Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

7/25/22, 9:33 PM Module 6: Digital Forensics and Incident Analysis and Response | 1.

Evidence Handling and Attack Attribution

Lab - Gather System Information After an Incident 


  

Lab - Gather System Information After an Incident


Objectives

=   Collect system
information after an incident has occurred.
=   View logs for
potential intrusions.

Background / Scenario
When an incident occurs in an organization, people
responsible must know how to respond. An organization needs to develop an
incident response

Evidence Handling and Attack


plan and put together a Computer Security Incident Response
Team (CSIRT) to manage the response. In this lab, you will gather system information
and review logs after an incident has occurred. Doing these tasks immediately
after the incident is important because any data residing in RAM will be
gone
when the system is shut down.

Required Resources

Attribution
PC with the CSE-LABVM installed in VirtualBox

Instructions

Step 1: Open a terminal window in


the CSE-LABVM.
 a.  
Launch the CSE-LABVM.
 b.  
Double-click the Terminal icon to open a terminal.

Step 2: Collect volatile


information of the compromised system.
In this step, you will create a file called report.txt
that includes a variety of system information that can be used for incident
analysis. This report can
then be transferred to a USB drive, emailed, or
uploaded to a cloud server to preserve the information. Then the system can be
taken down.
 a.  
Switch to the root user with the sudo su command. Enter password
as the root password.
cisco@labvm:~$ sudo su
Scroll to begin  
[sudo] password for cisco: password
root@labvm:/home/cisco#
 b.   Enter the echo
command, and then specify a heading for a newly created file named report.txt.
Enter the cat command to review the new file.
root@labvm:/home/cisco# echo Incident Investigator Report >
report.txt
root@labvm:/home/cisco# cat report.txt
Incident Investigator Report
root@labvm:/home/cisco#
 c.   
Enter the date command and redirect the date and timestamp to the
report.txt file. Be sure to use the double angle brackets (>>)
to append to the
report.txt file. Otherwise, you will replace the
previous content.
Note: To better document the content stored in
report.txt, use the echo command to add a subheading as shown here for Start
Date and Time.
Each substep will specify a subheading for you to append
before you gather information.
root@labvm:/home/cisco# echo =====Start Date and Time=====
>> report.txt
root@labvm:/home/cisco# date >> report.txt
 d.   Enter the uname
command to print system information. Use the -a option to append all
system information to the report.txt file.
root@labvm:/home/cisco# echo =====System Information=====
>> report.txt
root@labvm:/home/cisco# uname -a >> report.txt
 e.   Enter the ifconfig
-a command and append all network interface information to the report.txt
file.
root@labvm:/home/cisco# echo =====Network Interfaces=====
>> report.txt
root@labvm:/home/cisco# ifconfig -a >> report.txt
f Th t t t d ll t ll th t k t ti ti E t th d ith th ti t ll td t ll k t ( ) IP

6.1.1 Digital Forensics

Now that you have investigated and identified valid alerts, what do you do with the evidence? The
cybersecurity analyst will inevitably uncover evidence of criminal activity. In order to protect the
organization and to prevent cybercrime, it is necessary to identify threat actors, report them to the
appropriate authorities, and provide evidence to support prosecution. Tier 1 cybersecurity analysts are
often the first to uncover wrongdoing. Cybersecurity analysts must know how to properly handle
evidence and attribute it to threat actors.

Digital forensics is the recovery and investigation of information found on digital devices as it relates to
criminal activity. Indicators of compromise are the evidence that a cybersecurity incident has occurred.
This information could be data on storage devices, in volatile computer memory, or the traces of
cybercrime that are preserved in network data, such as pcaps and logs. It is essential that all indicators
of compromise be preserved for future analysis and attack attribution.

https://contenthub.netacad.com/sgp/varmir/1.0/en-US/m6//?xAPILaunchKey=d56e2954767b2bb4c870665daa72cff411f50cf10b6b30f5c8aa8e91… 1/14
7/25/22, 9:33 PM Module 6: Digital Forensics and Incident Analysis and Response | 1. Evidence Handling and Attack Attribution

LabCybercriminal activity
- Gather System can be broadly
Information characterized
After an Incidentas originating from inside of or outside of the
Lab - Gather
organization. System
Private Information
investigations After an
are concerned withIncident
individuals inside the organization. These


Objectives
individuals could simply be behaving in ways that violate user agreements or other non-criminal
 
=  Collect system
information after an incident has occurred.
conduct.
=   View
When intrusions.
logs for
potential individuals are suspected of involvement in criminal activity involving the theft or
destruction of intellectual property, an organization may choose to involve law enforcement authorities,
Background / Scenario
in which case the investigation becomesmust public. Internal users could also have used the response

organization’s
When an incident occurs in an organization, people
responsible know how to respond. An organization needs to develop an
incident
plan and put together a Computer Security Incident Response
Team (CSIRT) to manage the response. In this lab, you will gather system information
network
and review logstoafter
conduct
an incidentother criminal
has occurred. activities
Doing these that are unrelated
tasks immediately
after the incident isto the organizational
important mission
because any data residing in RAM but
will beare in
gone
when the system is shut down.
violation of various legal statutes. In this case, public officials will carry out the investigation.
Required Resources
When
PC with thean external
CSE-LABVM attacker
installed has
in VirtualBox exploited a network and stolen or altered data, evidence needs to be
gathered to document the scope of the exploit. Various regulatory bodies specify a range of actions
Instructions
that an organization must take when various types of data have been compromised. The results of
Step 1: Open a terminal window in
the CSE-LABVM.
forensic investigation can help to identify the actions that need to be taken.
 a.  
Launch the CSE-LABVM.
 b.  
Double-click the Terminal icon to open a terminal.
For example, under the US HIPAA regulations, if a data breach has occurred that involves patient
Step 2: Collect volatile
information of the compromised system.
information, notification of the breach must be made to the affected individuals. If the breach involves
In this step, you will create a file called report.txt
that includes a variety of system information that can be used for incident
analysis. This report can
then be transferred to a USB drive, emailed, or
uploaded to a cloud server to preserve the information. Then the system can be
taken down.
more than 500 individuals in a state or jurisdiction, the media, as well as the affected individuals, must
 a.  
Switch to the root user with the sudo su command. Enter password
as the root password.
becisco@labvm:~$
notified. Digital forensic investigation must be used to determine which individuals were affected,
sudo su
and to certify
[sudo] thefornumber
password of affected individuals so that appropriate notification can be made in
cisco: password
root@labvm:/home/cisco#
compliance with HIPAA regulations.
 b.   Enter the echo
command, and then specify a heading for a newly created file named report.txt.
Enter the cat command to review the new file.
root@labvm:/home/cisco# echo Incident Investigator Report >
report.txt
It is possible that the organization
root@labvm:/home/cisco# itself could be the subject of an investigation. Cybersecurity analysts
cat report.txt
Incident Investigator Report
may find themselves in direct contact with digital forensic evidence that details the conduct of
root@labvm:/home/cisco#
members
 c. ofcommand
   
