Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ Judge-Jury-and-Executable - A File System Forensics Analysis Scanner And Threat Hunting Tool

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Judge-Jury-and-Executable - A File System Forensics Analysis Scanner And Threat Hunting Tool


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


Features:
  • Scan a mounted filesystem for threats right away
  • Or gather a system baseline before an incident, for extra threat hunting ability
  • Can be used before, during or after an incident
  • For one to many workstations
  • Scans the MFT, bypassing file permissions, file locks or OS file protections/hiding/shadowing
  • Up to 51 different properties gathered for every file
  • Scan results go into an SQL table for later searching, aggregating results over many scans and/or many machines, and historical or retrospective analysis
  • Leverage the power of SQL to search file systems, query file properties, answer complex or high-level questions, and hunt for threats or indicators of compromise

Requirements:
  • .NET Framework v4.8
  • Local or remote SQL database with read/write/create access.
  • Visual studio (if you wish to compile the C# code)
  • Access to the internet (or else how did you get this code??? Also for nuget packages...)
  • Basic knowlege of SQL

Hunt for viruses, malware, and APTs on (multiple) file systems using by writing queries in SQL.

Allow me to elaborate...

You start with a disk or disk images that are potentially dirty with malware, viruses, APT's (advanced persistent threats) or the like, and then scan them with this tool. (Optionally, and assuming you have the wisdom and foresight to do so, you may wish to scan a known good baseline disk image with this tool first (or later--doesn't matter). This is certainly not necessary, but can only serve to aid you.) The forensics-level scanning portion of this tool collects a bunch of properties about each file in a file system (or an image(s) of one), and places these properties in a SQL relational database table. The secret sauce comes from being able to threat hunt, investigate, or ask questions about the data through the use of queries, in the language of SQL, against the database that is created. A key feature here was NOT inventing a proprietary query language. If you know SQL, and how to click a button, then you already know how to use this tool like a boss. Even if you don't, this concept is powerful enough that canned queries (see below) will get you a lot of mileage.


Forensics-level scanning.

Firstly, the tool creates an entry in the database for each record found in the MFT (master file table--its how NTFS does its record keeping). This bypasses file security permissions, file hiding, stealth or obfuscation techniques, file deletion, or timestamp tampering. These techniques will not prevent the file from being scanned and catalogued. The bytes of the file are read from the MFT and as many data points as possible are taken from the bytes of the file read from the MFT before attempting to access any data points using the higher-level OS API calls.


Rich, high-level data analytics.

After the MFT and forensics-level data is secured, operating-system-level properties, data and meta-data available about each file is collected and augments each entry created from the MFT entry. As a result of this, even if the file or its properties from the Operating System API or the dotnet framework cannot be accessed due to file permissions (ACL), file locks (is in use), disk corruption, a zero-byte-length file, or any of the various other reasons, the file's existence will still be recorded, logged and tracked. The entry, however, will simply not contain the information about it that was not accessible to the operating system. Up to 51 different data points may be collected for every file.



For each file, information collected includes:
  • SHA256 hash
  • MD5 hash
  • Import table hash (if it exists)
  • MFT Number & Sequence Number
  • MFT Create/Modified/Accessed Dates
  • Create/Modified/Accessed Dates Reported by OS
  • All the 'Standard' OS file properties: location, size, datestamps, attributes, metadata
  • Is a PE or DLL or Driver?
  • Is Authenticode signed?
  • Does the X.509 certificate chain verify?
  • Custom YARA rules (Lists the rule names that match)
  • File entropy
  • File entropy
  • Up to 51 different data points in total

Canned Queries:
/*
IDEA: All files in the directory C:\Windows\System32\ should be 'owned' by TrustedInstaller.
If a file in the System32 directory is owned by a different user, this indicates an anomaly,
and that user is likely the user that created that file.
Malware likes to masquerade around as valid Windows system files.
Executables that are placed in the System32 directory not only look more official, as it is a common path for
system files, but an explicit path to that executable does not need to be supplied to execute it from the
command line, windows 'Run' dialog box of the start menu, or the win32 API call ShellExecute.
*/

SELECT
TOP 1000 *
FROM [FileProperties]
WHERE
[FileOwner] <> 'TrustedInstaller'
AND [DirectoryLocation] = ':\Windows\System32'
AND IsSigned = 0
ORDER BY [PrevalenceCount] DESC


/*
IDEA: The MFT creation timestamp and the OS creation timestamp sh ould match.
If the MFT creation timestamp occurs after the creation time reported by the OS meta-data,
this indicates an anomaly.
Timestomp is a tool that is part of the Metasploit Framework that allows a user to backdate a file
to an arbitrary time of their choosing. There really isn't a good legitimate reason for doing this
(let me know if you can think of one), and is considered an anti-forensics technique.
*/

SELECT
TOP 1000 *
FROM [FileProperties]
WHERE
([MftTimeAccessed] <> [LastAccessTime]) OR
([MftTimeCreation] <> [CreationTime]) OR
([MftTimeMftModified] <> [LastWriteTime])
ORDER BY [DateSeen] DESC

/*
IDEA: The 'CompileDate' property of any executable or dll should always come before the creation timestamp for that file.
Similar logic applies as for the MFT creation timestamp occuring after the creation timestamp. How could a program have been
compiled AFTER the file that holds it was created? This anomaly indicates backdating or timestomping has occurred.
*/


SELECT
TOP 1000 *
FROM [FileProperties]
WHERE
([MftTimeCreation] < [CompileDate]) OR
([CreationTime] < [CompileDate])
ORDER BY [DateSeen] DESC



...



