Windows Security and Forensics Study Notes
Introduction
Welcome to Markof Virtual Academy's Windows Security and Forensics class.
Presenters:
H Shar, Cyber Security Advisor at CHC.
Extensive experience in various operating systems: Windows, Linux, etc.
Focuses on Identity Management, Network Security, Forensic Penetration Testing.
H Shar is a Microsoft MVP in Enterprise Security.
Course outline includes six main topics and a bonus topic.
Course Structure
Topics Covered:
Security landscape today.
Windows memory attacks and forensics.
Authentication attacks.
Windows forensics with guest MVP Raymond.
Network forensics.
Incident Response.
Bonus: Windows 10 forensics.
Level: Material is geared towards a 200-300 level understanding, with some advanced topics included.
Security Landscape
Rapid Changes in Security:
Internet activity is high, affecting security practices.
Microsoft's focus: "Cloud first, mobile first."
Cyber Crime:
Transitioned from a hobby to a business enterprise.
Significant financial incentives drive cybercrime.
Motivations range from financial (most common) to political agendas.
Categories of Cyber Criminals:
Government-funded cyber armies.
Traditional hackers.
Challenges and Misconceptions
Many organizations incorrectly believe that having products alone guarantees security.
Importance of understanding what assets need protection.
Consequences of Mismanagement:
Poor security can lead to increased organizational losses.
No single product can provide complete protection.
Importance of Windows Security
Protecting systems against unauthorized access is critical.
Each organization must identify key assets needing protection.
Defense-in-Depth:
Security is a layered approach; measures must work in concert.
Evolution of Cyber Threats
Historical Context:
1977: Introduction of viruses (e.g., Apollo Virus).
2000s: Emergence of Melissa and ILOVEYOU viruses.
Increasing sophistication of attacks (phishing, advanced persistent threats).
2012 onwards: Nation-states and organized crime significantly raise effectiveness and impact.
Cost of Cyber Attacks
Cyber incidents can lead to losses estimated in the trillions of dollars worldwide.
Impacts are not just financial but can also affect operational productivity and growth.
Need for Forensics
Definition: Forensics is about collecting, analyzing, and reporting digital data from attacks or breaches.
Key Process:
Gathering artifacts and building a timeline of events post-incident.
Digital Forensics involves extracting and analyzing data to present as evidence.
Addresses illegal activities occurring within digital environments.
Forensic Process
Importance of understanding the evidence collection process:
Requires adherence to laws and regulations.
Chain of Custody:
Documenting how evidence is collected, analyzed, and preserved.
Tools Required:
Hardware and software designed for data acquisition and analysis.
Analyze relationships between systems and their normal operations to identify incidents.
Types of Data in Forensics
Data Types:
Data at rest (stored data).
Data in execution (executing in memory).
Data in transit (data being transmitted).
How cloud computing impacts forensic practices and analysis.
Memory and Network Forensics
Memory Forensics:
Importance in recovering data from volatile memory.
Techniques to extract passwords and other sensitive data from memory.
Network Forensics:
Involves monitoring and analyzing network traffic to identify malicious activities.
Powershell Attacks Demonstration
Powershell is a powerful tool for system management but can also be abused for cyber attacks.
Demo Overview:
Setting up a command and control server using Metasploit.
Executing a Powershell script that allows unauthorized access to a victim's machine.
Employing a reverse HTTPS connection to maintain access to the victim's system.
Key Takeaways:
Hackers leverage Powershell for executing commands without leaving traces.
Effective countermeasures must be in place to detect these activities.
Conclusion
Windows environment is evolving with new security features.
Forensics continues to play a critical role in understanding and mitigating cyber threats.
Final Note: The next session will cover memory attacks and further delve into security practices.