Don't Miss the Best Specials of the Year with Online Training! Learn More!

London October 2020 - Live Online

Virtual, British Summer Time | Mon, Oct 12 - Sat, Oct 17, 2020

FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics

Mon, October 12 - Sat, October 17, 2020

Associated Certification: GIAC Certified Forensic Analyst (GCFA)

ADVANCED THREATS ARE IN YOUR NETWORK - IT'S TIME TO GO HUNTING!

FOR508: Advanced Incident Response and Threat Hunting Course will help you to:

  • Detect how and when a breach occurred
  • Identify compromised and affected systems
  • Perform damage assessments and determine what was stolen or changed
  • Contain and remediate incidents
  • Develop key sources of threat intelligence
  • Hunt down additional breaches using knowledge of the adversary

DAY 0: A 3-letter government agency contacts you to say an advanced threat group is targeting organizations like yours, and that your organization is likely a target. They won't tell how they know, but they suspect that there are already several breached systems within your enterprise. An advanced persistent threat, aka an APT, is likely involved. This is the most sophisticated threat that you are likely to face in your efforts to defend your systems and data, and these adversaries may have been actively rummaging through your network undetected for months or even years.

This is a hypothetical situation, but the chances are very high that hidden threats already exist inside your organization's networks. Organizations can't afford to believe that their security measures are perfect and impenetrable, no matter how thorough their security precautions might be. Prevention systems alone are insufficient to counter focused human adversaries who know how to get around most security and monitoring tools.

The key is to constantly look for attacks that get past security systems, and to catch intrusions in progress, rather than after attackers have completed their objectives and done significant damage to the organization. For the incident responder, this process is known as "threat hunting". Threat hunting uses known adversary behaviors to proactively examine the network and endpoints in order to identify new data breaches.

Threat hunting and Incident response tactics and procedures have evolved rapidly over the past several years. Your team can no longer afford to use antiquated incident response and threat hunting techniques that fail to properly identify compromised systems, provide ineffective containment of the breach, and ultimately fail to rapidly remediate the incident. Incident response and threat hunting teams are the keys to identifying and observing malware indicators and patterns of activity in order to generate accurate threat intelligence that can be used to detect current and future intrusions.

More

This in-depth incident response and threat hunting course provides responders and threat hunting teams with advanced skills to hunt down, identify, counter, and recover from a wide range of threats within enterprise networks, including APT nation-state adversaries, organized crime syndicates, and hacktivists. Constantly updated, FOR508: Advanced Incident Response and Threat Hunting addresses today's incidents by providing hands-on incident response and threat hunting tactics and techniques that elite responders and hunters are successfully using to detect, counter, and respond to real-world breach cases.

The course uses a hands-on enterprise intrusion lab -- modeled after a real-world targeted APT attack on an enterprise network and based on APT group tactics to target a network -- to lead you to challenges and solutions via extensive use of the SIFT Workstation and best-of-breed investigative tools.

During the intrusion and threat hunting lab exercises, you will identify where the initial targeted attack occurred and how the adversary is moving laterally through multiple compromised systems. You will also extract and create crucial cyber threat intelligence that can help you properly scope the compromise and detect future breaches.

During a targeted attack, an organization needs the best incident response team in the field. FOR508: Advanced Incident Response and Threat Hunting will train you and your team to respond, detect, scope, and stop intrusions and data breaches.