Enter the date the organization. Analysts
and redirect the date must
and timestamp know thefile.requirements
to the
report.txt regarding
Be sure to use the double the preservation
angle brackets (>>)
to append to theand
report.txt file. Otherwise, you will replace the
previous content.
handling of such evidence. Failure to do so could result in criminal penalties for the organization and
Note: To better document the content stored in
report.txt, use the echo command to add a subheading as shown here for Start
Date and Time.
Each the
even substep will specify a subheading
cybersecurity analystfor you
if tothe
append
before
intention youto
gather information.
destroy evidence is established.
root@labvm:/home/cisco# echo =====Start Date and Time=====
>> report.txt
root@labvm:/home/cisco# date >> report.txt
 d.   Enter the uname
command to print system information. Use the -a option to append all
system information to the report.txt file.
root@labvm:/home/cisco# echo =====System Information=====
>> report.txt
root@labvm:/home/cisco# uname -a >> report.txt
 e.   Enter the ifconfig
-a command and append all network interface information to the report.txt
file.
root@labvm:/home/cisco# echo =====Network Interfaces=====
>> report.txt
root@labvm:/home/cisco# ifconfig -a >> report.txt
f Th t t t d ll t ll th t k t ti ti E t th d ith th ti t ll td t ll k t ( ) IP

6.1.2 The Digital Forensics Process

It is important that an organization develop well-documented processes and procedures for digital
forensic analysis. Regulatory compliance may require this documentation, and this documentation may
be inspected by authorities in the event of a public investigation.

NIST Special Publication 800-86 Guide to Integrating Forensic Techniques into Incident Response is a
valuable resource for organizations that require guidance in developing digital forensics plans. For
example, it recommends that forensics be performed using the four-phase process.

The following describes the four basic phases of the digital evidence forensic process.
https://contenthub.netacad.com/sgp/varmir/1.0/en-US/m6//?xAPILaunchKey=d56e2954767b2bb4c870665daa72cff411f50cf10b6b30f5c8aa8e91… 2/14
7/25/22, 9:33 PM Module 6: Digital Forensics and Incident Analysis and Response | 1. Evidence Handling and Attack Attribution

LabThe Digital
- Gather Evidence
System Forensic
Information Process
After an Incident
Lab - Gather System Information After an Incident 

Objectives  
=   Collect system
information after an incident has occurred.
=   View logs for
potential intrusions.

Background / Scenario
Media Data Information Evidence 
When an incident occurs in an organization, people
responsible must know how to respond. An organization needs to develop an
incident response
plan and put together a Computer Security Incident Response
Team (CSIRT) to manage the response. In this lab, you will gather system information
Collection
and review logs after Examination
an incident has occurred. Analysis
Doing these tasks immediately
afterReporting
the incident is important because any data residing in RAM will be
gone
when the system is shut down.

Required Resources
PC with the CSE-LABVM installed in VirtualBox

Instructions

Step 1: Open a terminal window in


the CSE-LABVM.
 a.  
Launch the CSE-LABVM.
 b.  
Double-click the Terminal icon to open a terminal.

Step 2: Collect volatile


information of the compromised system.
In this step, you will create a file called report.txt
that includes a variety of system information that can be used for incident
analysis. This report can
then be transferred to a USB drive, emailed, or
uploaded to a cloud server to preserve the information. Then the system can be
taken down.
 a.  
Switch to the root user with the sudo su command. Enter password
as the root password.
cisco@labvm:~$ sudo su
[sudo] password for cisco: password
Step 1. Collection
root@labvm:/home/cisco# 
 b.   Enter the echo
command, and then specify a heading for a newly created file named report.txt.
Enter the cat command to review the new file.
root@labvm:/home/cisco# echo Incident Investigator Report >
report.txt
Step 2. Examination
root@labvm:/home/cisco# cat report.txt 
Incident Investigator Report
root@labvm:/home/cisco#
Step the3. Analysis
 c.   
Enter date command and redirect the date and timestamp to the
report.txt file. Be sure to use the double angle brackets (>>)
to append to the
report.txt file. Otherwise, you will replace the
previous content.

Note: To better document the content stored in
report.txt, use the echo command to add a subheading as shown here for Start
Date and Time.
Each substep will specify a subheading for you to append
before you gather information.
This entails drawing conclusions from the data. Salient features, such as people, places, times,
root@labvm:/home/cisco# echo =====Start Date and Time=====
>> report.txt
events, and so on should
root@labvm:/home/cisco# bereport.txt
date >> documented. This step may also involve
the correlation of data from
multiple
 d.   Enter sources. to print system information. Use the -a option to append all
system information to the report.txt file.
the uname
command
root@labvm:/home/cisco# echo =====System Information=====
>> report.txt
root@labvm:/home/cisco# uname -a >> report.txt
 e.   Enter
Step the 4.
ifconfig
-a command and append all network interface information to the report.txt
file.
Reporting
root@labvm:/home/cisco# echo =====Network Interfaces=====
>> report.txt

root@labvm:/home/cisco# ifconfig -a >> report.txt
f Th t t t d ll t ll th t k t ti ti E t th d ith th ti t ll td t ll k t ( ) IP

6.1.3 Check Your Understanding - Identify the Steps in the


Digital Forensics Process
Question 1

Which technique involves assessment and extraction of relevant information from collected data?
https://contenthub.netacad.com/sgp/varmir/1.0/en-US/m6//?xAPILaunchKey=d56e2954767b2bb4c870665daa72cff411f50cf10b6b30f5c8aa8e91… 3/14
7/25/22, 9:33 PM Module 6: Digital Forensics and Incident Analysis and Response | 1. Evidence Handling and Attack Attribution

Lab - Gather System Information After an Incident


Lab - Gather System Information After an Incident 
 Examination

Objectives  
=   Collect system
information after an incident has occurred.
=   View logsCollection
for
potential intrusions.

Background / Scenario 
When an incident occurs in an organization, people
responsible must know how to respond. An organization needs to develop an
incident response
plan and putReporting
together a Computer Security Incident Response
Team (CSIRT) to manage the response. In this lab, you will gather system information
and review logs after an incident has occurred. Doing these tasks immediately
after the incident is important because any data residing in RAM will be
gone
when the system is shut down.

