Difference between pages "Carver 2.0 Planning Page" and "HBGary Responder Professional"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
m (OS)
 
 
Line 1: Line 1:
This page is for planning Carver 2.0.
+
[[File:logo.jpg]]
  
Please, do not delete text (ideas) here. Use something like this:
+
Responder™ Professional is a leader in Windows™ physical memory and automated malware analysis. It is an
 +
application that is known for its ease of use, streamlined workflow, and rapid results. The Professional platform is designed for Incident Responders, Malware Analysts, and Computer Forensic Investigators who demand the very best. Responder Professional provides powerful memory
 +
forensics, malware detection, and software behavioral identification with Digital DNA™.
  
<pre>
 
<s>bad idea</s>
 
:: good idea
 
</pre>
 
  
This will look like:
+
== Memory Preservation ==
  
<s>bad idea</s>
+
FDPro is included with Responder™ Professional. FDPro is the most complete memory acquisition software in the
:: good idea
+
industry. FDPro is the only application that can preserve Windows™ physical memory and Pagefile for information security and computer
 +
forensic purposes.
  
= License =
 
  
BSD-3.
+
== Memory Analysis ==
  
= OS =
+
Critical computer artifacts are found only in live memory. Responder™ makes it easy to uncover, identify, and report on critical information with easy to use and intuitive GUI designed to support investigation workflow.
  
Linux/FreeBSD/MacOS
+
[[File:memory_analysis.jpg]]  
: (shouldn't this just match what the underlying afflib & sleuthkit cover? [[User:RB|RB]])
+
:: Yes, but you need to test and validate on each. Question: Do we want to support windows? [[User:Simsong|Simsong]] 21:09, 30 October 2008 (UTC)
+
  
= Requirements =
 
* AFF and EWF file images supported from scratch.
 
* File system aware layer.
 
** By default, files are not carved. (clarify: only identified? [[User:RB|RB]]; I guess that it operates like [[Selective file dumper]] [[User:.FUF|.FUF]] 07:00, 29 October 2008 (UTC))
 
* Plug-in architecture for identification/validation.
 
** Can handle config files,like Revit07, to enter different file formats used by the carver.
 
* Ship with validators for:
 
** JPEG
 
** PNG
 
** GIF
 
** MSOLE
 
** ZIP
 
** TAR (gz/bz2)
 
* Simple fragment recovery carving using gap carving.
 
* Recovering of individual ZIP sections and JPEG icons that are not sector aligned.
 
* Autonomous operation (some mode of operation should be completely non-interactive, requiring no human intervention to complete [[User:RB|RB]])
 
* Tested on 500GB-sized images. Should be able to carve a 500GB image in roughly 50% longer than it takes to read the image.
 
** Perhaps allocate a percentage budget per-validator (i.e. each validator adds N% to the carving time)
 
* Parallelizable.
 
* Configuration:
 
** Capability to parse some existing carvers' configuration files, either on-the-fly or as a one-way converter.
 
** Disengage internal configuration structure from configuration files, create parsers that present the expected structure
 
**  Either extend Scalpel/Foremost syntaxes for extended features or use a tertiary syntax
 
* Can output audit.txt file.
 
* Easy integration into ascription software.
 
  
= Ideas =
+
== Malware Detection with Digital DNA™ ==
* Use as much TSK if possible. Don't carry your own FS implementation the way photorec does.
+
* Extracting/carving data from [[Thumbs.db]]? I've used [[foremost]] for it with some success. [[Vinetto]] has some critical bugs :( [[User:.FUF|.FUF]] 19:18, 28 October 2008 (UTC)
+
* Carving data structures. For example, extract all TCP headers from image by defining TCP header structure and some fields (e.g. source port > 1024, dest port = 80). This will extract all data matching the pattern and write a file with other fields. Another example is carving INFO2 structures and URL activity records from index.dat [[User:.FUF|.FUF]] 20:51, 28 October 2008 (UTC)
+
** This has the opportunity to be extended to the concept of "point at blob FOO and interpret it as BAR"
+
  
.FUF added:
+
Digital DNA™ is a revolutionary technology designed to detect advanced computer security threats within physical memory. All memory is analyzed offline as a file; there is no active code to thwart analysis. Digital DNA™ does not rely on the Windows operating system since the host is  assumed to be compromised and thus not trusted. All executable code in memory is scanned, scored, and ranked by level of severity based upon programmed software behaviors.
The main idea is to allow users to define structures, for example (in pascal-like form):
+
  
<pre>
+
[[File:Ddna_image.jpg]]
Field1: Byte = 123;
+
SomeTextLength: DWORD;
+
SomeText: string[SomeTextLength];
+
Field4: Char = 'r';
+
...
+
</pre>
+
  
This will produce something like this:
 
<pre>
 
Field1 = 123
 
SomeTextLength = 5
 
SomeText = 'abcd1'
 
Field4 = 'r'
 
</pre>
 
  
(In text or raw forms.)
+
== Automated Malware Analysis ==
  
Opinions?
+
More computer crimes are involving malware as a method of gaining access to confidential information. The new face
 +
of malware is designed to never touch the disk and reside only in memory. Important delivery information, rootkit behaviors, and malware not detected by Anti-Virus can be easily found using Responder™ Professional.
  
