
Action Plan
• Implemented during a short period to remove
the attacker from the environment
• Eradication event should result in complete
recovery from the compromise
• Removing all of the attacker's access to the
environment
• Relies heavily on results of investigation team
to fully scope the incident and on organization's
ability to fully implement the eradication plan
• Goals
5 Develop the Eradication
Action Plan
• Expect attacker to try to regain access
• Account for attempts the attacker may make
both during and after eradication event
• Attacker may search for and exploit other
vulnerabilities
• Attacker may perform aggressive actions in
retribution for losing access
5 Develop the Eradication
Action Plan
• Common eradication actions
5 Develop the Eradication
Action Plan
• Weekends are good for eradication, because
disruption to business is minimal
• Consider attacker's standard working hours, if
known
• Eradicate during period of low attacker
activity
• Commonly organizations disconnect from the
Internet during eradication
5 Develop the Eradication
Action Plan
• Attacker may re-compromise during eradication
• Responses:
• Quickly investigate and contain the re-
compromise
• Investigate in parallel to determine method
used and mitigate it
• Once it's mitigated, continue with
eradication event
5 Develop the Eradication
Action Plan
• Another response
• Delay eradication event and start incident
response process over
• More appropriate when attacker gains access
for a significant period and compromises
more systems than could be realistically
remediated during the planned eradication
event
5 Develop the Eradication
Action Plan
• Eradication plan is often easy to design
• Because a limited number of actions are
possible to comprehensively remove an attacker
• To remediate a compromised system:
• Rebuild from known good media, or
• Implement detailed cleaning instructions to
clean malware from system
5 Develop the Eradication
Action Plan
• To recover from compromised credentials
• Change password, or
• Delete/disable account and issue a new one
5 Develop the Eradication
Action Plan
• Improper planning is the biggest contributor to
incomplete or failed eradication
• Organization may plan to disconnect from Internet
during eradication event
• But most organizations cannot tolerate completely
disconnecting from the Internet
• Some business applications must remain
operational 24/7
• Must implement extra measures on next two slides
5 Develop the Eradication
Action Plan
5 Develop the Eradication
Action Plan
5 Develop the Eradication
Action Plan
• Changing all passwords
5 Develop the Eradication
Action Plan
• Application, networking gear, and database
accounts may not need to change
• Forcing password resets of users is easy
• But attacker might be the one who changes
the password
5 Develop the Eradication
Action Plan
• Safer ways to change passwords
• Generate random passwords for all accounts
and distribute them to users via a trusted
means
• Require uses to call into help desk to grant
them VPN access to change their passwords
5 Develop the Eradication
Action Plan
• Changing service account passwords
• Planning is required
• Must determine which applications use a service
account
• Identify all systems with that application installed
• Must change password on every system and
central directory
• Prepare contingency plan for systems that are
missed in initial planning
5 Develop the Eradication
Action Plan
• Changing all local administrator passwords to
something unique is very challenging
• Some organizations use the same password for all
local administrator accounts
• Some develop their own scripts to implement and
track passwords for local administrator accounts
• Others use credential vaults and management
software that randomizes all the passwords on al
systems and requires administrators to check out
and check in passwords
5 Develop the Eradication
Action Plan
• Plan how to back up user and critical data from
the compromised systems being rebuilt
• Remediation team should sign off on the
directories and files being backed up
• Ton ensure that malware is not accidentally
transferred to the new system
• In case that happens, also block malicious IP
addresses and blackhole domain names
(defense in depth)
5 Develop the Eradication
Action Plan
• Common complications
5 Develop the Eradication
Action Plan
• Timing is critical
• Too early
• Investigation team hasn't adequately scoped
the compromise
• Remediation fails because attacker's access
is not completely removed
• Ex: a backdoor was missed
6 Determine Eradication Event
Timing and Execute Eradication Plan
• Too late
• Attacker may change Tools, Tactics, and
Procedures (TTP)
• Or accomplish their mission
6 Determine Eradication Event
Timing and Execute Eradication Plan
• Ideal time: "strike zone"
• When investigation team has properly scoped
the compromise
• Remediation team has implemented all or
most of the posturing/containment actions
• Investigation team understands the majority
of the attacker's TTP and can reliably detect
malicious activity
6 Determine Eradication Event
Timing and Execute Eradication Plan
6 Determine Eradication Event
Timing and Execute Eradication Plan
Strike Zone Indicators
• Timing of eradication event should be agreed
upon by
• Incident owner
• Investigation owner
• Remediation owner
• While the investigation and remediation efforts
are ongoing
6 Determine Eradication Event
Timing and Execute Eradication Plan
• It's an art, not a science
• Best way:
• Choose a date that is considered a little
difficult to achieve
• Then force the teams to work hard to achieve
the date
• Don't let the eradication date slip, or it may lost
urgency and be delayed indefinitely
• Organizations are never as prepared as they
want to be
6 Determine Eradication Event
Timing and Execute Eradication Plan
• Sample eradication event
6 Determine Eradication Event
Timing and Execute Eradication Plan
• After disconnecting from Internet, blocking, and
sinkholing
• Test network connections
• Browse to legitimate websites, try to FTP to
legitimate FTP servers, attempt to access
some blocked IP addresses
• From all locations that have their own IP
addresses
6 Determine Eradication Event
Timing and Execute Eradication Plan
• Test from all logical and geographic sites
• Don't just PING
• You could use netcat and nmap
• Also implement alerts when known malicious IP
addresses or domains are accessed
6 Determine Eradication Event
Timing and Execute Eradication Plan
• Remediating compromised systems
• Rebuilding or removing malware
• Be careful when restoring data
• Not to reintroduce malware
6 Determine Eradication Event
Timing and Execute Eradication Plan
• Cleaning is not recommended
• Removing known malware
• It's difficult to be certain that all malware was
discovered and removed
• Rebuilding from known-good media is the
best way to ensure a clean environment post-
remediation
6 Determine Eradication Event
Timing and Execute Eradication Plan
• Cleaning may be required when
• Production servers are involved and
downtime is not acceptable
• Attacker compromised hundreds or
thousands of systems
6 Determine Eradication Event
Timing and Execute Eradication Plan
• Once compromises systems are offline, start
changing user account passwords
• This can proceed while other systems are
being rebuilt
• Start early because use account password
changes are the hardest part of the eradication
event and take the most time
• And cause the most unanticipated issues
6 Determine Eradication Event
Timing and Execute Eradication Plan
• Verify that eradication was successful before
reconnecting to the Internet
• Often a small number of systems are overlooked,
improperly rebuilt, or not rebuilt at all
• Some administrators try to cut corners and clean
malware from systems instead of rebuilding them
• Such systems may still have IOC's like registry
entries or configuration files
6 Determine Eradication Event
Timing and Execute Eradication Plan
• Verify that all user account passwords were
changed
• Usually by expiring them in Active Directory
• To verify that local administrator, database, and
application passwords were changed
• Test samples
6 Determine Eradication Event
Timing and Execute Eradication Plan
• Communication is critical during eradication event
• To let administrators know when they can start
the next action item, and when previous action
items are completed
• You will most likely encounter unexpected
challenges
• Remediation owner should establish a
communication medium prior to the eradication
event
6 Determine Eradication Event
Timing and Execute Eradication Plan
• Example communications strategies
• Establish periodic set times for all
administrators and members of the
remediation to call in to discuss progress
• Keep a conference bridge open throughout
the eradication event
6 Determine Eradication Event
Timing and Execute Eradication Plan
• Eradication team includes more people than the
remediation team
• All network, system and application administrators
are required to participate, under the guidance of the
remediation team
• In the days after the eradication event,
• Ensure that your help desk personnel can contact
the remediation team
• In case suspicious activity or failed applications are
reported
6 Determine Eradication Event
Timing and Execute Eradication Plan
• Actions that are critical to organization's overall
security posture
• But cannot be implemented prior to, or
during, the eradication event
• Difficult to implement and disruptive
• But offer significant security enhancements
7 Develop Strategic
Recommendations
• Examples
• Upgrading to a more secure OS throughout
the environment
• Reducing user privileges throughout the
environment
• Implementing strict network segmentation
• implementing egress traffic filtering
7 Develop Strategic
Recommendations
• Describe action items from a high level only
• Document all recommended strategic actions
• Even if you don't believe organization is
willing to implement them
• They may decide to implement them later
• Always document recommendations in order of
priority
• Put the ones that reduce risk the most first
7 Develop Strategic
Recommendations
• Only required for major remediation efforts
• Not small actions like rebuilding a single
system due to a virus
• Capture lessons learned in a standard,
structured format in an easily accessible central
location
• Use a template to ensure consistency
8. Document Lessons
Learned
• Lessons should be easily searchable and
browsable
• Wikis and document management systems work
well
8. Document Lessons
Learned
• Example: password change procedures
• How to change all Unix passwords
• How to create unique passwords for local
administrator accounts on all Windows systems
• How to determine all scripts and applications
with hardcoded passwords
• How to determine all service accounts
8. Document Lessons
Learned
• Identification of all systems, applications, and
scripts that use user accounts
• Winning executive and business-level support
for this remediation action
• Getting standard users to comply with this
action item
8. Document Lessons
Learned
• Document lessons quickly
• If you wait days or weeks, remediation team
may forget information or have trouble
compiling it
• Remediation owner should ensure that the team
understands that creating lessons learned is a
mandatory part of the remediation effort
8. Document Lessons
Learned
8. Document Lessons
Learned