Required Resources
Analysis
PC with the CSE-LABVM installed in VirtualBox

Instructions
Reset  Show feedback
Step 1: Open a terminal window in
the CSE-LABVM.
 a.  
Launch the CSE-LABVM.
 b.  
Double-click the Terminal icon to open a terminal.

Step 2: Collect volatile


information of the compromised system.
In this step, you will create a file called report.txt
that includes a variety of system information that can be used for incident
analysis. This report can
then be transferred to a USB drive, emailed, or
uploaded to a cloud server to preserve the information. Then the system can be
taken down.
 a.  
Switch to the root user with the sudo su command. Enter password
as the root password.
Question 2
cisco@labvm:~$ sudo su
[sudo] password for cisco: password
root@labvm:/home/cisco#
 b.   Enter the echo
command, and then specify a heading for a newly created file named report.txt.
Enter the cat command to review the new file.
root@labvm:/home/cisco# echo Incident Investigator Report >
report.txt
Which technique involves drawing conclusions from the data?
root@labvm:/home/cisco# cat report.txt
Incident Investigator Report
root@labvm:/home/cisco#
Examination
 c.   
Enter the date command and redirect the date and timestamp to the
report.txt file. Be sure to use the double angle brackets (>>)
to append to the
report.txt file. Otherwise, you will replace the
previous content.
Note: To better document the content stored in
report.txt, use the echo command to add a subheading as shown here for Start
Date and Time.
Each substep will specify a subheading for you to append
before you gather information.
root@labvm:/home/cisco#
Analysis
echo =====Start Date and Time=====
>> report.txt
root@labvm:/home/cisco# date >> report.txt
 d.   Enter the uname
command to print system information. Use the -a option to append all
system information to the report.txt file.
Reporting
root@labvm:/home/cisco# echo =====System Information=====
>> report.txt
root@labvm:/home/cisco# uname -a >> report.txt
 e.   Enter the ifconfig
-a command and append all network interface information to the report.txt
file.
Collection
root@labvm:/home/cisco# echo =====Network Interfaces=====
>> report.txt
root@labvm:/home/cisco# ifconfig -a >> report.txt
f Th t t t d ll t ll th t k t ti ti E t th d ith th ti t ll td t ll k t ( ) IP
Reset  Show feedback

Question 3

Which is technique incudes identification of potential sources of forensic data and acquisition,
handling, and storage of that data?

Reporting

 Collection

Analysis

https://contenthub.netacad.com/sgp/varmir/1.0/en-US/m6//?xAPILaunchKey=d56e2954767b2bb4c870665daa72cff411f50cf10b6b30f5c8aa8e91… 4/14
7/25/22, 9:33 PM Module 6: Digital Forensics and Incident Analysis and Response | 1. Evidence Handling and Attack Attribution

Lab - Gather System Information After an Incident


Examination
Lab - Gather System Information After an Incident 

Objectives  
=   Collect system
information after an incident has occurred.
=   View
Reset
logs for
potential intrusions.  Show feedback

Background / Scenario 
When an incident occurs in an organization, people
responsible must know how to respond. An organization needs to develop an
incident response
plan and put together a Computer Security Incident Response
Team (CSIRT) to manage the response. In this lab, you will gather system information
and review logs after an incident has occurred. Doing these tasks immediately
after the incident is important because any data residing in RAM will be
gone
when the system is shut down.

Required Resources

Question 4
PC with the CSE-LABVM installed in VirtualBox

Instructions

Step 1: Open a terminal window in


the CSE-LABVM.
 a.  
Launch the CSE-LABVM.
Which technique includes preparation and presentation of the information which resulted from the
 b.  
Double-click the Terminal icon to open a terminal.
analysis?
Step 2: Collect volatile
information of the compromised system.
In this step, you will create a file called report.txt
that includes a variety of system information that can be used for incident
analysis. This report can
then be transferred to a USB drive, emailed, or
uploaded to a cloud server to preserve the information. Then the system can be
taken down.
 Reporting
 a.  
Switch to the root user with the sudo su command. Enter password
as the root password.
cisco@labvm:~$ sudo su
[sudo] password for cisco: password
Examination
root@labvm:/home/cisco#
 b.   Enter the echo
command, and then specify a heading for a newly created file named report.txt.
Enter the cat command to review the new file.
root@labvm:/home/cisco# echo Incident Investigator Report >
report.txt
Analysis
root@labvm:/home/cisco# cat report.txt
Incident Investigator Report
root@labvm:/home/cisco#
 c.   
Enter theCollection
date command and redirect the date and timestamp to the
report.txt file. Be sure to use the double angle brackets (>>)
to append to the
report.txt file. Otherwise, you will replace the
previous content.
Note: To better document the content stored in
report.txt, use the echo command to add a subheading as shown here for Start
Date and Time.
Each substep will specify a subheading for you to append
before you gather information.
Reset
root@labvm:/home/cisco# echo =====Start Date and Time=====
>> report.txt
root@labvm:/home/cisco# date >> report.txt
 Show feedback

 d.   Enter the uname


command to print system information. Use the -a option to append all
system information to the report.txt file.
root@labvm:/home/cisco# echo =====System Information=====
>> report.txt
root@labvm:/home/cisco# uname -a >> report.txt
 e.   Enter the ifconfig
-a command and append all network interface information to the report.txt
file.
root@labvm:/home/cisco# echo =====Network Interfaces=====
>> report.txt
root@labvm:/home/cisco# ifconfig -a >> report.txt
f Th t t t d ll t ll th t k t ti ti E t th d ith th ti t ll td t ll k t ( ) IP

6.1.4 Types of Evidence

In legal proceedings, evidence is broadly classified as either direct or indirect. Direct evidence is
evidence that was indisputably in the possession of the accused, or is eyewitness evidence from
someone who directly observed criminal behavior.

Evidence is further classified as:

Best evidence

https://contenthub.netacad.com/sgp/varmir/1.0/en-US/m6//?xAPILaunchKey=d56e2954767b2bb4c870665daa72cff411f50cf10b6b30f5c8aa8e91… 5/14
7/25/22, 9:33 PM Module 6: Digital Forensics and Incident Analysis and Response | 1. Evidence Handling and Attack Attribution

Lab - Corroborating
Gather System Information After an Incident
Lab - Gather System Information After an Incident
evidence  

Objectives  
=   Collect system
information after an incident has occurred.
This is evidence that supports an assertion that is developed from best evidence.
=   View logs for
potential intrusions.

Background / Scenario 
Indirect
an incidentevidence
When occurs in an organization, people
responsible must know how to respond. An organization needs to develop an
incident response
plan and put together a Computer Security Incident Response
Team (CSIRT) to manage the response. In this lab, you will gather system information

and review logs after an incident has occurred. Doing these tasks immediately
after the incident is important because any data residing in RAM will be
gone
when the system is shut down.

