{"id":1853,"date":"2019-06-10T21:00:34","date_gmt":"2019-06-10T19:00:34","guid":{"rendered":"https:\/\/archive.brucon.org\/2019\/?page_id=1853"},"modified":"2021-11-12T09:10:29","modified_gmt":"2021-11-12T07:10:29","slug":"live-forensics-training","status":"publish","type":"page","link":"https:\/\/archive.brucon.org\/2019\/brucon-2019-training\/live-forensics-training\/","title":{"rendered":"Live Forensics Training"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]<strong>UNFORTUNATELY THIS TRAINING HAS BEEN CANCELLED. WE APOLOGISE FOR ANY INCONVENIENCE\u00a0<\/strong><\/p>\n<h2>Course Description<\/h2>\n<p>The live forensic training will teach how to acquire and analyse data of a running machine (Windows, Linux and macOS) that would be lost upon shutdown. The training mainly focuses on memory (RAM), but also considers other data sources that have to be safeguarded carefully, such as active browser sessions and temporarily unlocked encryption. The training will teach you how to find evidence of malicious user activity as well as advanced malware in memory.<\/p>\n<p>The theory of the training will be put into practise by analysing memory images of a Windows, Linux and Mac computer that were involved in a scenario that was specifically created for this training. The scenario involves a hacking, criminal user activity, anti-forensic techniques and more. By analysing the artefacts and correlating the findings, you will unravel the complete story. All detailed course material (theory and step-by-step exercise solutions) will be yours to keep after the training. This will serve as excellent reference material during your investigations.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2>Course contents<\/h2>\n<p><strong style=\"font-size: 16px;\">Scouting<\/strong><\/p>\n<p>Learn how to identify the state of a live system and discover possible anti-forensic techniques in order to counter them. The theory is followed by scouting a hacker\u2019s Linux machine.<\/p>\n<p><strong>Memory internals<\/strong><\/p>\n<p>Introduction to how the RAM is utilised by the OS and hardware.<\/p>\n<p><strong>Memory acquisition<\/strong><\/p>\n<p>Learn how to acquire the memory of a Windows, Linux, Mac and Virtual Machine system.<\/p>\n<p><strong>Memory analysis Windows<\/strong><\/p>\n<p>Learn how to find user activity and (hidden) malware on a Windows machine with Volatility. The theory is followed by the analysis of memory of three machines: (i) a machine infected with basic malware, (ii) a machine infected with advanced malware and (iii) a machine that is victim of a hacking in the fictional scenario.<\/p>\n<p><strong>Memory analysis Linux<\/strong><\/p>\n<p>Learn how to create a Linux Volatility profile and analyse Linux memory in order to find malware and malicious user activity. The theory is followed by the analysis of a Kali Linux machine of a hacker in the fictional scenario.<\/p>\n<p><strong>Memory analysis of Mac<\/strong><\/p>\n<p>Learn how to find user activity and (hidden) malware on a macOS machine with Volatility. The theory is followed by analysis of a macOS machine that was utilised for criminal activity and at the same time victim of cyber-espionage.<\/p>\n<p><strong>Carving from memory<\/strong><\/p>\n<p>Learn how to carve files and other forensically relevant artefacts from memory.<\/p>\n<p><strong>Defeating encryption<\/strong><\/p>\n<p>Learn how to defeat TrueCrypt containers and macOS Keychains using memory analysis.<\/p>\n<h3><strong>Target Audience<\/strong><\/h3>\n<ul>\n<li>Digital forensic analysts<\/li>\n<li>Incident responders<\/li>\n<li>Law enforcement officers<\/li>\n<li>Information security professionals<\/li>\n<li>System administrators<\/li>\n<li>SOC analysts<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2>Requirements<\/h2>\n<p>Basic knowledge of Linux commands and operating system concepts.<\/p>\n<h3>Hardware Requirements<\/h3>\n<ul>\n<li>CPU: 64-bit Intel x64 2.0+ GHz or higher<\/li>\n<li>RAM: 8 GB or more<\/li>\n<li>HDD: 50 GB free space or more<\/li>\n<li>Network: Ethernet or Wireless (IEEE 802.11)<\/li>\n<li>USB: 2.0 port(s) or better<\/li>\n<\/ul>\n<h3>Software Requirements<\/h3>\n<ul>\n<li>Your host system needs to be 64-bit Windows or Linux with local administrator\/root rights. Your host needs to be able to run VirtualBox (including the extension pack) and optionally VMware virtualization software in order to virtualize the following operating systems:<\/li>\n<li>Windows 7 x64 or newer<\/li>\n<li>Kali Linux x64 (full version, 2017.1 or newer)<\/li>\n<\/ul>\n<p>Please ensure that (i) virtualization is enabled in your BIOS and that (ii) you can easily transfer files between your host and guest OS <u>before the start of the training<\/u>.