Contenu connexe

Tendances

How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkSqrrl
 
CNIT 126 4: A Crash Course in x86 Disassembly
CNIT 126 4: A Crash Course in x86 DisassemblyCNIT 126 4: A Crash Course in x86 Disassembly
CNIT 126 4: A Crash Course in x86 DisassemblySam Bowne
 
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced ActorsMemory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced ActorsJared Greenhill
 
Using Libvirt with Cluster API to manage baremetal Kubernetes
Using Libvirt with Cluster API to manage baremetal KubernetesUsing Libvirt with Cluster API to manage baremetal Kubernetes
Using Libvirt with Cluster API to manage baremetal KubernetesHimani Agrawal
 
Hunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows InfrastructureHunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows InfrastructureSergey Soldatov
 
Taking Hunting to the Next Level: Hunting in Memory
Taking Hunting to the Next Level: Hunting in MemoryTaking Hunting to the Next Level: Hunting in Memory
Taking Hunting to the Next Level: Hunting in MemoryJoe Desimone
 
Deception Technology: Use Cases & Implementation Approaches
 Deception Technology: Use Cases & Implementation Approaches Deception Technology: Use Cases & Implementation Approaches
Deception Technology: Use Cases & Implementation ApproachesPriyanka Aash
 
Accessing Hardware on Android
Accessing Hardware on AndroidAccessing Hardware on Android
Accessing Hardware on AndroidGary Bisson
 
100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdfMAHESHUMANATHGOPALAK
 
PowerShell: The increased use of PowerShell in cyber attacks
PowerShell: The increased use of PowerShell in cyber attacksPowerShell: The increased use of PowerShell in cyber attacks
PowerShell: The increased use of PowerShell in cyber attacksSymantec Security Response
 
Web Application Forensics: Taxonomy and Trends
Web Application Forensics: Taxonomy and TrendsWeb Application Forensics: Taxonomy and Trends
Web Application Forensics: Taxonomy and TrendsKrassen Deltchev
 
CNIT 127: L9: Web Templates and .NET
CNIT 127: L9: Web Templates and .NETCNIT 127: L9: Web Templates and .NET
CNIT 127: L9: Web Templates and .NETSam Bowne
 
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)Sam Bowne
 
The Juniper SDN Landscape
The Juniper SDN LandscapeThe Juniper SDN Landscape
The Juniper SDN LandscapeChris Jones
 
Malware analysis using volatility
Malware analysis using volatilityMalware analysis using volatility
Malware analysis using volatilityYashashree Gund
 