Required Resources
PC with the CSE-LABVM installed in VirtualBox

Instructions

Step 1: Open a terminal window in


the CSE-LABVM.
 a.  
Launch the CSE-LABVM.
 b.  
Double-click the Terminal icon to open a terminal.

Step 2: Collect volatile


information of the compromised system.
In this step, you will create a file called report.txt
that includes a variety of system information that can be used for incident
analysis. This report can
then be transferred to a USB drive, emailed, or
uploaded to a cloud server to preserve the information. Then the system can be
taken down.
 a.  
Switch to the root user with the sudo su command. Enter password
as the root password.
cisco@labvm:~$ sudo su
[sudo] password for cisco: password
root@labvm:/home/cisco#
 b.   Enter the echo
command, and then specify a heading for a newly created file named report.txt.
Enter the cat command to review the new file.
root@labvm:/home/cisco# echo Incident Investigator Report >
report.txt
root@labvm:/home/cisco# cat report.txt
Incident Investigator Report
root@labvm:/home/cisco#
 c.   
Enter the date command and redirect the date and timestamp to the
report.txt file. Be sure to use the double angle brackets (>>)
to append to the
report.txt file. Otherwise, you will replace the
previous content.
Note: To better document the content stored in
report.txt, use the echo command to add a subheading as shown here for Start
Date and Time.
Each substep will specify a subheading for you to append
before you gather information.
root@labvm:/home/cisco# echo =====Start Date and Time=====
>> report.txt
root@labvm:/home/cisco# date >> report.txt
 d.   Enter the uname
command to print system information. Use the -a option to append all
system information to the report.txt file.
root@labvm:/home/cisco# echo =====System Information=====
>> report.txt
root@labvm:/home/cisco# uname -a >> report.txt
 e.   Enter the ifconfig
-a command and append all network interface information to the report.txt
file.
root@labvm:/home/cisco# echo =====Network Interfaces=====
>> report.txt
root@labvm:/home/cisco# ifconfig -a >> report.txt
f Th t t t d ll t ll th
6.1.5 Check Your t Understanding
k t ti ti E t th d ith th ti t ll t d t
- Identify thell Type
k t ( ) IP
of
Evidence

Question 1

Which type of evidence was indisputably in the possession of the accused?

 direct evidence

best evidence

indirect evidence

corroborating evidence

Reset Show feedback



https://contenthub.netacad.com/sgp/varmir/1.0/en-US/m6//?xAPILaunchKey=d56e2954767b2bb4c870665daa72cff411f50cf10b6b30f5c8aa8e91… 6/14
7/25/22, 9:33 PM Module 6: Digital Forensics and Incident Analysis and Response | 1. Evidence Handling and Attack Attribution

Lab - Gather System Information After an Incident


Lab - Gather System Information After an Incident 

Objectives  
=   Collect system
information after an incident has occurred.
=   View logs for
potential intrusions.

Background / Scenario 
Question 2
When an incident occurs in an organization, people
responsible must know how to respond. An organization needs to develop an
incident response
plan and put together a Computer Security Incident Response
Team (CSIRT) to manage the response. In this lab, you will gather system information
and review logs after an incident has occurred. Doing these tasks immediately
after the incident is important because any data residing in RAM will be
gone
when the system is shut down.

Required Resources
Which type of evidence supports an assertation that is developed from best evidence?
PC with the CSE-LABVM installed in VirtualBox

Instructions
direct evidence
Step 1: Open a terminal window in
the CSE-LABVM.
 a.  
Launch the CSE-LABVM.
best
 b.  
Double-click the evidence
Terminal icon to open a terminal.

Step 2: Collect volatile


information of the compromised system.
In this step, you will create a file called report.txt
that includes a variety of system information that can be used for incident
analysis. This report can
 corroborating
then be transferred to a USB drive,evidence
emailed, or
uploaded to a cloud server to preserve the information. Then the system can be
taken down.
 a.  
Switch to the root user with the sudo su command. Enter password
as the root password.
cisco@labvm:~$ sudo su
[sudo] indirect
password evidence
for cisco: password
root@labvm:/home/cisco#
 b.   Enter the echo
command, and then specify a heading for a newly created file named report.txt.
Enter the cat command to review the new file.
root@labvm:/home/cisco# echo Incident Investigator Report >
report.txt
Reset
root@labvm:/home/cisco# cat report.txt  Show feedback
Incident Investigator Report
root@labvm:/home/cisco#
 c.   
Enter the date command and redirect the date and timestamp to the
report.txt file. Be sure to use the double angle brackets (>>)
to append to the
report.txt file. Otherwise, you will replace the
previous content.
Note: To better document the content stored in
report.txt, use the echo command to add a subheading as shown here for Start
Date and Time.
Each substep will specify a subheading for you to append
before you gather information.
root@labvm:/home/cisco# echo =====Start Date and Time=====
>> report.txt
root@labvm:/home/cisco# date >> report.txt
Question 3
 d.   Enter the uname
command to print system information. Use the -a option to append all
system information to the report.txt file.
root@labvm:/home/cisco# echo =====System Information=====
>> report.txt
root@labvm:/home/cisco# uname -a >> report.txt
 e.   Enter the ifconfig
-a command and append all network interface information to the report.txt
file.
Which type of evidenceecho
root@labvm:/home/cisco# is circumstantial evidence that, report.txt
=====Network Interfaces=====
>> in combination with other facts, establishes a
root@labvm:/home/cisco# ifconfig -a >> report.txt
hypothesis?
f Th t t t d ll t ll th t k t ti ti E t th d ith th ti t ll td t ll k t ( ) IP

 indirect evidence

best evidence

corroborating evidence

direct evidence

Reset  Show feedback

Question 4

https://contenthub.netacad.com/sgp/varmir/1.0/en-US/m6//?xAPILaunchKey=d56e2954767b2bb4c870665daa72cff411f50cf10b6b30f5c8aa8e91… 7/14
7/25/22, 9:34 PM Module 6: Digital Forensics and Incident Analysis and Response | 1. Evidence Handling and Attack Attribution

Lab - Gather System Information After an Incident


Lab - Gather System Information After an Incident
Which type of evidence is in its original state?


Objectives  
=   Collect system
information after an incident has occurred.


=   View logsbest evidence
for
potential intrusions.

Background / Scenario 
When an incident occurs in an organization, people
responsible must know how to respond. An organization needs to develop an
incident response
plan and putcorroborating evidence
together a Computer Security Incident Response
Team (CSIRT) to manage the response. In this lab, you will gather system information
and review logs after an incident has occurred. Doing these tasks immediately
after the incident is important because any data residing in RAM will be
gone
when the system is shut down.

