device last used | 27/07/2021 (check the timeline feature in autopsy) |
file system used | HFS+ (check the partition table) |
who owns device | Joan Sally Smith (bunch of stuff in the user account directory) |
are you certain | no (you can never be) |
fs version | HFS+ 4 (volume header section contains HFSPlusVolumeHeader) |
user’s password | PaSsWoRd (crack the keychain with johntheripper) |
hidden passwords | bobbytables (header of /…/Document/agocbaqa0h341) |
correcthorsebatterystaple (in the file /…/Document/gpj.10mhk4pc3paw0) | |
secrets in keychain | SuperSecret:IShouldBeUsingMFAIn2021 (chainbreaker with user’s password) |
Report AVG | 74.85% |
Reflection AVG | 61.88% |
Overall | 71.11% |
84%
You had to find one of the following
78%
Just a checklist
74%
72%
68%
57%
68%
55%
the report should be a story
anyone want to volunteer?
when?
there’s a lot you can’t get from a harddisk image
some malware never touches the disk
what
obfuscate names/paths (drop some malware in a system location and give it a legitimate name) misspelled versions of proper system processes proper system names in wrong location duplicate processes that should only spawn once processes that have a parent they shouldn’t system processes with start time much later in life system processes running under a user account
cause RAM is volatile lol
windows.pstree
windows.pslist
windows.psscan
windows.dumpfiles --pid <PID>
windows.memmap --dump --pid <PID>
windows.dllist --pid <PID>
windows.cmdline
windows.envars [--pid <pid>]
windows.handles --pid <pid>
windows.registry.hivescan
windows.registry.hivelist
windows.registry.printkey -K "Path\To\Key"
windows.filescan
windows.dumpfiles
windows.dumpfiles --virtaddr <o>
windows.dumpfiles --physaddr <o>
windows.netscan
windows.netstat
windows.strings --strings-file ./strings_file
windows.vadyarascan --yara-rules "https://" --pid <PIDS>
yarascan.YaraScan --yara-rules <R>
windows.hashdump
windows.cachedump
windows.lsadump
another stolen challenge
can you find Rick’s password?
finally, another investigation