CNIT 152: 1 Real-World Incidents
CNIT 152: 1 Real-World IncidentsCNIT 152: 1 Real-World Incidents
CNIT 152: 1 Real-World IncidentsSam Bowne
 
Hunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentTeymur Kheirkhabarov
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021Adam Shostack
 
CNIT 127 Ch 8: Windows overflows (Part 1)
CNIT 127 Ch 8: Windows overflows (Part 1)CNIT 127 Ch 8: Windows overflows (Part 1)
CNIT 127 Ch 8: Windows overflows (Part 1)Sam Bowne
 
CNIT 141: 2. Randomness
CNIT 141: 2. RandomnessCNIT 141: 2. Randomness
CNIT 141: 2. RandomnessSam Bowne
 

Tendances (20)

How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your Network
 
CNIT 126 4: A Crash Course in x86 Disassembly
CNIT 126 4: A Crash Course in x86 DisassemblyCNIT 126 4: A Crash Course in x86 Disassembly
CNIT 126 4: A Crash Course in x86 Disassembly
 
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced ActorsMemory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
 
Using Libvirt with Cluster API to manage baremetal Kubernetes
Using Libvirt with Cluster API to manage baremetal KubernetesUsing Libvirt with Cluster API to manage baremetal Kubernetes
Using Libvirt with Cluster API to manage baremetal Kubernetes
 
Hunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows InfrastructureHunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows Infrastructure
 
Taking Hunting to the Next Level: Hunting in Memory
Taking Hunting to the Next Level: Hunting in MemoryTaking Hunting to the Next Level: Hunting in Memory
Taking Hunting to the Next Level: Hunting in Memory
 
Deception Technology: Use Cases & Implementation Approaches
 Deception Technology: Use Cases & Implementation Approaches Deception Technology: Use Cases & Implementation Approaches
Deception Technology: Use Cases & Implementation Approaches
 
Accessing Hardware on Android
Accessing Hardware on AndroidAccessing Hardware on Android
Accessing Hardware on Android
 
100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf
 
PowerShell: The increased use of PowerShell in cyber attacks
PowerShell: The increased use of PowerShell in cyber attacksPowerShell: The increased use of PowerShell in cyber attacks
PowerShell: The increased use of PowerShell in cyber attacks
 
Web Application Forensics: Taxonomy and Trends
Web Application Forensics: Taxonomy and TrendsWeb Application Forensics: Taxonomy and Trends
Web Application Forensics: Taxonomy and Trends
 
CNIT 127: L9: Web Templates and .NET
CNIT 127: L9: Web Templates and .NETCNIT 127: L9: Web Templates and .NET
CNIT 127: L9: Web Templates and .NET
 
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
 
The Juniper SDN Landscape
The Juniper SDN LandscapeThe Juniper SDN Landscape
The Juniper SDN Landscape
 
Malware analysis using volatility
Malware analysis using volatilityMalware analysis using volatility
Malware analysis using volatility
 
CNIT 152: 1 Real-World Incidents
CNIT 152: 1 Real-World IncidentsCNIT 152: 1 Real-World Incidents
CNIT 152: 1 Real-World Incidents
 
Hunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows Environment
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021
 
CNIT 127 Ch 8: Windows overflows (Part 1)
CNIT 127 Ch 8: Windows overflows (Part 1)CNIT 127 Ch 8: Windows overflows (Part 1)
CNIT 127 Ch 8: Windows overflows (Part 1)
 
CNIT 141: 2. Randomness
CNIT 141: 2. RandomnessCNIT 141: 2. Randomness
CNIT 141: 2. Randomness
 

En vedette

CNIT 121: 9 Network Evidence
CNIT 121: 9 Network EvidenceCNIT 121: 9 Network Evidence
CNIT 121: 9 Network EvidenceSam Bowne
 
CNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating ApplicationsCNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating ApplicationsSam Bowne
 
CNIT 129S: 9: Attacking Data Stores (Part 2 of 2)
CNIT 129S: 9: Attacking Data Stores (Part 2 of 2)CNIT 129S: 9: Attacking Data Stores (Part 2 of 2)
CNIT 129S: 9: Attacking Data Stores (Part 2 of 2)Sam Bowne
 
CNIT 129S: 13: Attacking Users: Other Techniques (Part 2 of 2)
CNIT 129S: 13: Attacking Users: Other Techniques (Part 2 of 2)CNIT 129S: 13: Attacking Users: Other Techniques (Part 2 of 2)
CNIT 129S: 13: Attacking Users: Other Techniques (Part 2 of 2)Sam Bowne
 
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
iOS Threats - Malicious Configuration Profiles, Threat, Detection & MitigationiOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
iOS Threats - Malicious Configuration Profiles, Threat, Detection & MitigationLacoon Mobile Security
 
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 2 of 3)
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 2 of 3)CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 2 of 3)
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 2 of 3)Sam Bowne
 
Ch 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social EngineeringCh 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social EngineeringSam Bowne
 
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruptionCNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruptionSam Bowne
 
Practical Malware Analysis: Ch 8: Debugging
Practical Malware Analysis: Ch 8: Debugging Practical Malware Analysis: Ch 8: Debugging
Practical Malware Analysis: Ch 8: Debugging Sam Bowne
 
CNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise ServicesCNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise ServicesSam Bowne
 
CNIT 127 Ch 6: The Wild World of Windows
CNIT 127 Ch 6: The Wild World of WindowsCNIT 127 Ch 6: The Wild World of Windows
CNIT 127 Ch 6: The Wild World of WindowsSam Bowne
 
CNIT 129S: Securing Web Applications Ch 1-2
CNIT 129S: Securing Web Applications Ch 1-2CNIT 129S: Securing Web Applications Ch 1-2
CNIT 129S: Securing Web Applications Ch 1-2Sam Bowne
 