GATHER YOUR INCIDENT RESPONSE TEAM - IT'S TIME TO GO HUNTING

FOR508 Course Topics

  • Advanced use of a wide range of best-of-breed open-source tools and the SIFT Workstation to perform incident response and digital forensics.
  • Hunting and responding to advanced adversaries such as nation-state actors, organized crime, and hacktivists.
  • Threat hunting techniques that will aid in quicker identification of breaches.
  • Rapid incident response analysis and breach assessment.
  • Incident response and intrusion forensics methodology.
  • Remote and enterprise incident response system analysis.
  • Windows live incident response and scaling collection of triage data.
  • Investigating and countering living of the land attacks, including PowerShell and WMI.
  • Memory analysis during incident response and threat hunting.
  • Transitioning memory analysis skills to enterprise detection and response (EDR) platforms
  • Detailed instruction on compromise and protection of Windows enterprise credentials.
  • Internal lateral movement analysis and detection.
  • Rapid and deep-dive timeline creation and analysis.
  • Volume shadow copy exploitation for hunting threats and incident response.
  • Detection of anti-forensics and adversary hiding techniques.
  • Discovery of unknown malware on a system.
  • Adversary threat intelligence development, indicators of compromise, and usage.
  • Cyber-kill chain strategies.
  • Step-by-step tactics and procedures to respond to and investigate intrusion cases

Hide

Notice:

Please plan to arrive 30 minutes early on Day 1 for lab preparation and set-up.

Course Syllabus


Jason Jordaan
Mon Oct 12th, 2020
9:00 AM - 5:00 PM BST

Overview

There are ways to gain an advantage against adversaries targeting you -- it starts with the right mindset and knowing what works.

The last decade has not been kind to network defenders. Threats to the modern enterprise are legion and attackers have used the enormous complexity of enterprise networks against us. But the tide is shifting. Over the past decade, we have seen a dramatic increase in sophisticated attacks against organizations. Nation-state attacks originating from the intelligence services of countries like China and Russia, often referred to as Advanced Persistent Threat (APT) actors, have proved difficult to suppress. Massive financial attacks from the four corners of the globe have resulted in billions of dollars in losses. Ransomware and extortion became an existential threat almost overnight. While the odds are stacked against us, the best teams out there are proving that these threats can be managed and mitigated. The adversary is good and getting better. Are we learning how to counter them? Yes, we are.

This course was designed to help organizations increase their capability to detect and respond to intrusions. This is an achievable goal and begins by teaching you the tools and techniques necessary to find evil in your network. This course is designed to make you and your organization an integral part of the solution. Incident responders and threat hunters must be armed with the latest tools, analysis techniques, and enterprise methodologies to identify, track, and contain advanced adversaries with the ultimate goal of rapid remediation of incidents. Further, incident response and threat hunting analysts must be able to scale their efforts across potentially thousands of systems in the enterprise. We start the day by examining the six-step incident response methodology as it applies to incident response for advanced threat groups. The importance of developing cyber threat intelligence to impact the adversaries' "kill chain" is discussed and forensic live response techniques and tactics are demonstrated that can be applied both to single systems and across the entire enterprise.

Understanding attacks is critical to being able to detect and mitigate them. We start our education of attacker techniques on day one, learning common malware characteristics and diving deep into techniques used by adversaries to maintain persistence in the network. Persistence is typically completed early in the attack cycle and students will learn hunting techniques to audit the network and accomplish early discovery. Living off the land binaries (local tools available in most environments) and WMI-based attacks in particular have become standard operating procedure for advanced adversaries and we end the day working with tools and techniques to identify such attacks at scale.

Get ready to hunt!

Exercises
  • Forensic Lab Setup and Orientation Using the SIFT Workstation
  • Malware Persistence Detection and Analysis
  • Scaling Data Collection and Analysis
  • Finding and Analyzing Malicious WMI attacks

CPE/CMU Credits: 6

Topics
  • Forensic Lab Setup and Orientation Using the SIFT Workstation
  • Malware Persistence Detection and Analysis
  • Scaling Data Collection and Analysis
  • Finding and Analyzing Malicious WMI attacks

Real Incident Response Tactics

  • Preparation: Key tools, techniques, and procedures that an incident response team needs to respond properly to intrusions
  • Identification/Scoping: Proper scoping of an incident and detecting all compromised systems in the enterprise
  • Containment/Intelligence Development: Restricting access, monitoring, and learning about the adversary in order to develop threat intelligence
  • Eradication/Remediation: Determining and executing key steps that must be taken to help stop the current incident and the move to real-time remediation
  • Recovery: Recording of the threat intelligence to be used in the event of a similar adversary returning to the enterprise
  • Avoiding "Whack-A-Mole" Incident Response: Going beyond immediate eradication without proper incident scoping/containment

