Investigative Trees – Converting Attack Trees into Guides for Incident Response Rodney Caudle December 2009 GIAC GSEC, GCIA, GCIH, GCFA, GSNA, GCPM, GLDR, GSLC, GSPA SANS Technology Institute - Candidate for Master of Science Degree 1 1 Objective • • • • • Setting the Stage Basics of Investigative Trees Rules for Building Investigative Trees Example: Corporate E-Mail Espionage Demo: iTree.pm SANS Technology Institute - Candidate for Master of Science Degree 2 Setting the Stage • Multi-Site Corporation • Information Leakage Suspected • Insider Suspected • Factor: Outsourced IT • You’re the objective third party SANS Technology Institute - Candidate for Master of Science Degree 3 Investigative Trees • Designed to answer one question: Given a fixed amount of resources, what investigation will yield the results with the most confidence for a given outcome? SANS Technology Institute - Candidate for Master of Science Degree 4 Building a Tree • Ask a question • Split into smaller questions that can be answered until the questions are small enough to act upon • Build procedures to answer questions. There may be multiple ways to answer • Add parameters to provide perspectives SANS Technology Institute - Candidate for Master of Science Degree 5 Rules for iTrees • Root node is the goal or outcome • Leaf nodes represent conditions of meeting the parent node or goal – “OR” leaf nodes – “AND” leaf nodes • All nodes should be Boolean in nature SANS Technology Institute - Candidate for Master of Science Degree 6 Rules (cont’d.) • Additional parameters can be added to provide perspectives • Leaf nodes may become root nodes of a sub-tree that can be saved as a library SANS Technology Institute - Candidate for Master of Science Degree 7 General Parameters • • • • • Confidence – level of trust Confidencei – level of trust (impacted) Impacted – True or false Weight – comparison to neighbor nodes Category – label for organization SANS Technology Institute - Candidate for Master of Science Degree 8 Other Parameters • • • • Cost Time Rate Units • • • • • • Dependency Early Start Early Finish Late Start Late Finish Slack Time SANS Technology Institute - Candidate for Master of Science Degree 9 Example: Corporate E-Mail • Root Question: Can we verify the vector for delivering the e-mails? • Need to define the leaf nodes or subgoals SANS Technology Institute - Candidate for Master of Science Degree 10 Leaf Nodes (OR) • Were the e-mails sent Exchange method? • Were the e-mails sent OWA method? • Were the e-mails sent method? • Were the e-mails sent gateway? via the Outlookvia the web-based via a mobile device via SMTP through a SANS Technology Institute - Candidate for Master of Science Degree 11 Continue Expanding • Were the e-mails sent via SMTP through a gateway? – Can we verify the presence of SMTP headers in the original e-mail? – Can we verify the presence of e-mail(s) in the log events from the SMTP gateway server? SANS Technology Institute - Candidate for Master of Science Degree 12 Add Steps to Get the Answers • Can we verify the presence of SMTP headers in the original e-mail? – Can we recover the presence of SMTP headers in the original e-mail? • Can we recover a copy of the original e-mail from the desktop or laptop? • Does the e-mail contain SMTP headers (RFC821)? SANS Technology Institute - Candidate for Master of Science Degree 13 Demo: iTree.PM • Perl module to automate the investigation tree creation process SANS Technology Institute - Candidate for Master of Science Degree 14 Summary • • • • Investigative Trees = good investment Design supports KB natively Easy to expand and share information Perl Modules available for creation and automation www.investigativetrees.com SANS Technology Institute - Candidate for Master of Science Degree 15
© Copyright 2026 Paperzz