top of page

#DFIR: Digital Forensics Incident Response

arun711

Updated: Mar 1, 2024

DFIR (Digital Forensic and Incident Response) refers to the process of collecting, analyzing, and preserving digital data related to an incident, typically in a criminal or cybersecurity context. The goal is to uncover evidence and information that can help identify the cause of the incident and prevent similar incidents from happening in the future. This process involves a combination of technical and legal skills, and often involves the use of specialized software and hardware tools.


DFIR process might include the following steps:

  1. Identification of incident

  2. Preservation of evidence

  3. Collection of evidence

  4. Analysis of evidence

  5. Reporting of findings

  6. Remediation of incident

  7. Review of process

  • Preparation: This involves establishing the necessary policies, procedures, tools, and resources needed for a successful DFIR investigation.

  • Identification: This involves determining that an incident has occurred, and determining the scope and nature of the incident. This may involve receiving a complaint, noticing unusual activity, or performing routine monitoring of systems and networks.

  • Preservation: This involves collecting, acquiring, and preserving digital evidence in a way that maintains its authenticity, integrity, and reliability. This may involve creating images of hard drives, memory dumps, or other digital artifacts, and storing them in a secure location.

  • Collection: This involves identifying and gathering digital evidence from a variety of sources, including servers, workstations, mobile devices, cloud services, and network devices. Collection should be performed in a manner that minimizes disruption to normal business operations and preserves the integrity of the evidence.



kape.exe --tsource C: --tdest C:\Forensics\KAPEDEST1\Artifacts --target !Quick_Triage --msource C: --module !ALL --mdest  C:\Forensics\KAPEDEST1\Artifacts\Volatile_Data --zip %COMPUTERNAME%

  • Analysis: This involves examining and analyzing the collected digital evidence to identify and extract relevant information related to the incident. This may involve using specialized tools, techniques, and methodologies to examine the data and identify patterns, anomalies, and trends.

NOTE: //d/ - Drive D:\ and path to the case files /data - mount point inside docker blacktop/volatility - Docker image name '-f' - Volatility switch/option pointing to memory file after mounting into docker. '--profile' : Volatility switch/option to determine the OS version of the memory dump 'hashdump' : Volatility command.

  • Download the Plugins from https://github.com/TazWake/volatility-plugins



QUICK MEMORY ANALYSIS:

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem imageinfo

docker run --rm -it -v //d/Forensics/KAPEDEST1/Artifacts/Volatile_Data/Memory:/Memory:rw blacktop/volatility -v //d/Forensics/Tools/volatilityplugins:/Plugins --plugins=/Plugins/hollowfind -f /Memory/memory.raw --profile=Win2012R2x64 hollowfind

docker run --rm -it -v //d/Forensics/KAPEDEST1/Artifacts/Volatile_Data/Memory:/Memory:rw blacktop/volatility -v //d/Forensics/Tools/volatilityplugins:/Plugins --plugins=/Plugins/triagecheck -f /Memory/memory.raw --profile=Win2012R2x64 triagecheck

docker run --rm -it -v //d/Forensics/KAPEDEST1/Artifacts/Volatile_Data/Memory:/Memory:rw blacktop/volatility -v //d/Forensics/Tools/volatilityplugins:/Plugins --plugins=/Plugins/cmdcheck -f /Memory/memory.raw --profile=Win2012R2x64 cmdcheck

docker run --rm -it -v //d/Forensics/KAPEDEST1/Artifacts/Volatile_Data/Memory:/Memory:rw blacktop/volatility -v //d/Forensics/Tools/volatilityplugins:/Plugins --plugins=/Plugins/FastVADScan -f /Memory/memory.raw --profile=Win2012R2x64 fastvadscan

docker run --rm -it -v //d/Forensics/KAPEDEST1/Artifacts/Volatile_Data/Memory:/Memory:rw blacktop/volatility -v //d/Forensics/Tools/volatilityplugins:/Plugins --plugins=/Plugins/ramscan -f /Memory/memory.raw --profile=Win2012R2x64 ramscan -output=html --output-file=/Memory/ramscan.html

docker run --rm -it -v //d/Forensics/KAPEDEST1/Artifacts/Volatile_Data/Memory:/Memory:rw blacktop/volatility -v //d/Forensics/Tools/volatilityplugins:/Plugins --plugins=/Plugins/pathcheck -f /Memory/memory.raw --profile=Win2012R2x64 pathcheck

DETAILED ANALYSIS:

docker run --rm -it -v //d/Forensics/KAPEDEST1/Artifacts/Volatile_Data/Memory:/Memory:rw blacktop/volatility -f /Memory/memory.raw imageinfo