Threat Hunting

  • Hunting versus Reactive Response
  • Intelligence-Driven Incident Response
  • Building a Continuous Incident Response/Threat Hunting Capability
  • Forensic Analysis versus Threat Hunting Across Endpoints
  • Threat Hunt Team Roles
  • ATT&CK - MITRE's Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK(TM))

Threat Hunting in the Enterprise

  • Identification of Compromised Systems
  • Finding Active and Dormant Malware
  • Digitally Signed Malware
  • Malware Characteristics
  • Common Hiding Mechanisms
  • Finding Evil by Understanding Normal

Incident Response and Hunting across Endpoints

  • WMIC & PowerShell
  • PowerShell Remoting Scalability
  • PowerShell Remoting Credential Safeguards
  • Kansa PowerShell Remoting IR Framework

Malware Defense Evasion and Identification

  • Service Hijacking/Replacement
  • Frequent Compilation
  • Binary Padding
  • Packing/Armoring
  • Dormant Malware
  • Signing Code with Valid Certificates
  • Anti-Forensics/Timestomping

Malware Persistence Identification

  • AutoStart Locations, RunKeys
  • Service Creation/Replacement
  • Service Failure Recovery
  • Scheduled Tasks
  • DLL Hijacking
  • WMI Event Consumers

Investigating WMI-Based Attacks

  • WMI Overview
  • WMI Attacks Across the Kill Chain
  • Auditing the WMI Repository
  • WMI File System and Registry Residue
  • Command-Line Analysis and WMI Logs
  • WMI Process Anomalies


Jason Jordaan
Tue Oct 13th, 2020
9:00 AM - 12:15 PM BST
1:30 PM - 5:00 PM BST

Overview

Even the most advanced adversaries leave footprints everywhere. Learn the secrets of the best hunters.

Cyber defenders have a wide variety of tools and artifacts available to identify, hunt, and track adversary activity in a network. Each attacker action leaves a corresponding artifact, and understanding what is left behind as footprints can be crucial to both red and blue team members. Attacks follow a predictable pattern, and we focus our detective efforts on immutable portions of that pattern. As an example, at some point an attacker will need to run code to accomplish their objectives. We can identify this activity via application execution artifacts. The attacker will also need one or more accounts to run code. Consequently, account auditing is a powerful means of identifying malicious actions. An attacker also needs a means to move throughout the network, so we look for artifacts left by the relatively small number of ways there are to accomplish this part of their mission. In this section, we cover common attacker tradecraft and discuss the various data sources and forensic tools you can use to identify malicious activity in the enterprise.

Exercises
  • Hunting and Detecting Evidence of Execution at Scale with Shimcache and Amcache
  • Discovering Credential abuse with Event Log Collection and Analysis
  • Tracking Lateral Movement with Event Log Analysis
  • Hunting Malicious use of WMI and PowerShell

CPE/CMU Credits: 6

Topics

Stealing and Utilization of Legitimate Credentials

  • Pass the Hash
  • Single Sign On (SSO) Dumping using Mimikatz
  • Token Stealing
  • Cached Credentials
  • LSA Secrets
  • Kerberos Attacks
  • NTDS.DIT theft

Advanced Evidence of Execution Detection

  • Attacker Tactics, Techniques, and Procedures (TTPs) Observed Via Process Execution
  • Prefetch Analysis
  • Application Compatibility Cache (ShimCache)
  • Amcache Registry Examination
  • Scaling ShimCache and Amcache Investigations

Lateral Movement Adversary Tactics, Techniques, and Procedures (TTPs)

  • Compromising Credentials Techniques
  • Remote Desktop Services Misuse
  • Windows Admin Share Abuse
  • PsExec Utilization
  • Windows Remote Management Tool Techniques
  • PowerShell Remoting/WMIC Hacking
  • Vulnerability Exploitation