CNIT 121: 12 Investigating Windows Systems (Part 3)
CNIT 121: 12 Investigating Windows Systems (Part 3)CNIT 121: 12 Investigating Windows Systems (Part 3)
CNIT 121: 12 Investigating Windows Systems (Part 3)Sam Bowne
 
CNIT 129S: Ch 4: Mapping the Application
CNIT 129S: Ch 4: Mapping the ApplicationCNIT 129S: Ch 4: Mapping the Application
CNIT 129S: Ch 4: Mapping the ApplicationSam Bowne
 
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...Sam Bowne
 
CNIT 129S: Ch 5: Bypassing Client-Side Controls
CNIT 129S: Ch 5: Bypassing Client-Side ControlsCNIT 129S: Ch 5: Bypassing Client-Side Controls
CNIT 129S: Ch 5: Bypassing Client-Side ControlsSam Bowne
 
CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)
CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)
CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)Sam Bowne
 
CNIT 129S: 8: Attacking Access Controls
CNIT 129S: 8: Attacking Access ControlsCNIT 129S: 8: Attacking Access Controls
CNIT 129S: 8: Attacking Access ControlsSam Bowne
 
CNIT 129S: Ch 6: Attacking Authentication
CNIT 129S: Ch 6: Attacking AuthenticationCNIT 129S: Ch 6: Attacking Authentication
CNIT 129S: Ch 6: Attacking AuthenticationSam Bowne
 

En vedette (20)

Lạm phát
Lạm phátLạm phát
Lạm phát
 
CNIT 121: 9 Network Evidence
CNIT 121: 9 Network EvidenceCNIT 121: 9 Network Evidence
CNIT 121: 9 Network Evidence
 
CNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating ApplicationsCNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating Applications
 
CNIT 129S: 9: Attacking Data Stores (Part 2 of 2)
CNIT 129S: 9: Attacking Data Stores (Part 2 of 2)CNIT 129S: 9: Attacking Data Stores (Part 2 of 2)
CNIT 129S: 9: Attacking Data Stores (Part 2 of 2)
 
CNIT 129S: 13: Attacking Users: Other Techniques (Part 2 of 2)
CNIT 129S: 13: Attacking Users: Other Techniques (Part 2 of 2)CNIT 129S: 13: Attacking Users: Other Techniques (Part 2 of 2)
CNIT 129S: 13: Attacking Users: Other Techniques (Part 2 of 2)
 
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
iOS Threats - Malicious Configuration Profiles, Threat, Detection & MitigationiOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
 
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 2 of 3)
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 2 of 3)CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 2 of 3)
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 2 of 3)
 
Ch 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social EngineeringCh 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social Engineering
 
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruptionCNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
 
Practical Malware Analysis: Ch 8: Debugging
Practical Malware Analysis: Ch 8: Debugging Practical Malware Analysis: Ch 8: Debugging
Practical Malware Analysis: Ch 8: Debugging
 
CNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise ServicesCNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise Services
 
CNIT 127 Ch 6: The Wild World of Windows
CNIT 127 Ch 6: The Wild World of WindowsCNIT 127 Ch 6: The Wild World of Windows
CNIT 127 Ch 6: The Wild World of Windows
 
CNIT 129S: Securing Web Applications Ch 1-2
CNIT 129S: Securing Web Applications Ch 1-2CNIT 129S: Securing Web Applications Ch 1-2
CNIT 129S: Securing Web Applications Ch 1-2
 
CNIT 121: 12 Investigating Windows Systems (Part 3)
CNIT 121: 12 Investigating Windows Systems (Part 3)CNIT 121: 12 Investigating Windows Systems (Part 3)
CNIT 121: 12 Investigating Windows Systems (Part 3)
 
CNIT 129S: Ch 4: Mapping the Application
CNIT 129S: Ch 4: Mapping the ApplicationCNIT 129S: Ch 4: Mapping the Application
CNIT 129S: Ch 4: Mapping the Application
 
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
 
CNIT 129S: Ch 5: Bypassing Client-Side Controls
CNIT 129S: Ch 5: Bypassing Client-Side ControlsCNIT 129S: Ch 5: Bypassing Client-Side Controls
CNIT 129S: Ch 5: Bypassing Client-Side Controls
 
CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)
CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)
CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)
 
CNIT 129S: 8: Attacking Access Controls
CNIT 129S: 8: Attacking Access ControlsCNIT 129S: 8: Attacking Access Controls
CNIT 129S: 8: Attacking Access Controls
 
CNIT 129S: Ch 6: Attacking Authentication
CNIT 129S: Ch 6: Attacking AuthenticationCNIT 129S: Ch 6: Attacking Authentication
CNIT 129S: Ch 6: Attacking Authentication
 

Similaire à CNIT 121: 17 Remediation Introduction (Part 1)

The eDiscovery Primer for Lotus Domino Admins
The eDiscovery Primer for Lotus Domino AdminsThe eDiscovery Primer for Lotus Domino Admins
The eDiscovery Primer for Lotus Domino AdminsBill Malchisky Jr.
 
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...Accellis Technology Group
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response PlanResilient Systems
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesSam Bowne
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
CISM_WK_2.pptx
CISM_WK_2.pptxCISM_WK_2.pptx
CISM_WK_2.pptxdotco
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
Microsoft Navigating Incident Response [EN].pdf
Microsoft Navigating Incident Response [EN].pdfMicrosoft Navigating Incident Response [EN].pdf
Microsoft Navigating Incident Response [EN].pdfSnarky Security
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptxdotco
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
crisc_wk_4.pptx
crisc_wk_4.pptxcrisc_wk_4.pptx
crisc_wk_4.pptxdotco
 
FixNix 17 products1.0
FixNix 17 products1.0FixNix 17 products1.0
FixNix 17 products1.0FixNix Inc.,
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsKarthikeyan Dhayalan
 
CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)Sam Bowne
 
ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...
ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...
ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...drsajjad13
 
Modernising Change Management with Enterprise DevOps
Modernising Change Management with Enterprise DevOpsModernising Change Management with Enterprise DevOps
Modernising Change Management with Enterprise DevOpsPuppet
 
