Friday, September 17, 2021

Learning from the Best : Nick Furneaux - How to hack RAM, What I Learned from Israel's Unit 8200

https://www.csitech.co.uk/training/ram-analysis/

Advanced RAM Analysis and Forensics - 4 Day Course for about $2300.

We are pleased to announce the updated 2021 4 day Advanced RAM Analysis

course.

As before the course is primarily hands on but provides much more flexibility. A significant time is spent in advanced memory data extraction and analysis techniques including reconstruction of file systems, password location, decryption and deconstruction of memory resident Malware such as Stuxnet.

Also interesting, is creating and scripting your own memory analysis toolkit.

A 32 GIG ruggedized USB key (download for online course) is supplied for each student to keep with all software and RAM dumps.

Syllabus

• Live Forensic procedures

• Live Windows RAM imaging (Cmd line and GUI based)

• Imaging Linux RAM

• Imaging Intel Mac’s (OSX)

• Testing downloaded tools

• Creating and scripting your own toolkits

• Script disk imaging

• Scripting memory imaging

• Volatile data extraction

• Reverse copying key files and folders

• Advanced Memory (RAM) analysis

• Extraction of data to enhance a disk investigation

• Extraction of elements such as Internet History, timelines and

passwords

• Extracting data from Hiberfil and Crashdump files

• Recreating the entire file system with automated forensic data

extraction

www.csitech.co.uk

• Using Volatility to extract:-

▪ Running processes

▪ Open network sockets

▪ Open network connections

▪ DLLs loaded for each process

▪ Open files for each process

• Finding HTML pages in a Browser process

▪ Open registry handles for each process

▪ Extracting process spaces with their associated files

▪ OS kernel modules

▪ Mapping physical offsets to virtual addresses (strings to

process)

▪ Understanding the PEB

▪ Understanding the VAD

▪ Extracting executables from memory samples

▪ Extracting and analysing operating system files

▪ Extracting and analysing user files

▪ Extracting the MFT

▪ Virus checking RAM dumps

▪ Extraction of network packet data and analysis

• Enhanced network analysis

• New Decryption section

▪ Hands-on extraction of Truecrypt and Veracrypt Master

Keys and container decryption

▪ Hands-on extraction of Bitlocker Master Keys and drive

decryption

▪ Cracking of OSX Keychain without password

• New Malware section

▪ ID’ing suspect processes

▪ Following the malware into Services and Registry

▪ Mapping the IP connections

▪ Extraction of the malware and analysis

▪ Deconstruction of Stuxnet

▪ Understanding what the Malware is doing

▪ Much more…

• New Registry Section

▪ Location and extraction of specific registry keys

▪ Extracting the SAM and decrypting passwords

▪ Finding other passwords

▪ Locating useful keys (TypedURLS, System info etc)

▪ Again, loads more

www.csitech.co.uk

• OSX Memory analysis

▪ Data carving

▪ Process recovery

▪ New Volatility commands

• Linux RAM investigation

▪ Data carving

▪ Recovering processes

▪ Login sessions

▪ Network information

▪ Routing tables

▪ Malware investigation

• Creating your own RAM analysis script to take away

• Final day practical exam and review

To discuss your training needs, or to organize a course, please contact Nick

Furneaux – nick@csitech.co.uk

Friday, September 10, 2021

How You Should View Images with the Public Library's Read-In-Browser App

I'm thinking it is powered by Overdrive (why they're getting worse with each year is beyond me).

Here's what you do :

  1. Get your mouse over the image (no clicking yet) and wait for the "Zoom image" tooltip to show.
  2. Now, click and HOLD, don't just click and release as that'll navigate!
  3. Once it's gone into image view mode, you can use your scroll wheel to get more detail by zooming in.

Like?

The app seems to be so buggy that this doesn't always work :(

Thursday, September 09, 2021

BellingCat : Holding the World Accountable

Data mining exposes spikes in communication among perpetrators in Russia's military establishment ahead of key events, like the Navalny poisoning. These are the detectives making sure the world knows about Russia's crimes against humanity.

https://www.economist.com/podcasts/2021/08/10/how-open-source-intelligence-is-disrupting-statecraft

https://www.bellingcat.com/

Watch the lovely Alice Himsworth (Senior Legal Counsel @ Google) chat the founder Elliot Higgins : https://www.youtube.com/watch?v=rqsfOz9fdmQ

Buy the book (don't worry, I get nothing :) : https://www.amazon.com/We-Are-Bellingcat-Global-Sleuths/dp/1635577306