Overview
The session covers home router security practices and an introduction to memory forensics using DumpIt and Volatility, including workflow, tools, and example analysis steps.
Router Security and Management
- Universal Plug and Play: Disable to avoid unintended sharing from removable drives.
- Backup Settings: Export router config to avoid rebuilding DHCP reservations after failures.
- DHCP Table: Manually assign friendly names and static leases for easy identification.
- Firmware Updates: Prefer notifications; periodically check and apply updates manually.
- Device Monitoring: Use router interface to list connected devices with friendly names.
- SSID Naming: Avoid personal info and model numbers; hiding SSID offers negligible security.
- Address Scheme: Example uses 192.168.0.1 for router, .2 main PC, .3 spouse PC via DHCP reservations.
SSID Naming Guidance
- Do not include personal identifiers (e.g., names, addresses).
- Do not include vendor/model (e.g., Netgear ABC123) to avoid targeted exploits.
- Hiding SSID: Provides only minimal security; tools can detect networks regardless.
Firmware Update Approach
- Automatic updates: Presenter prefers notifications over full auto-update.
- Current practice: Manually check “latest version” and update when available.
Memory Forensics: Concepts and Workflow
- Volatility: RAM forensic tool for analyzing memory dumps.
- Goal: Detect active malware, injected processes, and suspicious activity in RAM.
- Two Pieces Needed:
- Memory capture tool: DumpIt (legacy versions available without registration).
- Analysis tool: Volatility (command line), optionally Volatility Workbench (GUI).
- Workflow:
- Create memory dump on infected system.
- Transfer dump to clean machine for analysis.
- Analyze processes, injections, and network indicators.
Memory Capture Tools
- DumpIt: Command-line utility to dump RAM to a file; historically from MoonSols.
- FTK Imager: Free forensic tool; can capture memory if DumpIt fails.
- Output: Example memory dump size noted as ~9 GB.
Volatility and Workbench Usage
- Volatility: Open-source, primarily command line; standalone executable.
- Volatility Workbench: GUI wrapper; easier for beginners; limited command set.
- Screen Requirement: Workbench needs resolution ≥ 1152 x 864.
- Platform Selection: Choose Windows in Workbench for Windows dumps.
Example Analysis Steps
- Load Image: Browse to memory dump in Workbench.
- Get Process List: Reconstruct running processes similar to Task Manager.
- Identify Anomalies: Example shows “process hider” and ETW.exe flagged as suspicious.
- Malware Indicators:
- Recognize known system processes (cmd.exe, svchost.exe, conhost.exe).
- Flag unexpected or renamed binaries (e.g., ETW.exe not standard).
- malfind Command:
- Detects process injection and suspicious memory patterns (YARA-like matching).
- Results may include system processes showing injected regions.
Command Line Workflow for Network Clues
- Use Command Prompt (not PowerShell) in Volatility’s directory.
- Navigate with cd to the tool folder (e.g., C:\lab\forensics).
- Invoke tool (e.g., vol.exe -h) to list options.
- Objective: Identify connections to external malicious servers from memory data.
Practical Tips and Caveats
- Do not install analysis tools on infected systems; analyze dumps on a clean machine.
- Expect errors reading some pages; review available findings anyway.
- GUI convenience vs. completeness: Switch to CLI when Workbench lacks needed commands.
Key Terms & Definitions
- Universal Plug-and-Play (UPnP): Protocol enabling device auto-discovery and port mapping.
- DHCP Reservation: Router assigns fixed IP to a device based on MAC address.
- SSID: Wireless network name broadcast by the router.
- RAM/Volatile Memory: Active memory storing running processes and data.
- Memory Dump: File containing a snapshot of RAM for forensic analysis.
- Process Injection: Technique where malware inserts code into legitimate process memory.
- Volatility: Framework for analyzing memory dumps across platforms.
- Volatility Workbench: GUI front end for Volatility with limited command coverage.
- DumpIt: Utility to capture full RAM contents to a file.
- FTK Imager: Forensic tool supporting disk and memory acquisition.
Action Items / Next Steps
- Disable UPnP; review router for unintended sharing features.
- Export and securely store router configuration backups.
- Establish DHCP reservations with friendly names for all devices.
- Set a neutral SSID without personal data or vendor/model hints.
- Schedule periodic manual firmware update checks.
- Capture a memory dump from a test/infected system using DumpIt or FTK Imager.
- Analyze the dump on a clean machine using Volatility or Workbench.
- Run process listing and malfind; escalate to CLI for deeper modules and network artifacts.