Required Resources
indirect evidence
PC with the CSE-LABVM installed in VirtualBox

Instructions
direct evidence
Step 1: Open a terminal window in
the CSE-LABVM.
 a.  
Launch the CSE-LABVM.
Reset
 b.  
Double-click the Terminal icon to open a terminal.  Show feedback
Step 2: Collect volatile
information of the compromised system.
In this step, you will create a file called report.txt
that includes a variety of system information that can be used for incident
analysis. This report can
then be transferred to a USB drive, emailed, or
uploaded to a cloud server to preserve the information. Then the system can be
taken down.
 a.  
Switch to the root user with the sudo su command. Enter password
as the root password.
cisco@labvm:~$ sudo su
[sudo] password for cisco: password
root@labvm:/home/cisco#
 b.   Enter the echo
command, and then specify a heading for a newly created file named report.txt.
Enter the cat command to review the new file.
root@labvm:/home/cisco# echo Incident Investigator Report >
report.txt
root@labvm:/home/cisco# cat report.txt
Incident Investigator Report
root@labvm:/home/cisco#
 c.   
Enter the date command and redirect the date and timestamp to the
report.txt file. Be sure to use the double angle brackets (>>)
to append to the
report.txt file. Otherwise, you will replace the
previous content.
Note: To better document the content stored in
report.txt, use the echo command to add a subheading as shown here for Start
Date and Time.
Each substep will specify a subheading for you to append
before you gather information.
root@labvm:/home/cisco# echo =====Start Date and Time=====
>> report.txt
root@labvm:/home/cisco# date >> report.txt
 d.   Enter the uname
command to print system information. Use the -a option to append all
system information to the report.txt file.
root@labvm:/home/cisco# echo =====System Information=====
>> report.txt
6.1.6 Evidence
root@labvm:/home/cisco# Collection
uname -a >> report.txt Order
 e.   Enter the ifconfig
-a command and append all network interface information to the report.txt
file.
root@labvm:/home/cisco# echo =====Network Interfaces=====
>> report.txt
root@labvm:/home/cisco# ifconfig -a >> report.txt
IETF RFC 3227 provides guidelines for the collection of digital evidence. It describes an order for the
f Th t t t d ll t ll th t k t ti ti E t th d ith th ti t ll td t ll k t ( ) IP
collection of digital evidence based on the volatility of the data. Data stored in RAM is the most volatile,
and it will be lost when the device is turned off. In addition, important data in volatile memory could be
overwritten by routine machine processes. Therefore, the collection of digital evidence should begin
with the most volatile evidence and proceed to the least volatile, as shown in the figure.

Evidence Collection Priority

https://contenthub.netacad.com/sgp/varmir/1.0/en-US/m6//?xAPILaunchKey=d56e2954767b2bb4c870665daa72cff411f50cf10b6b30f5c8aa8e91… 8/14
7/25/22, 9:34 PM Module 6: Digital Forensics and Incident Analysis and Response | 1. Evidence Handling and Attack Attribution

Lab - Gather System Information After an Incident


Lab - Gather System Information After an Incident 

Objectives Volatile  
=   Collect system
information after an incident has occurred.
=   View logs for
potential intrusions.
Contents of RAM

Background / Scenario 
When an incident occurs in an organization, people
responsible must know how to respond. An organization needs to develop an
incident response
plan and put together a Computer Security Incident Response
Team (CSIRT) to manage the response. In this lab, you will gather system information
and review logs after an incident has occurred. Doing these tasks immediately
after the incident is important because any data residing in RAM will be
gone
when the system is shut down.
Evidence Contents of Fixed Disks
Source
Required Resources
PC with the CSE-LABVM installed in VirtualBox

Instructions
Archived Backup Data
Step 1: Open a terminal window in
the CSE-LABVM.
 a.  
Launch the CSE-LABVM.
 b.  
Double-click the Terminal icon to open a terminal.

Step 2: Collect volatile


information of the compromised
Non-volatile
system.
In this step, you will create a file called report.txt
that includes a variety of system information that can be used for incident
analysis. This report can
then be transferred to a USB drive, emailed, or
uploaded to a cloud server to preserve the information. Then the system can be
taken down.
 a.  
Switch to the root user with the sudo su command. Enter password
as the root password.
cisco@labvm:~$ sudo su
[sudo] password for cisco: password
root@labvm:/home/cisco#
 b.   Enter the echo
command, and then specify a heading for a newly created file named report.txt.
Enter the cat command to review the new file.
root@labvm:/home/cisco# echo Incident Investigator Report >
report.txt
root@labvm:/home/cisco# cat report.txt
Incident Investigator Report
root@labvm:/home/cisco#
 c.   
Enter the date command and redirect the date and timestamp to the
report.txt file. Be sure to use the double angle brackets (>>)
to append to the
report.txt file. Otherwise, you will replace the
previous content.
Note: To better document the content stored in
report.txt, use the echo command to add a subheading as shown here for Start
Date and Time.
Each substep will specify a subheading for you to append
before you gather information.
root@labvm:/home/cisco# echo =====Start Date and Time=====
>> report.txt
root@labvm:/home/cisco# date >> report.txt
 d.   Enter the uname
command to print system information. Use the -a option to append all
system information to the report.txt file.

Anroot@labvm:/home/cisco# echo =====System Information=====


>> report.txt
example of most volatile to least volatile evidence collection order is as follows:
root@labvm:/home/cisco# uname -a >> report.txt
 e.   Enter the ifconfig
-a command and append all network interface information to the report.txt
file.
Memory registers, caches
root@labvm:/home/cisco# echo =====Network Interfaces=====
>> report.txt
Routing table, ARPifconfig
root@labvm:/home/cisco# cache, -a
process table, kernel statistics, RAM
>> report.txt
f Th t t t d ll t ll th t k t ti ti E t th d ith th ti t ll td t ll k t ( ) IP
Temporary file systems
Non-volatile media, fixed and removable
Remote logging and monitoring data
Physical interconnections and topologies
Archival media, tape or other backups

Details of the systems from which the evidence was collected, including who has access to those
systems and at what level of permissions should be recorded. Such details should include hardware
and software configurations for the systems from which the data was obtained.

https://contenthub.netacad.com/sgp/varmir/1.0/en-US/m6//?xAPILaunchKey=d56e2954767b2bb4c870665daa72cff411f50cf10b6b30f5c8aa8e91… 9/14
7/25/22, 9:34 PM Module 6: Digital Forensics and Incident Analysis and Response | 1. Evidence Handling and Attack Attribution

Lab - Gather System Information After an Incident


Lab - Gather System Information After an Incident 

Objectives  
6.1.7
=   Collect
Chain of Custody
system
information after an incident has occurred.
=   View
logs for
potential intrusions.

