Slide 11
Slide 11 text
Copyright © 2013, FireEye, Inc. All rights reserved. | CONFIDENTIAL
2014
...but how?
– Infection Vector (propagation too)
– Lateral Movement
– Data Exfiltration
– Keylogging Data
– Persistence Mechanism
– IOCs
Sequence of events? mftparser, shimcache, timeliner, usn_parser
Attack script used? yarascan, mftparser, vaddump/memdump, strings,
bulk_extractor
Any C2? connections, connscan, netscan, sockets, sockscan
Who/Where? evtlogs, filescan/dumpfiles/EVTXtract, getsids, pslist,
psscan, psxview