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 hashdump

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 pslist

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 pstree

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 malfind

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 shellbags

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 sessions

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 hashdump

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 hivelist

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 psxview

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 netscan

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 shutdowntime

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 connscan

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 sockets

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 modules

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 shimcache

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 mftparser

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 iehistory

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 amcache

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 clipboard

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 callbacks

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 handles

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 envars

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 lsadump -d /data/

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 hivedump -d /data/

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 userassist

docker run --rm -v //d/FORENSICS/TUTORIALS/CASE1-WEB-SERVER/:/data:rw blacktop/volatility -f /data/memdump.mem --profile=Win2008SP2x86 crashinfo

PROCESS DUMP COMMAND
docker run --rm -it -v //d/Forensics/KAPEDEST1/Artifacts/Volatile_Data/Memory:/Memory:rw blacktop/volatility -f /Memory/memory.raw --profile=Win2012R2x64 procdump -D /Memory/ -p ID

CREATING TIMELINE FROM MEOMRY
cd D:/Forensics/KAPEDEST1/Artifacts/Volatile_Data/Memory

docker run --rm -it -v //d/Forensics/KAPEDEST1/Artifacts/Volatile_Data/Memory:/Memory:rw blacktop/volatility --plugins=/Memory/volatilityplugins/cmdcheck -f /Memory/memory.raw --profile=Win2012R2x64 timeliner --output=body > timeliner.body

docker run --rm -it -v //d/Forensics/KAPEDEST1/Artifacts/Volatile_Data/Memory:/Memory:rw blacktop/volatility --plugins=/Memory/volatilityplugins/cmdcheck -f /Memory/memory.raw --profile=Win2012R2x64 mftparser --output=body > mftparser.body

copy *.body fullmemory.body

docker run --rm -v //d/Forensics/KAPEDEST1/Artifacts:/Artifacts:rw  log2timeline/plaso log2timeline --parser "mactime" timeline.plaso fullmemory.body

docker run --rm log2timeline/plaso psort -o L2csv --fields datetime,timestamp_desc,source,source_long,message,parser,tag -w myownpc.csv timeline.plaso
  • Reporting: This involves documenting the results of the DFIR investigation and presenting the findings to stakeholders. This may involve producing detailed technical reports, summaries, and visual representations of the evidence and findings.

    • Better of using Cyber Triage tool or Intezer to generate reports without efforts.


  • Remediation: This involves taking steps to address the underlying cause of the incident and prevent similar incidents from happening in the future. This may involve implementing security measures, deploying software patches, or updating policies and procedures.


  • Review: This involves evaluating the DFIR process and the results of the investigation, and making recommendations for improvement. This may involve identifying areas where the process can be streamlined, tools can be improved, or additional training is needed.

In case of more doubts, please comment below for help.






52 views0 comments

Recent Posts

See All

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating

Cyber Security Services

           CynorSense Solution Pvt. Ltd. is your dedicated partner in the ever-evolving domain of cybersecurity. We are committed to delivering cutting-edge cybersecurity solutions, tailored to meet the unique needs of each client. Our comprehensive suite of services includes Penetration Testing, SOC & SIEM Services, Incident Response, and Cyber Security Consultation.

​

Our expertise extends across Secure Code Review, Vulnerability Assessment and Penetration Testing (VAPT) Services, Security Audits, Risk and Threat Assessment, and Vulnerability Scanning. In addition, we offer services in Malware Analysis, Phishing Simulation, Social Engineering Testing, Web Application Testing, Mobile Application Testing, Network Security Testing, Infrastructure Security Testing, Application Security Testing, and Data Security Testing. 

​

We understand the importance of compliance in today's regulatory environment. Our Compliance Testing services are designed to help your organization navigate the complex landscape of regulations such as ISO 27001, PCI DSS, HIPAA, SOX, GLBA, NERC CIP, FISMA, and the NIST Cybersecurity Framework. 

​

At CynorSense, we blend innovative technology with a robust understanding of the cybersecurity landscape to provide you with the tools and knowledge needed to safeguard your digital assets. Let us be your trusted guide in the realm of cybersecurity, providing the assurance you need in an increasingly interconnected world.

ISO 27001 and ISO 9001 certified company

TELEPHONE:

 +91 4046007719

 +91 8179245139

 ADDRESS: 

 Cynor Sense Solutions Pvt. Ltd.

 Vijay Krishna Towers,   Nanakramguda, Hyderabad,

 Telangana, India - 500032

© 2023 Cynorsense Pvt. Ltd. All rights reserved.

bottom of page