Log Analysis for Incident Responders and Hunters

  • Profiling Account Usage and Logons
  • Tracking and Hunting Lateral Movement
  • Identifying Suspicious Services
  • Detecting Rogue Application Installation
  • Finding Malware Execution and Process Tracking
  • Capturing Command Lines and Scripts
  • Powershell Transcript and ScriptBlock Logging
  • PowerShell Script Obfuscation
  • WMI Activity Logging
  • Anti-Forensics and Event Log Clearing


Jason Jordaan
Wed Oct 14th, 2020
9:00 AM - 12:15 PM BST
1:30 PM - 5:00 PM BST

Overview

Using memory analysis sometimes feels like cheating -- finding active attacks shouldn't be this easy.

Memory forensics has come a long way in just a few years. It is now a critical component of many advanced tool suites and the mainstay of successful incident response and threat hunting teams. Memory forensics can be extraordinarily effective at finding evidence of worms, rootkits, PowerShell, and advanced malware used by targeted attackers. In fact, some fileless attacks may be nearly impossible to unravel without memory analysis. Memory analysis was traditionally the domain of Windows internals experts and reverse engineers, but new tools, techniques, and detection heuristics have greatly leveled the playing field making it accessible today to all investigators, incident responders, and threat hunters. Further, understanding attack patterns in memory is a core analyst skill applicable across a wide range of endpoint detection and response (EDR) products, making those tools even more effective. This extremely popular section will cover many of the most powerful memory analysis capabilities available and give you a solid foundation of advanced memory forensic skills to super-charge investigations, regardless of the toolset employed.

Exercises
  • Remote endpoint incident response, hunting, and analysis using F-Response Enterprise
  • Remote endpoint memory examination using F-Response Enterprise
  • Creating local and remote triage images with KAPE
  • Scaling investigations with Velociraptor
  • Detect unknown live and dormant custom malware in memory across multiple systems in an enterprise environment
  • Examine Windows process trees to identify normal versus anomalies
  • Find APT "beacon" malware over common ports used by targeted attackers to access command and control (C2) channels
  • Find residual attacker command-line activity through scanning strings in memory and by extracting command history buffers
  • Compare compromised system memory against a baseline system using Frequency of Least Occurrence stacking techniques
  • Identify advanced malware hiding techniques, including code injection and rootkits
  • Employing indicators of compromise to automate analysis
  • Analysis of memory from infected systems:
    • Stuxnet
    • TDL3/ TDSS
    • Cozyduke APT29 RAT
    • Rundll32
    • Zeus/Zbot
    • Conficker
    • StormWorm Rootkit
    • Black Energy Rootkit
    • WMI and PowerShell
    • Cobalt Strike Beacons
    • Metasploit
    • Custom APT command and control malware

CPE/CMU Credits: 6

Topics

Remote and Enterprise Incident Response

  • Remote Endpoint Access in the Enterprise
  • Remote Endpoint Host-based Analysis
  • Scalable Host-based Analysis (one analyst examining 1,000 systems) and Data Stacking
  • Remote Memory Analysis

Triage and Endpoint Detection and Response (EDR)

  • Endpoint Triage Collection
  • EDR Capabilities and Challenges
  • EDR and Memory Forensics

Memory Acquisition

  • Acquisition of System Memory from both Windows 32/64-bit Systems
  • Hibernation and Pagefile Memory Extraction and Conversion
  • Virtual Machine Memory Acquisition
  • Memory changes in Windows 10
  • Windows 10 Virtual Secure Mode

Memory Forensics Analysis Process for Response and Hunting

  • Understanding Common Windows Services and Processes
  • Identify Rogue Processes
  • Analyze Process DLLs and Handles
  • Review Network Artifacts
  • Look for Evidence of Code Injection
  • Check for Signs of a Rootkit
  • Acquire Suspicious Processes and Drivers

Memory Forensics Examinations

  • Live Memory Forensics
  • Advanced Memory Analysis with Volatility
  • Webshell Detection Via Process Tree Analysis
  • Code Injection, Malware, and Rootkit Hunting in Memory
  • WMI and PowerShell Processes
  • Extract Memory-Resident Adversary Command Lines
  • Investigate Windows Services
  • Hunting Malware Using Comparison Baseline Systems
  • Find and Dump Cached Files from RAM