\u00a0The Kali Linux VM can be downloaded from <u><a href=\"https:\/\/www.kali.org\/downloads\/\">https:\/\/www.kali.org\/downloads\/<\/a><\/u>. When virtualizing Kali Linux, the pre-installed \u201cKali Linux 64 bit VMware VM\u201d or \u201cKali Linux 64 bit Vbox\u201d packages are recommended.<\/p>\n<h4><strong>Required Windows software<\/strong><\/h4>\n<ul>\n<li>Sysinternals Suite &#8211;\u00a0<a href=\"https:\/\/docs.microsoft.com\/en-us\/sysinternals\/downloads\/sysinternals-suite\">https:\/\/docs.microsoft.com\/en-us\/sysinternals\/downloads\/sysinternals-suite<\/a><\/li>\n<li>NirLauncher Package &#8211;\u00a0<a href=\"https:\/\/launcher.nirsoft.net\/downloads\/index.html\">https:\/\/launcher.nirsoft.net\/downloads\/index.html<\/a><\/li>\n<li>winpmem, linpmem, osxpmem &#8211;\u00a0<a href=\"https:\/\/github.com\/google\/rekall\/releases\">https:\/\/github.com\/google\/rekall\/releases<\/a><\/li>\n<li>HxD &#8211;\u00a0<a href=\"https:\/\/mh-nexus.de\/en\/downloads.php?product=HxD\">https:\/\/mh-nexus.de\/en\/downloads.php?product=HxD<\/a><\/li>\n<li>Microsoft Office or LibreOffice or OpenOffice (Excel \/ Calc) &#8211;\u00a0<a href=\"https:\/\/www.libreoffice.org\/download\/download\/\">https:\/\/www.libreoffice.org\/download\/download\/<\/a><\/li>\n<li>Rekall &#8211;\u00a0<a href=\"https:\/\/github.com\/google\/rekall\/releases\">https:\/\/github.com\/google\/rekall\/releases<\/a><\/li>\n<li>7-zip &#8211;\u00a0<a href=\"http:\/\/www.7-zip.org\/download.html\">http:\/\/www.7-zip.org\/download.html<\/a><\/li>\n<li>A Windows registry viewer (e.g. AccessData Registry Viewer) &#8211;\u00a0<a href=\"https:\/\/accessdata.com\/product-download\/registry-viewer-1-8-0-5\">https:\/\/accessdata.com\/product-download\/registry-viewer-1-8-0-5<\/a><\/li>\n<\/ul>\n<p><strong>\u00a0<\/strong><strong>Required Linux software<\/strong><\/p>\n<ul>\n<li>LiME &#8211;\u00a0<a href=\"https:\/\/github.com\/504ensicsLabs\/LiME\">https:\/\/github.com\/504ensicsLabs\/LiME<\/a><\/li>\n<li>Pefile &#8211;\u00a0<a href=\"https:\/\/github.com\/erocarrera\/pefile\">https:\/\/github.com\/erocarrera\/pefile<\/a><\/li>\n<li>Peframe\n<ul>\n<li>$ apt install peframe<\/li>\n<\/ul>\n<\/li>\n<li>Volatility\n<ul>\n<li>$ apt install volatility<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2>Trainer Biography<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;5\/6&#8243;][vc_column_text]<strong>C\u00e9dric Remande<\/strong> is a manager in the cyber forensic team at PwC Belgium. He has more than 6 years of experience in handling digital forensic investigations and incident response cases.\u00a0\u00a0As a GIAC certified Forensic Analyst (GCFA) and GIAC certified reverse engineer of malware (GREM), C\u00e9dric is skilled in deep-dive forensic analysis of hard drives, memory and malware of compromised hosts. C\u00e9dric has mainly performed projects for the private and financial sectors, with challenges in the areas of compromise assessments, data privacy breaches and threat hunting.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;1857&#8243;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text]UNFORTUNATELY THIS TRAINING HAS BEEN CANCELLED. WE APOLOGISE FOR ANY INCONVENIENCE\u00a0 Course Description The live forensic training will teach how to acquire and analyse data of a running machine (Windows, Linux and macOS) that would be lost upon shutdown. The training mainly focuses on memory (RAM), but also considers other data sources that have to be safeguarded carefully, such as active browser sessions and temporarily unlocked encryption. The training will teach you how to find&#8230;<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":75,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1853","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/archive.brucon.org\/2019\/wp-json\/wp\/v2\/pages\/1853","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.brucon.org\/2019\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/archive.brucon.org\/2019\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2019\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2019\/wp-json\/wp\/v2\/comments?post=1853"}],"version-history":[{"count":7,"href":"https:\/\/archive.brucon.org\/2019\/wp-json\/wp\/v2\/pages\/1853\/revisions"}],"predecessor-version":[{"id":2068,"href":"https:\/\/archive.brucon.org\/2019\/wp-json\/wp\/v2\/pages\/1853\/revisions\/2068"}],"up":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2019\/wp-json\/wp\/v2\/pages\/75"}],"wp:attachment":[{"href":"https:\/\/archive.brucon.org\/2019\/wp-json\/wp\/v2\/media?parent=1853"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}