Opinion: Simple pattern identification like that may not suffice, I think Simson's original intent was not only to identify but to allow for validation routines (plugins, as the original wording was).  As such, the format syntax would need to implement a large chunk of some programming language in order to be sufficiently flexible. [[User:RB|RB]]
+
[[File:Automated_analysis.jpg]]  
  
= Supported File Systems =
 
  
Build a large list of supported filesystems. File carving programs ignore the filesystem, but this doesn't mean that they support all of them. Do we support Reiser4 with tail packing? Or exFAT? Or NTFS with compression? Document this. [[User:.FUF|.FUF]] 19:18, 28 October 2008 (UTC)
+
== Reporting ==
  
:: As noted above, TSK should be utilized as much as possible, particularly the filesystem-aware portion.  If we want to identify filesystems outside of its supported set, it would be more worth our time to work on implementing them there than in the carver itself. [[User:RB|RB]]
+
A flexible reporting module is built in for ease of use so you can quickly deliver the information in
 +
a succinct manner to attorneys, management, or clients.
  
:::: I guess this tool operates like [[Selective file dumper]] and can recover files in both ways (or not?). Recovering files by using carving can recover files in situations where sleuthkit does nothing (e.g. file on NTFS was deleted using ntfs-3g, or filesystem was destroyed or just unknown). And we should build the list of filesystems supported by carver, not by TSK. [[User:.FUF|.FUF]] 07:08, 29 October 2008 (UTC)
+
[[File:Reporting.jpg]]  
  
:: This tool is still in the early planning stages (requirements discovery), hence few operational details (like precise modes of operation) have been fleshed out - those will and should come later.  The justification for strictly using TSK for the filesystem-sensitive approach is simple: TSK has good filesystem APIs, and it would be foolish to create yet another standalone, incompatible implementation of filesystem(foo) when time would be better spent improving those in TSK, aiding other methods of analysis as well.  This is the same reason individuals that have implemented several other carvers are participating: de-duplication of effort.  [[User:RB|RB]]
 
  
=Implementation Timeline=
+
== External Links ==
# gather the available resources/ideas/wishes/needs etc. (I guess we're in this phase)
+
 
# start discussing a high level design (in terms of algorithm, facilities, information needed)
+
http://www.hbgary.com
## input formats facility
+
https://www.hbgary.com/products-services/responder-professional/
## partition/volume facility
+
## file system facility
+
## file format facility
+
## content facility
+
## how to deal with fragment detection (do the validators allow for fragment detection?)
+
## how to deal with recombination of fragments
+
## do we want multiple carving phases in light of speed/precision tradeoffs
+
# start detailing parts of the design
+
## Discuss options for a grammar driven validator?
+
## Hard-coded plug-ins?
+
## Which exsisting code can we use?
+
# start building/assembling parts of the tooling for a prototype
+
## Implement simple file carving with validation.
+
## Implement gap carving
+
# Initial Release
+
# Implement the ''threaded carving'' that [[User:.FUF|.FUF]] is describing above.
+

Revision as of 15:35, 12 October 2009

Logo.jpg

Responder™ Professional is a leader in Windows™ physical memory and automated malware analysis. It is an application that is known for its ease of use, streamlined workflow, and rapid results. The Professional platform is designed for Incident Responders, Malware Analysts, and Computer Forensic Investigators who demand the very best. Responder Professional provides powerful memory forensics, malware detection, and software behavioral identification with Digital DNA™.


Memory Preservation

FDPro is included with Responder™ Professional. FDPro is the most complete memory acquisition software in the industry. FDPro is the only application that can preserve Windows™ physical memory and Pagefile for information security and computer forensic purposes.


Memory Analysis

Critical computer artifacts are found only in live memory. Responder™ makes it easy to uncover, identify, and report on critical information with easy to use and intuitive GUI designed to support investigation workflow.

Memory analysis.jpg


Malware Detection with Digital DNA™

Digital DNA™ is a revolutionary technology designed to detect advanced computer security threats within physical memory. All memory is analyzed offline as a file; there is no active code to thwart analysis. Digital DNA™ does not rely on the Windows operating system since the host is assumed to be compromised and thus not trusted. All executable code in memory is scanned, scored, and ranked by level of severity based upon programmed software behaviors.

Ddna image.jpg


Automated Malware Analysis

More computer crimes are involving malware as a method of gaining access to confidential information. The new face of malware is designed to never touch the disk and reside only in memory. Important delivery information, rootkit behaviors, and malware not detected by Anti-Virus can be easily found using Responder™ Professional.

Automated analysis.jpg


Reporting

A flexible reporting module is built in for ease of use so you can quickly deliver the information in a succinct manner to attorneys, management, or clients.

Reporting.jpg


External Links

http://www.hbgary.com https://www.hbgary.com/products-services/responder-professional/