ISStateGovtProposal
ISStateGovtProposalISStateGovtProposal
ISStateGovtProposalDale White
 

Similaire à CNIT 121: 17 Remediation Introduction (Part 1) (20)

Incident response
Incident responseIncident response
Incident response
 
The eDiscovery Primer for Lotus Domino Admins
The eDiscovery Primer for Lotus Domino AdminsThe eDiscovery Primer for Lotus Domino Admins
The eDiscovery Primer for Lotus Domino Admins
 
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
CISM_WK_2.pptx
CISM_WK_2.pptxCISM_WK_2.pptx
CISM_WK_2.pptx
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
Microsoft Navigating Incident Response [EN].pdf
Microsoft Navigating Incident Response [EN].pdfMicrosoft Navigating Incident Response [EN].pdf
Microsoft Navigating Incident Response [EN].pdf
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
 
Incident Response
Incident ResponseIncident Response
Incident Response
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
ITIL # Lecture 8
ITIL # Lecture 8ITIL # Lecture 8
ITIL # Lecture 8
 
crisc_wk_4.pptx
crisc_wk_4.pptxcrisc_wk_4.pptx
crisc_wk_4.pptx
 
FixNix 17 products1.0
FixNix 17 products1.0FixNix 17 products1.0
FixNix 17 products1.0
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
 
CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)
 
ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...
ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...
ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...
 
Modernising Change Management with Enterprise DevOps
Modernising Change Management with Enterprise DevOpsModernising Change Management with Enterprise DevOps
Modernising Change Management with Enterprise DevOps
 
ISStateGovtProposal
ISStateGovtProposalISStateGovtProposal
ISStateGovtProposal
 

Plus de Sam Bowne

3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities Sam Bowne
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development SecuritySam Bowne
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the ApplicationSam Bowne
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)Sam Bowne
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic CurvesSam Bowne
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-HellmanSam Bowne
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1Sam Bowne
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android ApplicationsSam Bowne
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)Sam Bowne
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3Sam Bowne
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard ProblemsSam Bowne
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)Sam Bowne
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis MethodologySam Bowne
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated EncryptionSam Bowne
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)Sam Bowne
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)Sam Bowne
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream CiphersSam Bowne
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data CollectionSam Bowne
 

Plus de Sam Bowne (20)

Cyberwar
CyberwarCyberwar
Cyberwar
 
3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
 
10 RSA
10 RSA10 RSA
10 RSA
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard Problems
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
 

Dernier

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 

Dernier (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

CNIT 121: 17 Remediation Introduction (Part 1)