Background / Scenario 
When an incident occurs in an organization, people
responsible must know how to respond. An organization needs to develop an
incident response
plan and put together
Although a Computer
evidence may Security
have Incident
been Response
Team
gathered(CSIRT)
fromtosources
manage thethatresponse. In this lab,
support you will gatherto
attribution system
an information
accused
and review logs after an incident has occurred. Doing these tasks immediately
after the incident is important because any data residing in RAM will be
gone
when the system is shut down.
individual, it can be argued that the evidence could have been altered or fabricated after it was
Required Resources
collected. In order to counter this argument, a rigorous chain of custody must be defined and followed.
PC with the CSE-LABVM installed in VirtualBox
Chain of custody involves the collection, handling, and secure storage of evidence. Detailed records
Instructions
should be kept of the following:
Step 1: Open a terminal window in
the CSE-LABVM.
 a.  
Launch the CSE-LABVM.
Who discovered and collected the evidence?
 b.  
Double-click the Terminal icon to open a terminal.
All details about the handling of evidence including times, places, and personnel involved.
Step 2: Collect volatile
information of the compromised system.
Who has primary responsibility for the evidence, when responsibility was assigned, and when
In this step, you will create a file called report.txt
that includes a variety of system information that can be used for incident
analysis. This report can
then be custody
transferred tochanged?
a USB drive, emailed, or
uploaded to a cloud server to preserve the information. Then the system can be
taken down.
 a.  
Switch to the root user with the sudo su command. Enter password
as the root password.
Who has physical access to the evidence while it was stored? Access should be restricted to only
cisco@labvm:~$ sudo su
the password
[sudo] most essential personnel.
for cisco: password
root@labvm:/home/cisco#
 b.   Enter the echo
command, and then specify a heading for a newly created file named report.txt.
Enter the cat command to review the new file.
root@labvm:/home/cisco# echo Incident Investigator Report >
report.txt
root@labvm:/home/cisco# cat report.txt
Incident Investigator Report
root@labvm:/home/cisco#
 c.   
Enter the date command and redirect the date and timestamp to the
report.txt file. Be sure to use the double angle brackets (>>)
to append to the
report.txt file. Otherwise, you will replace the
previous content.
Note: To better document the content stored in
report.txt, use the echo command to add a subheading as shown here for Start
Date and Time.
Each substep will specify a subheading for you to append
before you gather information.
root@labvm:/home/cisco# echo =====Start Date and Time=====
>> report.txt
root@labvm:/home/cisco# date >> report.txt
 d.   Enter the uname
command to print system information. Use the -a option to append all
system information to the report.txt file.
root@labvm:/home/cisco# echo =====System Information=====
>> report.txt
root@labvm:/home/cisco# uname -a >> report.txt
 e.   Enter the ifconfig
-a command and append all network interface information to the report.txt
file.
root@labvm:/home/cisco# echo =====Network Interfaces=====
>> report.txt
root@labvm:/home/cisco# ifconfig -a >> report.txt
f Th t t t d ll t ll th t k t ti ti E t th d ith th ti t ll td t ll k t ( ) IP

6.1.8 Data Integrity and Preservation

When collecting data, it is important that it is preserved in its original condition. Timestamping of files
should be preserved. For this reason, the original evidence should be copied, and analysis should only
be conducted on copies of the original. This is to avoid accidental loss or alteration of the evidence.

https://contenthub.netacad.com/sgp/varmir/1.0/en-US/m6//?xAPILaunchKey=d56e2954767b2bb4c870665daa72cff411f50cf10b6b30f5c8aa8e9… 10/14
7/25/22, 9:34 PM Module 6: Digital Forensics and Incident Analysis and Response | 1. Evidence Handling and Attack Attribution

LabBecause timestamps
- Gather may be partAfter
System Information of thean
evidence,
Incidentopening files from the original media should be
Lab - Gather System Information After an Incident
avoided.


Objectives  
=   Collect
system
information after an incident has occurred.
The process used to create copies of the evidence that is used in the investigation should be recorded.
=   View logs for
potential intrusions.
Whenever possible, the copies should be direct bit-level copies of the original storage volumes. It
Background / Scenario
should be possible to compare the archived disc image and the investigated disk image to identify 
When an incident occurs in an organization, people
responsible must know how to respond. An organization needs to develop an
incident response
whether
plan the contents
and put together of theIncident
a Computer Security investigated
Response
Teamdisk have
(CSIRT) been the
to manage tampered
response. In with.
this lab, For this
you will reason,
gather it is important
system information
and review logs after an incident has occurred. Doing these tasks immediately
after the incident is important because any data residing in RAM will be
to archive
gone
when and isprotect
the system shut down.the original disk to keep it in its original, untampered with, condition.

Required Resources
Volatile memory could contain forensic evidence, so special tools should be used to preserve that
PC with the CSE-LABVM installed in VirtualBox
evidence before the device is shut down and evidence is lost. Users should not disconnect, unplug, or
Instructions
turn off infected machines unless explicitly told to do so by security personnel.
Step 1: Open a terminal window in
the CSE-LABVM.
 a.  
Launch the CSE-LABVM.
Following these processes will ensure that any evidence of wrongdoing will be preserved, and any
 b.  
Double-click the Terminal icon to open a terminal.
indicators of compromise can be identified.
Step 2: Collect volatile
information of the compromised system.
In this step, you will create a file called report.txt
that includes a variety of system information that can be used for incident
analysis. This report can
then be transferred to a USB drive, emailed, or
uploaded to a cloud server to preserve the information. Then the system can be
taken down.
 a.  
Switch to the root user with the sudo su command. Enter password
as the root password.
cisco@labvm:~$ sudo su
[sudo] password for cisco: password
root@labvm:/home/cisco#
 b.   Enter the echo
command, and then specify a heading for a newly created file named report.txt.
Enter the cat command to review the new file.
root@labvm:/home/cisco# echo Incident Investigator Report >
report.txt
root@labvm:/home/cisco# cat report.txt
Incident Investigator Report
root@labvm:/home/cisco#
 c.   
Enter the date command and redirect the date and timestamp to the
report.txt file. Be sure to use the double angle brackets (>>)
to append to the
report.txt file. Otherwise, you will replace the
previous content.
Note: To better document the content stored in
report.txt, use the echo command to add a subheading as shown here for Start
Date and Time.
Each substep will specify a subheading for you to append
before you gather information.
root@labvm:/home/cisco# echo =====Start Date and Time=====
>> report.txt
root@labvm:/home/cisco# date >> report.txt
 d.   Enter the uname
command to print system information. Use the -a option to append all
system information to the report.txt file.
root@labvm:/home/cisco# echo =====System Information=====
>> report.txt
6.1.9 Attack Attribution
root@labvm:/home/cisco# uname -a >> report.txt
 e.   Enter the ifconfig
-a command and append all network interface information to the report.txt
file.
root@labvm:/home/cisco# echo =====Network Interfaces=====
>> report.txt
root@labvm:/home/cisco# ifconfig -a >> report.txt
f Th t t t d ll t ll th t k t ti ti E t th d ith th ti t ll td t ll k t ( ) IP
After the extent of the cyberattack has been assessed and evidence collected and preserved, incident
response can move to identifying the source of the attack. As we know, a wide range of threat actors
exist, ranging from disgruntled individuals, hackers, cybercriminals and criminal gangs, or nation
states. Some criminals act from inside the network, while others can be on the other side of world.
Sophistication of cybercrime varies as well. Nation states may employ large groups of highly-trained
individuals to carry out an attack and hide their tracks, while other threat actors may openly brag about
their criminal activities.