Memory Analysis Tools

  • Volatility
  • F-Response
  • Velociraptor
  • Comae Windows Memory Toolkit

Students will receive a full six-month license of F-Response Enterprise Edition, enabling them to use their workstation or the SIFT workstation to connect and script actions on hundreds or thousands of systems in the enterprise. This capability is used to benchmark, facilitate, and demonstrate new incident response and threat hunting technologies that enable a responder to look for indicators of compromise across the entire enterprise network in memory and on disk.


Jason Jordaan
Thu Oct 15th, 2020
9:00 AM - 12:15 PM BST
1:30 PM - 5:00 PM BST

Overview

Timeline analysis will change the way you approach digital forensics, threat hunting, and incident response...forever.

Learn advanced incident response and hunting techniques uncovered via timeline analysis directly from the authors who pioneered timeline analysis tradecraft. Temporal data is located everywhere on a computer system. Filesystem modified/access/creation/change times, log files, network data, registry data, and browser history files all contain time data that can be correlated and analyzed to rapidly solve cases. Pioneered by Rob Lee as early as 2001, timeline analysis has grown to become a critical incident response, hunting, and forensics technique. New timeline analysis frameworks provide the means to conduct simultaneous examinations on a multitude of systems across a multitude of forensic artifacts. Analysis that once took days now takes minutes.

This section will step you through two primary methods of building and analyzing timelines used during advanced incident response, threat hunting, and forensic cases. Exercises will show analysts how to create timelines and how to introduce the key analysis methods necessary to help you use those timelines effectively in your cases.

Exercises
  • Detecting malware defense evasion techniques
  • Using timeline analysis, track adversary activity by hunting an APT group's footprints of malware, lateral movement, and persistence
  • Target hidden and time-stomped malware and utilities that advanced adversaries use to move in the network and maintain their presence
  • Track advanced adversaries├ó┬┬ actions second-by-second through in-depth super-timeline analysis
  • Observe how attackers laterally move to other systems in the enterprise by watching a trail left in filesystem times, registry, event logs, shimcache, and other temporal-based artifacts
  • Learn how to filter system artifact, file system, and registry timelines to target the most important data sources efficiently

CPE/CMU Credits: 6

Topics

Malware Defense Evasion and Detection

  • Indicators of Compromise - YARA
  • Entropy and Packing Analysis
  • Executable Anomalies
  • Digital Signature Analysis

Timeline Analysis Overview

  • Timeline Benefits
  • Prerequisite Knowledge
  • Finding the Pivot Point
  • Timeline Context Clues
  • Timeline Analysis Process

Filesystem Timeline Creation and Analysis

  • MACB Meaning by Filesystem
  • Windows Time Rules (File Copy versus File Move)
  • Filesystem Timeline Creation Using Sleuthkit and fls
  • Bodyfile Analysis and Filtering Using the mactime Tool

Super Timeline Creation and Analysis

  • Super Timeline Artifact Rules
  • Program Execution, File Knowledge, File Opening, File Deletion
  • Timeline Creation with log2timeline/Plaso
  • log2timeline/ Plaso Components
  • Filtering the Super Timeline Using psort
  • Targeted Super Timeline Creation
  • Super Timeline Analysis Techniques
  • Scaling Super Timeline Analysis


Jason Jordaan
Fri Oct 16th, 2020
9:00 AM - 12:15 PM BST
1:30 PM - 5:00 PM BST

Overview

Advanced adversaries are good. We must be better.

Attackers commonly take steps to hide their presence on compromised systems. While some anti-forensics steps can be relatively easy to detect, others are much harder to deal with. As such, it's important that forensic professionals and incident responders are knowledgeable on various aspects of the operating system and file system which can reveal critical residual evidence. In this section, we focus primarily on the file system to recover files, file fragments, and file metadata of interest to the investigation. These trace artifacts can help the analyst uncover deleted logs, attacker tools, malware configuration information, exfiltrated data, and more. This often results in a deeper understanding of the attacker TTPs and provides more threat intelligence for thorough scoping the intrusion. In some cases, these deep-dive techniques could be the only means for proving that an attacker was active on a system of interest.