  • 2. Basic Concepts • Remediation plan has two parts • First part • Remediating the current incident • Posturing, containment, and eradication • Second part • Improving security posture • Strategic actions
  • 3. Revisions • Draft remediation plan will be revised many times • Action items that seem easy turn out to be more difficult • Shift those items into strategic recommendation • Example: switch to two-factor authentication (2FA) • Very difficult to do for whole organization, so do a subset of users first
  • 4.
  • 5. 1. Form the Remediation Team • After incident has been declared an incident ownership is assigned • Remediation team needs representatives from • Legal, IT (both infrastructure and help desk), security, and business line managers
  • 6. 2. Determine Timing • Business leaders must decide what actions begin immediately, and what is delayed until the investigation is over • In coordination with legal, remediation, and investigation teams • Timing varies widely depending on the incident, rate of investigation, and type of information that could be in jeopardy
  • 7. 3. Remediation Posturing Actions • Posturing actions are implemented while the incident is ongoing • Enhancements to system and network monitoring • Mitigating critical vulnerabilities • Preparing support teams for enterprise-wide changes such as password resets or 2FA deployment • Looks like normal maintenance to an attacker
  • 8. 4. Incident Containment Actions • Designed to deny the attacker access to specific environments or sensitive data during an investigation • Often disruptive short-term solutions implemented quickly
  • 9. 5. Develop Eradication Action Plan • Goals: remove attacker's access and mitigate the vulnerabilities the attacker used to gain access • Clearly document and rehearse actions • This step will be executed near the end of the investigation, once the attacker's Tools, Tactics, and Procedures (TTP) are well understood
  • 10. 6. Determine Eradication Event Timing and Implement Eradication Plan • Investigation reaches "steady state" • No new tools or techniques are being discovered • Perform this step at the right time • When investigative team has a good grasp of the TPP being used • This step also includes post-monitoring and verification of eradication activities
  • 11. 7. Develop Strategic Recommendations • Throughout the investigation and remediation process • Document areas for improvement • Strategic recommendations consist of • Remedial actions that cannot be implemented prior to, or during, the investigation • They may disrupt business and be expensive • Typically occur months or years after eradication
  • 12. 8. Document Lessons Learned • Store documentation in a central location • Restricted to incident responders only • Because information is sensitive • Examples: reports developed, notes about the environment
  • 13. Remediation Effort • Should be concise and effective • It's risky to enact significant changes in a tactical situation • Result may be rushed and incomplete • Understand what your team and organization can do quickly • Push other tasks into the strategic recommendations documentation
  • 15. Incident Severity • Determines remediation implemented • A bank experiencing real-time loss requires more immediate containment than a defense contractor breached by an unknown attacker • Breached web server containing only public information is much less severe than an attacker who gained domain admin credentials
  • 16. Remediation Timing • Efforts to immediately remove attacker's access to sensitive systems or data • Efforts designed to allow investigative team time to gather information • So they can comprehensively remove the attacker and strengthen defenses
  • 17. The Remediation Team • Three concerns: size, skill level, and management support • Large teams are harder to coordinate • Experienced teams are more comfortable taking customized approaches • Less skilled teams may want to stay within their comfort zone • Management support controls authorization and available resources
  • 18. Technology • Security technology and enterprise management technology • Software may be available to assist changing local administrator passwords throughout the enterprise • Otherwise, you must develop a script • Implementing new technology during an incident usually causes more problems than it solves
  • 19. Budget • Remediation effort must make sense • Spending more money protecting assets than the assets are worth is bad business
  • 20. Management Support • Remediation will affect day-to-day operations • Changing password policies will change how administrators interact with systems • Management support helps ensure that even painful remediation actions are implemented and supported by the organization
  • 21. Public Scrutiny • Legal or PR team may be required to disclose information due to regulatory requirements • Sometimes information is leaked, or discovered by third parties • Attacker may try to extort the company by threatening to make compromise or stolen data public • Carefully review public statements • Hasty statements that are revised later may cause embarrassment and public backlash
  • 22. Example: HIPAA • Health Insurance Portability and Accountability Act • Loss of Protected Health Information (PHI) or Personally Identifiable Information (PII) triggers notifications • Often it helps to also disclose containment or eradication steps to reassure the public • Include legal and PR from the beginning of the incident
  • 23. Remediation Pre-Checks • 1. Ensure organization has committed to a formal incident response • Response will require staff and time commitments • 2. An incident owner has been assigned • Provides leadership for key stakeholders, incident investigation team, and incident remediation team
  • 24. 1 Form the Remediation Team
  • 25. When to Create the Remediation Team • As soon as an investigation is initiated • Start planning the remediation effort immediately • Run investigation and remediation teams in parallel
  • 26. Mean Time to Remediate (MTTR) • Time to Remediate • Time from incident discovery to eradication • If malware is discovered on Jan 25 • Investigation finds the system was compromised on Jan 15 • System rebuilt on Jan 26 • Time to remediate is 24 hours
  • 27. Assigning a Remediation Owner • Responsible for the overall remediation effort • Interacts with both technical and nontechnical personnel • Usually a senior technical person is the best choice • Needs full management support
  • 28. Remediation Efforts • Often difficult and disruptive • Such as coordinated login password changes throughout the environment • Unpopular, creates pushback
  • 30. Members of the Remediation Team • Required • Someone from investigation team • System, network, and application representatives • Other subject matter experts (as applicable) • Ancillary • Legal, compliance officers, business line managers, HR, PR, and executive management
  • 31.
  • 32. 2. Determine Timing of the Remediation • Three types: immediate, delayed, and combined action • Usually the best choice is delayed action
  • 33. Immediate Action • Used to stop the incident from continuing (containment) • Often alerts the attacker that the organization is aware of his activities • Appropriate for incidents with an active attacker • Organization is losing money in real time • Malicious insider is stealing data right now • Incident is small, such as a single compromised system
  • 34. • Not appropriate if attacker has compromised hundreds of systems and installed multiple backdoor families • Immediate action would only cause the attacker to change tools and techniques • Cause the investigation team to re-scope the compromise Immediate Action
  • 35. Delayed Action • Allow investigation to conclude before any direct actions are taken against the attacker • Appropriate when the investigation is at least as important as the remediation • Most common approach for incidents involving Intellectual Property (IP) theft • Where intelligence gained from monitoring attacker's activity outweighs need to contain the activity
  • 36. • Law enforcement may ask you to delay remediation • In order to allow their investigation to continue. so they may learn more about the attacker, or to provide time to make an arrest • This may be beneficial because it may allow you to delay public notifications Delayed Action
  • 37. Combined Action • Implements containment on only a specific aspect of the incident • Letting the rest of the incident continue • Used when containment is more important than remediation • However, full investigation and remediation is still warranted
  • 38. • Example • Near real-time theft of money or critical business data • Attacker has credentials used for ACH (Automated Clearing House) transactions • Organization needs to immediately remove attacker's access to the system • Also needs to fully scope the compromise and implement a comprehensive remediation effort Combined Action
  • 39. 3. Develop and Implement Remediation Posturing Actions • Posturing actions • Additional logging and monitoring • Intended to have little impact on the attacker • Enhance the investigation and decrease time spent on later phases of remediation
  • 40. 3. Develop and Implement Remediation Posturing Actions
  • 41. 3. Develop and Implement Remediation Posturing Actions • Can be implemented by improving the type of data retained by endpoints • On Linux • Enabling command history and process auditing • Ensure that all authentications are properly logged
  • 42. 3. Develop and Implement Remediation Posturing Actions • On Windows • Configure Windows auditing to log success and failure events for
  • 43. Windows Logging • Enabling "success" events for audit policies • Audit object access • Audit process tracking • May quickly fill the local Security event log file • May need to increase size of log files or send events to a central auditing system
  • 44. Windows Logging • Enabling "failure" events only is not enough • Once attacker succeeds in getting credentials, their activities are now successes
  • 45. 3. Develop and Implement Remediation Posturing Actions • Posturing: increase security of an application or system without alerting the attacker • Check with investigation team before implementing these changes, to get their opinion on whether it will alert the attacker
  • 46. • Removing a compromised system may go unnoticed, seeming like normal maintenance • Another posturing action: • Stop all legitimate use of known compromised credentials, issue new accounts to users who were compromised, and implement monitoring and alerting for the known compromised accounts 3. Develop and Implement Remediation Posturing Actions
  • 47. Implications of Alerting the Attacker • Attacker changes Tools, Tactics, and Procedures • Investigation team must now track the changed TTP while also continuing to investigate the past activity • They may lose visibility into attacker's activity entirely • Organization may be forced to remediate activity immediately instead of continuing investigation • Attacker may install new mechanisms of access, compromising the entire effort
  • 48. • Attacker may go dormant • Incident responders may miss evidence of malicious activity • Allowing the attacker to remain hidden during the eradication event • Only to become active later Implications of Alerting the Attacker
  • 49. • Techniques to go dormant • Implant malware that calls Command & Control (C2) server every few months • Remove all malware and use remote access instead, such as business peer connection or a VPN to implement webshells in the DMZ that are not used until the attacker believes the incident response is finished Implications of Alerting the Attacker
  • 50. • Park all malicious domain names in innocuous-looking IP addresses, such as an IP address belonging to Google Implications of Alerting the Attacker
  • 51. • Become destructive • Rare but some attackers do it • Delete files, deface web pages, crash systems • Forces responders to focus on recovering from damages Implications of Alerting the Attacker
  • 52. • Attempt to overwhelm the organization with compromised systems • One attacker used scripts to implant multiple malware families on each of 40 domain controllers every night • Organization was forced to remediate every night, an unsustainable level of work • Organization rebuilt all servers and implemented application whitelisting on all domain controllers and critical servers Implications of Alerting the Attacker
  • 53. • Extreme short-term measures to stop an attacker's action that cannot be allowed to continue • Does not remove attacker's access to environment • Prevents attacker from performing a specific activity • Example: take PII database offline to stop data theft 4 Develop and Implement Incident Containment Actions
  • 54. 4 Develop and Implement Incident Containment Actions
  • 55. • Teams need to understand data or resources that need to be protected • Example • Attacker breached a restricted financial environment • Created unauthorized ACH transfers for large sums to an overseas bank account 4 Develop and Implement Incident Containment Actions
  • 56. • Remediation team constrained by these factors • Also, the company would like to announce a data when the network is safe to use again 4 Develop and Implement Incident Containment Actions
  • 57. • Containment actions 1. Remove attacker's network access to financial application • Use access control lists to prevent all systems, except one "jump system, from interacting with the server • Require two-factor authentication on jump system and only allow local accounts for a small number of users who absolutely must use it 4 Develop and Implement Incident Containment Actions
  • 58. • Containment actions 2. Remove attackers's ability to authenticate to financial application •Change all passwords for user accounts that have access to the financial application 4 Develop and Implement Incident Containment Actions
  • 59. • Containment actions 3. Require two-person integrity to create and authorize ACH transactions •Separation of duties •Some accounts can create ACH transactions •Other accounts can authorize them •No account can do both 4 Develop and Implement Incident Containment Actions
  • 60. • Containment actions 4. Implement notifications for all ACH transactions •Via email to a defined set of users 4 Develop and Implement Incident Containment Actions
  • 61. • This approach uses defense in depth (layered protection) • But a control was missing • If attacker had a backdoor into the financial environment with direct Internet access, new credentials could easily be stolen to bypass the new defenses • Access control lists should be implemented to limit the financial system's network traffic to only the systems explicitly required for business 4 Develop and Implement Incident Containment Actions
  • 62. 4 Develop and Implement Incident Containment Actions
  • 63. • When something goes wrong • Suppose, five days after containment was implemented, investigation team discovers that attacker still has access to the financial application • Must develop new containment actions • And revise any public statement that environment was contained at the earlier date 4 Develop and Implement Incident Containment Actions
  • 64. 5 Develop the Eradication Action Plan • Implemented during a short period to remove the attacker from the environment • Eradication event should result in complete recovery from the compromise • Removing all of the attacker's access to the environment • Relies heavily on results of investigation team to fully scope the incident and on organization's ability to fully implement the eradication plan
  • 65. • Goals 5 Develop the Eradication Action Plan
  • 66. • Expect attacker to try to regain access • Account for attempts the attacker may make both during and after eradication event • Attacker may search for and exploit other vulnerabilities • Attacker may perform aggressive actions in retribution for losing access 5 Develop the Eradication Action Plan
  • 67. • Common eradication actions 5 Develop the Eradication Action Plan
  • 68. • Weekends are good for eradication, because disruption to business is minimal • Consider attacker's standard working hours, if known • Eradicate during period of low attacker activity • Commonly organizations disconnect from the Internet during eradication 5 Develop the Eradication Action Plan
  • 69. • Attacker may re-compromise during eradication • Responses: • Quickly investigate and contain the re- compromise • Investigate in parallel to determine method used and mitigate it • Once it's mitigated, continue with eradication event 5 Develop the Eradication Action Plan
  • 70. • Another response • Delay eradication event and start incident response process over • More appropriate when attacker gains access for a significant period and compromises more systems than could be realistically remediated during the planned eradication event 5 Develop the Eradication Action Plan
  • 71. • Eradication plan is often easy to design • Because a limited number of actions are possible to comprehensively remove an attacker • To remediate a compromised system: • Rebuild from known good media, or • Implement detailed cleaning instructions to clean malware from system 5 Develop the Eradication Action Plan
  • 72. • To recover from compromised credentials • Change password, or • Delete/disable account and issue a new one 5 Develop the Eradication Action Plan
  • 73. • Improper planning is the biggest contributor to incomplete or failed eradication • Organization may plan to disconnect from Internet during eradication event • But most organizations cannot tolerate completely disconnecting from the Internet • Some business applications must remain operational 24/7 • Must implement extra measures on next two slides 5 Develop the Eradication Action Plan
  • 74. 5 Develop the Eradication Action Plan
  • 75. 5 Develop the Eradication Action Plan
  • 76. • Changing all passwords 5 Develop the Eradication Action Plan
