Skip to content

cudeso/CSIRT-Jump-Bag

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

39 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

 - CSIRT-Jump-Bag

CSIRT-Jump-Bag

A CSIRT Jump Bag is an organised kit with all the basics that are needed to respond to a security incident and collect forensic evidences.

Review this checklist before going on site

First Responder tools

  • Ubuntu Live CD (Linux)
  • Ubuntu Live from USB (Linux)
  • Hiren's BootCD (Windows)
  • KillDisk

Documents

Hardware

  • Put stickers on your hardware. That way you can easily recognize them from the already present gear.
  • Drives
    • External SSD hard drives (USB)
    • Drive connectors
    • NAS
  • Imaging
  • Cables
    • RJ45 cables
    • Power cables
    • Power extension cable
    • Serial to USB cable
  • Devices
    • Camera
    • USB hub
    • Digital clock
    • Network hub
    • Power multi-socket
  • Network taps
    • SFP modules (Multimode / Single-mode)
  • Gear
    • Anti-static bags
    • Tape
    • Screwdriver
    • SIM ejector
  • Note taking
    • Labels
    • Pencils
    • Notebook
    • Flashlight
  • Network taps
    • Network hub
    • RS232 and RS485 taps

Software

Pi-CSIRT

  • Raspberry Pi
  • tcpdump
  • nfdump
  • dd
  • nc
  • Power adapter
  • RJ-45
  • RJ-45 to USB

Incident Response Laptop

  • Hardware
    • Processor: Intel Core i7 or i9, with at least eight cores
    • Memory: 64GB DDR4
    • Harddrive: M2 NVME SSD (for speed) with 1TB storage
    • 2x USB3.1 and 1x USB-C
    • Screen size doesn't really matter, you can use an external screen
  • Operating system
    • Host operating system doesn't really matter as none of the IR work is done on the host operating system
    • Windows 10 or Ubuntu Linux
  • Non-domain-joined laptop
  • Access to the laptop must be protected with a username/password
  • Full disk encryption is highly advised
  • Three partitions
    • System partition, with the host operating system
    • Data partition, with the virtual machines
    • Evidence partition, used to transfer evidences from USB or other sources
      • This partition is always wiped when an investigation is finished
  • Hypervisor Install virtualisation software. All forensic work is done via on in virtualised environment. Make sure the laptop BIOS supports an hyporvisor.
    • VMWare (Workstation / Fusion)
    • After the installation of the virtual machines, always create a "CLEAN" snapshot (label it correctly).

Virtual machines

On IR-laptop

  • FLARE workstation
  • SIFT workstation
  • Ubuntu VM with Autopsy
  • (optional) Ubuntu VM with MISP and TheHive

Windows 10 base image

  • Download Windows 10 image from Microsoft https://www.microsoft.com/en-us/software-download/windows10ISO
  • Use this ISO to setup FLARE, or other Windows 10 machines to run or evaluate samples
  • Create the VM in the Data partition
  • Setup Windows 10 with a local account. Include privacy hardening settings
  • Install all updates
  • Install VMware Tools
  • Reboot
  • Set the time zone to UTC. This is a general best practice for conducting forensic analysis and ensures a standard time zone is being used across all tools.
  • Configure Windows Explorer to show hidden files. Open File Explorer -> View -> check “Hidden items” and “File name extensions”.
  • Create a snapshot

FLARE

Installation takes about 3h to complete.

SIFT image

The SIFT Workstation is a collection of free and open-source incident response and forensic tools designed to perform detailed digital forensic examinations in a variety of settings. It can match any current incident response and forensic tool suite. SIFT demonstrates that advanced incident response capabilities and deep-dive digital forensic techniques can be accomplished using cutting-edge open-source tools that are freely available and frequently updated.

  • Create a full clone from base Windows 10 VM
  • Follow the instructions from Option 2B at https://www.sans.org/tools/sift-workstation/
    • Easy Installation on Microsoft Windows using Windows Subsystem for Linux
  • Create a "Clean" snapshot at the end of the installation

Autopsy

https://www.autopsy.com/download/

Checklist Incident Response laptop after incident investigation

  • Safeguard evidences (USB, locker)
  • Update chain-of-custody documentation
  • Wipe evidence partition
  • Reset virtual machines to CLEAN state

About

CSIRT Jump Bag

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages