Incident Response Practice Questions
Unit 4 - Incident Response Model & Host Forensics
Last Update Unknown
Incident Response Model Practice Questions
Case 1
The case: Your organisation receives a call from a federal law enforcement agency, informing you that they have information indicating a data breach occurred involving your environment.
Evidence: The agency provides a number of specific details, including
- the date and time when sensitive data was transferred out of your network,
- the IP address of the destination, and
- the nature of the content.
Challenge:
- Does this information match the characteristics of a good lead?
- Explain why or why not. What else might you ask for?
- How can you turn this information into an actionable lead?
Case 2
The case: Inspired by Mr. X's successful exploits at the Arctic Nuclear Fusion Research Facility, L0ne Sh4rk decides to try the same strategy against a target of his own: Bob's Dry Cleaners! The local franchise destroyed one of his favorite suits last year and he has decided it is payback time. Plus, they have a lot of credit card numbers.
Meanwhile... Unfortunately for L0ne Sh4rk, Bob's Dry Cleaners is on the alert, having been attacked by unhappy customers before. Security staff notice a sudden burst of failed login attempts to their SSH server in the DMZ (10.30.30.20), beginning at 18:56:50 on April 27, 2011. They decide to investigate.
Challenge: You are the forensic investigator. Your mission is to:
- Evaluate whether the failed login attempts were indicative of a deliberate attack. If so, identify the source and the target(s).
- Determine whether any systems were compromised. If so, describe the extent of the compromise.
Bob's Dry Cleaners keeps credit card numbers and personal contact information for their Platinum Dry Cleaning customers (many of whom are executives). They need to make sure that this credit card data remains secure. If you find evidence of a compromise, provide an analysis of the risk that confidential information was stolen. Be sure to carefully justify your conclusions.
Network: Bob's Dry Cleaners network consists of three segments:
- Internal network: 192.168.30.0/24
- DMZ: 10.30.30.0/24
- The “Internet”: 172.30.1.0/24 [Note that for the purposes of this case study, we are treating the 172.30.1.0/24 subnet as “the Internet.” In real life, this is a reserved non-routable IP address space.]
Evidence: Security staff at Bob's Dry Cleaners collect operating system logs from servers and workstations, as well as firewall logs. These are automatically sent over the network from each system to a central log collection server running rsyslogd (192.168.30.30). Security staff have provided you with log files from the time period in question. These log files include:
- auth.log—System authentication and privileged command logs from Linux servers
- workstations.log—Logs from Windows workstations
- firewall.log—Cisco ASA firewall logs
Security staff also provide you with a list of important systems on the internal network:
Hostname | Description | IP address(es) |
---|---|---|
ant-fw | Cisco ASA firewall | 192.168.30.10, 10.30.30.10, 172.30.1.253 |
baboon-srv | Server running SSH, NTP, DNS | 10.30.30.20 |
cheetah-srv | Server running rsyslogd | 192.168.30.30 |
dog-ws | Workstation | 192.168.30.101 |
elephant-ws | Workstation | 192.168.30.102 |
fox-ws | Workstation | 192.168.30.100 |
yak-srv | Server | 192.168.30.90 |