๐Ÿ“Œ Threat Hunting: Eight Tactics to Accelerating Threat Hunting


๐Ÿ“ˆ 37.65 Punkte

๐Ÿ“Œ Hunting for the True Meaning of Threat Hunting at RSAC 2019


๐Ÿ“ˆ 30.91 Punkte

๐Ÿ“Œ Risk Hunting statt Threat Hunting: So sorgen Sie fรผr mehr Cybersicherheit


๐Ÿ“ˆ 30.91 Punkte

๐Ÿ“Œ PcapXray โ€“ GUI Network Forensics Tool To Analysis a Packet Capture Offline


๐Ÿ“ˆ 27.81 Punkte

๐Ÿ“Œ Imago Forensics - Image Forensics Tutorial


๐Ÿ“ˆ 27.78 Punkte

๐Ÿ“Œ Imago Forensics - Image Forensics Tutorial


๐Ÿ“ˆ 27.78 Punkte

๐Ÿ“Œ ICS-Forensics-Tools - Microsoft ICS Forensics Framework


๐Ÿ“ˆ 27.78 Punkte

๐Ÿ“Œ BHASIA Training Preview: Intrusion Analysis & Threat Hunting with Open Source Tools


๐Ÿ“ˆ 27.37 Punkte

๐Ÿ“Œ AlienVault: Threat Hunting/Network Analysis


๐Ÿ“ˆ 27.37 Punkte

๐Ÿ“Œ Git-Scanner - A Tool For Bug Hunting Or Pentesting For Targeting Websites That Have Open .git Repositories Available In Public


๐Ÿ“ˆ 27.33 Punkte

๐Ÿ“Œ Judge overseeing US DOJ lawsuit recuses himself, new judge takes over


๐Ÿ“ˆ 27.06 Punkte

๐Ÿ“Œ Hunting Red Team Activities With Forensics Artifacts


๐Ÿ“ˆ 25.97 Punkte

๐Ÿ“Œ Cybershare: Threat Intelligence โ€“ Part 3 Threat Hunting


๐Ÿ“ˆ 25.56 Punkte

๐Ÿ“Œ Linux Threat Hunting: 'Syslogk' a kernel rootkit found under development in the wild - Avast Threat Labs


๐Ÿ“ˆ 25.56 Punkte

๐Ÿ“Œ Proactive Threat Detection: Introducing Threat Hunting Essentials


๐Ÿ“ˆ 25.56 Punkte

๐Ÿ“Œ Threat Intelligence & Threat Hunting - Chris Cochran - ESW Vault


๐Ÿ“ˆ 25.56 Punkte

๐Ÿ“Œ APT-Hunter โ€“ Threat Hunting Tool via Windows Event Log


๐Ÿ“ˆ 24.2 Punkte

๐Ÿ“Œ APT-Hunter โ€“ Threat Hunting Tool via Windows Event Log


๐Ÿ“ˆ 24.2 Punkte

๐Ÿ“Œ APT-Hunter โ€“ Threat Hunting Tool via Windows Event Log


๐Ÿ“ˆ 24.2 Punkte

๐Ÿ“Œ Free tool to do automated threat hunting in deep web


๐Ÿ“ˆ 24.2 Punkte

๐Ÿ“Œ Akamai releases new threat hunting tool backed by Guardicore capabilities


๐Ÿ“ˆ 24.2 Punkte

๐Ÿ“Œ Akamai releases new threat hunting tool backed by Guardicore capabilities


๐Ÿ“ˆ 24.2 Punkte

๐Ÿ“Œ Decision Analysis Applications in Threat Analysis Frameworks


๐Ÿ“ˆ 23.83 Punkte

๐Ÿ“Œ Following the Clues With DcyFS: A File System for Forensics


๐Ÿ“ˆ 22.54 Punkte

๐Ÿ“Œ Live Forensics & Memory Analysis


๐Ÿ“ˆ 22.43 Punkte

๐Ÿ“Œ Digital Forensics How-To: Memory Analysis with Mandiant Memoryze


๐Ÿ“ˆ 22.43 Punkte

๐Ÿ“Œ Quick Forensics Analysis of Apache logs, (Fri, Mar 29th)


๐Ÿ“ˆ 22.43 Punkte

๐Ÿ“Œ Live Cyber Forensics Analysis with Computer Volatile Memory


๐Ÿ“ˆ 22.43 Punkte

๐Ÿ“Œ Network Forensics, Part 2: Packet-Level Analysis of the NSA's EternalBlue Exploit


๐Ÿ“ˆ 22.43 Punkte

๐Ÿ“Œ Network Forensics, Part 3: tcpdump for Network Analysis


๐Ÿ“ˆ 22.43 Punkte

๐Ÿ“Œ WEBCAST: Live Forensics & Memory Analysis


๐Ÿ“ˆ 22.43 Punkte

๐Ÿ“Œ Analysis of NoCry ransomware: A variant of the Judge ransomware


๐Ÿ“ˆ 22.07 Punkte

๐Ÿ“Œ Hunting after Rogue System Administrators with a SIEM System


๐Ÿ“ˆ 21.12 Punkte











matomo