Threat attribution refers to the act of determining the individual, organization, or nation responsible for
a successful intrusion or attack incident.

Identifying responsible threat actors should occur through the principled and systematic investigation
of the evidence. While it may be useful to also speculate as to the identity of threat actors by
identifying potential motivations for an incident, it is important not to let this bias the investigation. For
example, attributing an attack to a commercial competitor may lead the investigation away from the
possibility that a criminal gang or nation state was responsible.

In an evidence-based investigation, the incident response team correlates Tactics, Techniques, and
Procedures (TTP) that were used in the incident with other known exploits. Cybercriminals, much like
other criminals, have specific traits that are common to most of their crimes. Threat intelligence

https://contenthub.netacad.com/sgp/varmir/1.0/en-US/m6//?xAPILaunchKey=d56e2954767b2bb4c870665daa72cff411f50cf10b6b30f5c8aa8e9… 11/14
7/25/22, 9:34 PM Module 6: Digital Forensics and Incident Analysis and Response | 1. Evidence Handling and Attack Attribution

Labsources canSystem
- Gather help to Information
map the TTP After
identified by an investigation to known sources of similar attacks.
an Incident
Lab - Gather
However, System
this highlights Information
a problem After
with threat an Incident
attribution. Evidence of cybercrime is seldom direct


Objectives  
evidence. Identifying commonalities between TTPs for known and unknown threat actors is
=   Collect system
information after an incident has occurred.
circumstantial
=   View
evidence.
logs for
potential intrusions.

Background / Scenario
Some aspects of a threat that can aid in attribution are the location of originating hosts or domains, 
When an incident occurs in an organization, people
responsible must know how to respond. An organization needs to develop an
incident response
features
plan of thea Computer
and put together code used Securityin malware,
Incident the tools
Response
Team used,
(CSIRT) to manageand theother
response.techniques. Sometimes,
In this lab, you will at the national
gather system information
and review logs after an incident has occurred. Doing these tasks immediately
after the incident is important because any data residing in RAM will be
securitythelevel,
gone
when system threats
is shut down.cannot be openly attributed because doing so would expose methods and
capabilities
Required that need to be protected.
Resources
PC with the CSE-LABVM installed in VirtualBox
For internal threats, asset management plays a major role. Uncovering the devices from which an
Instructions
attack was launched can lead directly to the threat actor. IP addresses, MAC addresses, and DHCP
Steplogs
1: Open
cana help
terminal window
track in
the CSE-LABVM.
the addresses used in
the attack back to a specific device. AAA logs are very
 a.  
Launch the CSE-LABVM.
useful in this regard, as they track who accessed what network resources at what time.
 b.  
Double-click the Terminal icon to open a terminal.

Step 2: Collect volatile


information of the compromised system.
In this step, you will create a file called report.txt
that includes a variety of system information that can be used for incident
analysis. This report can
then be transferred to a USB drive, emailed, or
uploaded to a cloud server to preserve the information. Then the system can be
taken down.
 a.  
Switch to the root user with the sudo su command. Enter password
as the root password.
cisco@labvm:~$ sudo su
[sudo] password for cisco: password
root@labvm:/home/cisco#
 b.   Enter the echo
command, and then specify a heading for a newly created file named report.txt.
Enter the cat command to review the new file.
root@labvm:/home/cisco# echo Incident Investigator Report >
report.txt
root@labvm:/home/cisco# cat report.txt
Incident Investigator Report
root@labvm:/home/cisco#
 c.   
Enter the date command and redirect the date and timestamp to the
report.txt file. Be sure to use the double angle brackets (>>)
to append to the
report.txt file. Otherwise, you will replace the
previous content.
Note: To better document the content stored in
report.txt, use the echo command to add a subheading as shown here for Start
Date and Time.
Each substep will specify a subheading for you to append
before you gather information.
root@labvm:/home/cisco# echo =====Start Date and Time=====
>> report.txt
root@labvm:/home/cisco# date >> report.txt
 d.   Enter the uname
command to print system information. Use the -a option to append all
system information to the report.txt file.
6.1.10 The MITRE
root@labvm:/home/cisco# ATT&CK
echo =====System Framework
Information=====
>>
root@labvm:/home/cisco# uname -a >> report.txt
report.txt

 e.   Enter the ifconfig


-a command and append all network interface information to the report.txt
file.
root@labvm:/home/cisco# echo =====Network Interfaces=====
>> report.txt
root@labvm:/home/cisco# ifconfig -a >> report.txt
One way to attribute an attack is to model threat actor behavior. The MITRE Adversarial Tactics,
f Th t t t d ll t ll th t k t ti ti E t th d ith th ti t ll td t ll k t ( ) IP
Techniques & Common Knowledge (ATT&CK) Framework enables the ability to detect attacker tactics,
techniques, and procedures (TTP) as part of threat defense and attack attribution. This is done by
mapping the steps in an attack to a matrix of generalized tactics and describing the techniques that are
used in each tactic. Tactics consist of the technical goals that an attacker must accomplish in order to
execute an attack and techniques are the means by which the tactics are accomplished. Finally,
procedures are the specific actions taken by threat actors in the techniques that have been identified.
Procedures are the documented real-world use of techniques by threat actors.

The MITRE ATT&CK Framework is a global knowledge base of threat actor behavior. It is based on
observation and analysis of real-world exploits with the purpose of describing the behavior of the
attacker, not the attack itself. It is designed to enable automated information sharing by defining data
structures for the exchange of information between its community of users and MITRE.

The figure shows an analysis of a ransomware exploit from the excellent ANY.RUN online sandbox. The
columns show the enterprise attack matrix tactics, with the techniques that are used by the malware
arranged under the columns. Clicking the technique then lists details of the procedures that are used
by the specific malware instance with a definition, explanation, and examples of the technique.