  • 77. • Application, networking gear, and database accounts may not need to change • Forcing password resets of users is easy • But attacker might be the one who changes the password 5 Develop the Eradication Action Plan
  • 78. • Safer ways to change passwords • Generate random passwords for all accounts and distribute them to users via a trusted means • Require uses to call into help desk to grant them VPN access to change their passwords 5 Develop the Eradication Action Plan
  • 79. • Changing service account passwords • Planning is required • Must determine which applications use a service account • Identify all systems with that application installed • Must change password on every system and central directory • Prepare contingency plan for systems that are missed in initial planning 5 Develop the Eradication Action Plan
  • 80. • Changing all local administrator passwords to something unique is very challenging • Some organizations use the same password for all local administrator accounts • Some develop their own scripts to implement and track passwords for local administrator accounts • Others use credential vaults and management software that randomizes all the passwords on al systems and requires administrators to check out and check in passwords 5 Develop the Eradication Action Plan
  • 81. • Plan how to back up user and critical data from the compromised systems being rebuilt • Remediation team should sign off on the directories and files being backed up • Ton ensure that malware is not accidentally transferred to the new system • In case that happens, also block malicious IP addresses and blackhole domain names (defense in depth) 5 Develop the Eradication Action Plan
  • 82. • Common complications 5 Develop the Eradication Action Plan
  • 83. • Timing is critical • Too early • Investigation team hasn't adequately scoped the compromise • Remediation fails because attacker's access is not completely removed • Ex: a backdoor was missed 6 Determine Eradication Event Timing and Execute Eradication Plan
  • 84. • Too late • Attacker may change Tools, Tactics, and Procedures (TTP) • Or accomplish their mission 6 Determine Eradication Event Timing and Execute Eradication Plan
  • 85. • Ideal time: "strike zone" • When investigation team has properly scoped the compromise • Remediation team has implemented all or most of the posturing/containment actions • Investigation team understands the majority of the attacker's TTP and can reliably detect malicious activity 6 Determine Eradication Event Timing and Execute Eradication Plan
  • 86. 6 Determine Eradication Event Timing and Execute Eradication Plan
  • 88. • Timing of eradication event should be agreed upon by • Incident owner • Investigation owner • Remediation owner • While the investigation and remediation efforts are ongoing 6 Determine Eradication Event Timing and Execute Eradication Plan
  • 89. • It's an art, not a science • Best way: • Choose a date that is considered a little difficult to achieve • Then force the teams to work hard to achieve the date • Don't let the eradication date slip, or it may lost urgency and be delayed indefinitely • Organizations are never as prepared as they want to be 6 Determine Eradication Event Timing and Execute Eradication Plan
  • 90. • Sample eradication event 6 Determine Eradication Event Timing and Execute Eradication Plan
  • 91. • After disconnecting from Internet, blocking, and sinkholing • Test network connections • Browse to legitimate websites, try to FTP to legitimate FTP servers, attempt to access some blocked IP addresses • From all locations that have their own IP addresses 6 Determine Eradication Event Timing and Execute Eradication Plan
  • 92. • Test from all logical and geographic sites • Don't just PING • You could use netcat and nmap • Also implement alerts when known malicious IP addresses or domains are accessed 6 Determine Eradication Event Timing and Execute Eradication Plan
  • 93. • Remediating compromised systems • Rebuilding or removing malware • Be careful when restoring data • Not to reintroduce malware 6 Determine Eradication Event Timing and Execute Eradication Plan
  • 94. • Cleaning is not recommended • Removing known malware • It's difficult to be certain that all malware was discovered and removed • Rebuilding from known-good media is the best way to ensure a clean environment post- remediation 6 Determine Eradication Event Timing and Execute Eradication Plan
  • 95. • Cleaning may be required when • Production servers are involved and downtime is not acceptable • Attacker compromised hundreds or thousands of systems 6 Determine Eradication Event Timing and Execute Eradication Plan
  • 96. • Once compromises systems are offline, start changing user account passwords • This can proceed while other systems are being rebuilt • Start early because use account password changes are the hardest part of the eradication event and take the most time • And cause the most unanticipated issues 6 Determine Eradication Event Timing and Execute Eradication Plan
  • 97. • Verify that eradication was successful before reconnecting to the Internet • Often a small number of systems are overlooked, improperly rebuilt, or not rebuilt at all • Some administrators try to cut corners and clean malware from systems instead of rebuilding them • Such systems may still have IOC's like registry entries or configuration files 6 Determine Eradication Event Timing and Execute Eradication Plan
  • 98. • Verify that all user account passwords were changed • Usually by expiring them in Active Directory • To verify that local administrator, database, and application passwords were changed • Test samples 6 Determine Eradication Event Timing and Execute Eradication Plan
  • 99. • Communication is critical during eradication event • To let administrators know when they can start the next action item, and when previous action items are completed • You will most likely encounter unexpected challenges • Remediation owner should establish a communication medium prior to the eradication event 6 Determine Eradication Event Timing and Execute Eradication Plan
  • 100. • Example communications strategies • Establish periodic set times for all administrators and members of the remediation to call in to discuss progress • Keep a conference bridge open throughout the eradication event 6 Determine Eradication Event Timing and Execute Eradication Plan
  • 101. • Eradication team includes more people than the remediation team • All network, system and application administrators are required to participate, under the guidance of the remediation team • In the days after the eradication event, • Ensure that your help desk personnel can contact the remediation team • In case suspicious activity or failed applications are reported 6 Determine Eradication Event Timing and Execute Eradication Plan
  • 102. • Actions that are critical to organization's overall security posture • But cannot be implemented prior to, or during, the eradication event • Difficult to implement and disruptive • But offer significant security enhancements 7 Develop Strategic Recommendations
  • 103. • Examples • Upgrading to a more secure OS throughout the environment • Reducing user privileges throughout the environment • Implementing strict network segmentation • implementing egress traffic filtering 7 Develop Strategic Recommendations
  • 104. • Describe action items from a high level only • Document all recommended strategic actions • Even if you don't believe organization is willing to implement them • They may decide to implement them later • Always document recommendations in order of priority • Put the ones that reduce risk the most first 7 Develop Strategic Recommendations
  • 105. • Only required for major remediation efforts • Not small actions like rebuilding a single system due to a virus • Capture lessons learned in a standard, structured format in an easily accessible central location • Use a template to ensure consistency 8. Document Lessons Learned
  • 106. • Lessons should be easily searchable and browsable • Wikis and document management systems work well 8. Document Lessons Learned
  • 107. • Example: password change procedures • How to change all Unix passwords • How to create unique passwords for local administrator accounts on all Windows systems • How to determine all scripts and applications with hardcoded passwords • How to determine all service accounts 8. Document Lessons Learned
  • 108. • Identification of all systems, applications, and scripts that use user accounts • Winning executive and business-level support for this remediation action • Getting standard users to comply with this action item 8. Document Lessons Learned
  • 109. • Document lessons quickly • If you wait days or weeks, remediation team may forget information or have trouble compiling it • Remediation owner should ensure that the team understands that creating lessons learned is a mandatory part of the remediation effort 8. Document Lessons Learned