Dr. Maik Ro Profile picture
Dec 20 18 tweets 6 min read Read on X
Day 1️⃣7️⃣ of Your 30 Day SOC Analyst Journey
How to get started with Digital Forensics: Image
Digital Forensics, the stuff you always dreamed about since CSI Miami.

What is Digital Forensics?, you ask

Let me tell you a story.
It is Thursday, a quiet day.

You sit on your couch sipping hot chocolate ☕️ 🫕 staring into the fire place ❤️‍🔥

As always…

Obviously during working hours 🧑‍💼, stop asking too many questions!

Then…
The phone ☎️📢
RRIIING RRIIING
You try to ignore🙅‍♀️ it but 5 min later its still destroying your perfect moment at home..
What do you do?
You answer it🤳
HELP, EVERYTHING IS ON FIRE!🔥
We cannot login since this morning, all our passwords don’t work ❌🥴
We need you here📍
UGH…

OK - time to get the slippers off and race to the office 🏎

Just another Tuesday…

What do you need?

🎒Go-Bag - ☑️
💻Laptop(s) - ☑️
💾empty Hard-Drives (lots) - ☑️
💿(backup) tool HDD - ☑️
🛟Thumb drive(s) - ☑️
🪥tooth brush - ☑️
🩳🩲🔞under… - ☑️☑️☑️

LETS GO!
That is a lot of stuff you have with you…

WAIT! What is on that 🔧 tool drive?!

Glad you asked, we have some gems on there:

🎆 portable FTK Imager ()
🐕 Autopsy Installer ()
👩‍🏫 Volatility Installer ()accessdata.com/product-downlo…
autopsy.com
volatilityfoundation.org/releases
What do you need those for?

Whenever you arrive at a location with potentially compromised machines...

You need to decide what to do.

✂️Do you cut the internet line, power and everything else?

Or do you observe first?!
One of the first steps you will most likely do is digital forensic image creation (what a mouthful huh?!)

That means you create a snapshot of the computers disk and memory

Why?
⏲️ Sometimes malware/viruses are built to self-destruct when they cannot talk to their makers for a long time

🦠 If you cut the internet and don't have a snapshot of the compromised machine you might never find the virus

❌ Because it deleted itself.
That is what FTK Imager is for.
OK, how do I use it though?
Step-By-Step lets create an image of a Windows Host:
Download FTK Imager ()

Install it in a VM and follow this guide to get it a portable USB drive versiongo.exterro.com/l/43312/2023-0…
Attach the USB Drive to the machine that we want to have a snapshot of and open FTK Imager

Click Yes on the User Account Control, if it pops up. Image
Next you click on "File" (top left) and "Create Disk Image"
It will ask you which type of Source you want to select - we choose "Physical Drive" and click "Next"
FTK will now want to know which Drive it should snapshot - select the one you want to look at and click "Finish" 🏁

Image
Image
Image
That was a fake... its not finished yet!
Now FTK asks which Destination it should use to store your Snapshot
IMPORTANT:
This cannot be the same Disk which you want to snapshot! Choose another one with the "Add" button.
For the Type of Image you want Raw (dd) just like the 🥩
Image
Image
The next screen will add some metadata to the snapshot - Case Number, Evidence Number etc.

Fill it out, important - remember to add the date somewhere and push that "Next" button to the limit.

The last step will ask you for the Destination Folder, Filename and Fragment Size.
Image
Image
Fragment Size means that you will not have 1 file in the end but rather many smaller ones (1.5 GB per file in our case)🪓
This could help if the process crashes at some point or takes forever and you want to start the investigation already🔎👀🔍
"Finish" and WAIT... wait... Image
wait some more.
And once that is done
You should have a couple of files
a Snapshot/Image summary that you can check
e.g. See what was archived and how large the disk was (65536 MB in my case)
Image
Image
Now that you have the Snapshot what do you do with it though?

You analyze it with Autopsy - This is what we will do in the next thread.

Any Questions?
If you liked this thread
follow me @maikroservice

retweet the first tweet of the thread so that more people can learn digital forensics :)
@threadreaderapp unroll

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Dr. Maik Ro

Dr. Maik Ro Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @maikroservice

Dec 20
Day 1️⃣6️⃣ of Your 30 Day SOC Analyst Journey
How to write custom SIEM rules for PowerShell Commands: Image
You want to hunt down attackers when they use the most powerful tool available on Windows systems?

You need to know how to write custom PowerShell rules to do just that - it all starts with PowerShell logs.
Our SIEM has the ability to gather and index PowerShell logs as soon as they come in - the easiest way to make sure they do is via GPO (covered in yesterday’s thread)

to activate PowerShell Log forwarding on all Windows clients centrally.

Ohhh thats possible?!

YES!
Read 38 tweets
Dec 19
Day 1️⃣5️⃣ of Your 30 Day SOC Analyst Journey
Behavior-based detection 💙 - 10x better than signatures: Image
Most of the people (55%) who read this have not yet followed @maikroservice -

If you learn something today - I would kindly ask you to smash that follow button so that I can make sure to produce high quality engaging content that teaches you new things regularly.

Thank you
You want to detect malware, huh?

and until now you used signature-based detection methods - e.g. CDBs and other hash-based detections.

Let’s learn what attackers need to do to defeat those, shall we?! 😈😅
Read 36 tweets
Dec 17
Day 1️⃣4️⃣ of Your SOC Analyst Journey

How to DELETE malware 🦠 automagically 🪄✨: Image
Dear fellow cyber witches and wizards - today your initiation ceremony into the ranks of high cyber council is commencing - I shall be your guide into the world of automagic

GO be a HERO! Image
First up, you will learn a new spell from the anti-malware spell book, the automagical removal of malware ❌🦠

What do I need for that?

Nothing much, a bit of time and enthusiasm is all!

Ready?

GO! Image
Read 29 tweets
Dec 16
Day 1️⃣3️⃣ of Your SOC Analyst Journey

Automatic detection of malware: Image
In the last threads we walked through

FIM - File Integrity Monitoring,
Signature-based detection via YARA
and your first detection rules Image
That’s a lot of ground we covered already - now that pops the question:

How can we test each file that is added to the monitored folders for possible malware quick and easy?!

Thats where CDB come in! Image
Read 28 tweets
Dec 14
Day 1️⃣2️⃣ of Your SOC Analyst Journey

📜 For Beginners - How to start using Signature-based Detection for Malware: Image
🚨 We are still in crisis-mode. 🚨

In the last threads we went through a simulated incident that snatched you off of your comfy 🛋️ and right into 🔥🧑‍🚒 fire extinguisher mode at your company
Today we shall learn how to identify and potentially prevent attacks - we will look at Signature-based Detection using YARA.

💰🎤 Jarule? NO!

YARA.
yara.readthedocs.io/en/stable/
Read 31 tweets
Dec 13
Day 1️⃣1️⃣ of Your SOC Analyst Journey

How to use File Integrity Monitoring to detect hacker: Image
Since we want to talk about File Integrity Monitoring we need to talk about Indicators of Compromise

Lets break down what “compromise” actually means shall we?

We will look at two scenarios:
Someone has your Personal Identifiable Information - PII (name/social security number/address/username/password) 📇🔑

or even worse

Someone has access to / can execute code on your device 💻🏴‍☠️😈

A compromise would be either of those cases
Read 38 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(