Note: Do an internet search on MITRE ATT&CK to learn more about this tool.

https://contenthub.netacad.com/sgp/varmir/1.0/en-US/m6//?xAPILaunchKey=d56e2954767b2bb4c870665daa72cff411f50cf10b6b30f5c8aa8e9… 12/14
7/25/22, 9:34 PM Module 6: Digital Forensics and Incident Analysis and Response | 1. Evidence Handling and Attack Attribution

LabMITRE ATT&CK
- Gather SystemMatrix for a After
Information Ransomware Exploit
an Incident
Lab - Gather System Information After an Incident 

Objectives  
=   Collect system
information after an incident has occurred.
=   View logs for
potential intrusions.

Background / Scenario 
When an incident occurs in an organization, people
responsible must know how to respond. An organization needs to develop an
incident response
plan and put together a Computer Security Incident Response
Team (CSIRT) to manage the response. In this lab, you will gather system information
and review logs after an incident has occurred. Doing these tasks immediately
after the incident is important because any data residing in RAM will be
gone
when the system is shut down.

Required Resources
PC with the CSE-LABVM installed in VirtualBox

Instructions

Step 1: Open a terminal window in


the CSE-LABVM.
 a.  
Launch the CSE-LABVM.
 b.  
Double-click the Terminal icon to open a terminal.

Step 2: Collect volatile


information of the compromised system.
In this step, you will create a file called report.txt
that includes a variety of system information that can be used for incident
analysis. This report can
then be transferred to a USB drive, emailed, or
uploaded to a cloud server to preserve the information. Then the system can be
taken down.
 a.  
Switch to the root user with the sudo su command. Enter password
as the root password.
cisco@labvm:~$ sudo su
[sudo] password for cisco: password
root@labvm:/home/cisco#
 b.   Enter the echo
command, and then specify a heading for a newly created file named report.txt.
Enter the cat command to review the new file.
root@labvm:/home/cisco# echo Incident Investigator Report >
report.txt
root@labvm:/home/cisco# cat report.txt
Incident Investigator Report
root@labvm:/home/cisco#
 c.   
Enter the date command and redirect the date and timestamp to the
report.txt file. Be sure to use the double angle brackets (>>)
to append to the
report.txt file. Otherwise, you will replace the
previous content.
Note: To better document the content stored in
report.txt, use the echo command to add a subheading as shown here for Start
Date and Time.
Each substep will specify a subheading for you to append
before you gather information.
root@labvm:/home/cisco# echo =====Start Date and Time=====
>> report.txt
root@labvm:/home/cisco# date >> report.txt
 d.   Enter the uname
command to print system information. Use the -a option to append all
system information to the report.txt file.
root@labvm:/home/cisco# echo =====System Information=====
>> report.txt
root@labvm:/home/cisco# uname -a >> report.txt
 e.   Enter the ifconfig
-a command and append all network interface information to the report.txt
file.
root@labvm:/home/cisco# echo =====Network Interfaces=====
>> report.txt
root@labvm:/home/cisco# ifconfig -a >> report.txt
f6.1.11
Th t t t Video
d ll Lab
t ll th t- kGather
t ti ti E t th System
d ith th Information
ti t ll t d t ll After
k t ( ) IP an

Incident

Press the play button to view this short demo video.

https://contenthub.netacad.com/sgp/varmir/1.0/en-US/m6//?xAPILaunchKey=d56e2954767b2bb4c870665daa72cff411f50cf10b6b30f5c8aa8e9… 13/14
7/25/22, 9:34 PM Module 6: Digital Forensics and Incident Analysis and Response | 1. Evidence Handling and Attack Attribution

Lab - Gather System Information After an Incident


Lab - Gather System Information After an Incident 

Objectives  
=   Collect system
information after an incident has occurred.
=   View logs for
potential intrusions.

Background / Scenario 
When an incident occurs in an organization, people
responsible must know how to respond. An organization needs to develop an
incident response
plan and put together a Computer Security Incident Response
Team (CSIRT) to manage the response. In this lab, you will gather system information
and review logs after an incident has occurred. Doing these tasks immediately
after the incident is important because any data residing in RAM will be
gone
when the system is shut down.

Required Resources
PC with the CSE-LABVM installed in VirtualBox

Instructions

Step 1: Open a terminal window in


the CSE-LABVM.
 a.  
Launch the CSE-LABVM.
 b.  
Double-click the Terminal icon to open a terminal.

Step 2: Collect volatile


information of the compromised system.
In this step, you will create a file called report.txt
that includes a variety of system information that can be used for incident
analysis. This report can
then be transferred to a USB drive, emailed, or
uploaded to a cloud server to preserve the information. Then the system can be
taken down.
 a.  
Switch to the root user with the sudo su command. Enter password
as the root password.
cisco@labvm:~$ sudo su
[sudo] password for cisco: password
root@labvm:/home/cisco#
6.1.12 Lab - Gather System Information After an Incident
 b.   Enter the echo
command, and then specify a heading for a newly created file named report.txt.
Enter the cat command to review the new file.
root@labvm:/home/cisco# echo Incident Investigator Report >
report.txt
root@labvm:/home/cisco# cat report.txt
Incident Investigator Report
root@labvm:/home/cisco#
In this Lab, you will complete the following objectives:
 c.   
Enter the date command and redirect the date and timestamp to the
report.txt file. Be sure to use the double angle brackets (>>)
to append to the
report.txt file. Otherwise, you will replace the
previous content.
Collect
Note: To better system
document theinformation after anuse
content stored in
report.txt, incident has occurred.
the echo command to add a subheading as shown here for Start
Date and Time.
Each substep will specify a subheading for you to append
before you gather information.
View logs for potential intrusions.
root@labvm:/home/cisco# echo =====Start Date and Time=====
>> report.txt
root@labvm:/home/cisco# date >> report.txt
 d.   Enter the uname
command to print system information. Use the -a option to append all
system information to the report.txt file.
root@labvm:/home/cisco# echo =====System Information=====
>> report.txt
  Lab
root@labvm:/home/cisco# uname -a >> -report.txt
Gather System Information After an Incident
 e.   Enter the ifconfig
-a command and append all network interface information to the report.txt
file.
root@labvm:/home/cisco# echo =====Network Interfaces=====
>> report.txt
root@labvm:/home/cisco# ifconfig -a >> report.txt
f Th t t t d ll t ll th t k t ti ti E t th d ith th ti t ll td t ll k t ( ) IP

Previous Home Next

https://contenthub.netacad.com/sgp/varmir/1.0/en-US/m6//?xAPILaunchKey=d56e2954767b2bb4c870665daa72cff411f50cf10b6b30f5c8aa8e9… 14/14

You might also like