Exercises
  • Volume shadow snapshot analysis
  • Timelines across volume shadow snapshots
  • Anti-Forensics analysis using various components of the NTFS filesystem
  • Timestomp checks against suspicious files
  • Advanced data recovery with records carving and deleted volume shadow copy recovery

CPE/CMU Credits: 6

Topics

Volume Shadow Copy Analysis

  • Volume Shadow Copy Service
  • Options for Accessing Historical Data in Volume Snapshots
  • Accessing Shadow Copies with vshadowmount
  • Volume Shadow Copy Timelining

Advanced NTFS Filesystem Tactics

  • NTFS Filesystem Analysis
  • Master File Table (MFT) Critical Areas
  • NTFS System Files
  • NTFS Metadata Attributes
  • Rules of Windows Timestamps for $StdInfo and $Filename
  • Detecting Timestamp Manipulation
  • Resident versus Nonresident Files
  • Alternate Data Streams
  • NTFS Directory Attributes
  • B-Tree Index Overview and Balancing
  • Finding Wiped/Deleted Files using the $I30 indexes
  • Filesystem Flight Recorders: $Logfile and $UsnJrnl
  • Common Activity Patterns in the Journals
  • Useful Filters and Searches in the Journals
  • What Happens When Data Is Deleted from an NTFS Filesystem?

Advanced Evidence Recovery

  • Markers of Common WIpers and Privacy Cleaners
  • Deleted Registry Keys
  • Detecting "Fileless" Malware in the Registry
  • File Carving
  • Volume Shadow Carving
  • Carving for NTFS and Event Log Records
  • Effective String Searching
  • NTFS Configuration Changes to Combat Anti-Forensics


Jason Jordaan
Sat Oct 17th, 2020
9:00 AM - 12:15 PM BST
1:30 PM - 5:00 PM BST

Overview

This incredibly rich and realistic enterprise intrusion exercise is based on a real-world advanced persistent threat (APT) group. It brings together techniques learned earlier in the course and tests your newly acquired skills in an investigation into an attack by an advanced adversary. The challenge brings it all together using a real intrusion into a complete Windows enterprise environment. You will be asked to uncover how the systems were compromised in the initial intrusion, find other compromised systems via adversary lateral movement, and identify intellectual property stolen via data exfiltration. You will walk out of the course with hands-on experience investigating a real attack, curated by a cadre of instructors with decades of experience fighting advanced threats from attackers ranging from nation-states to financial crime syndicates and hacktivist groups.

CPE/CMU Credits: 6

Topics
  • The Intrusion Forensic Challenge will ask each incident response team to analyze multiple systems in an enterprise network with many endpoints.
  • During the challenge, each incident response team will be asked to answer key questions and address critical issues in the different categories listed below, just as they would during a real breach in their organizations:

IDENTIFICATION AND SCOPING:

1. How and when did the APT group breach our network?

2. List all compromised systems by IP address and specific evidence of compromise.

3. When and how did the attackers first laterally move to each system?

CONTAINMENT AND THREAT INTELLIGENCE GATHERING:

4. How and when did the attackers obtain domain administrator credentials?

5. Once on other systems, what did the attackers look for on each system?

6. Find exfiltrated email from executive accounts and perform damage assessment.

7. Determine what was stolen: Recover any attacker archives, find encryption passwords, and extract the contents to verify exfiltrated data.

8. Collect and list all malware used in the attack.

9. Develop and present cyber threat intelligence based on host and network indicators of compromise.

REMEDIATION AND RECOVERY:

10. What level of account compromise occurred. Is a full password reset required during remediation?

11. Based on the attacker techniques and tools discovered during the incident, what are the recommended steps to remediate and recover from this incident?

a. What systems need to be rebuilt?

b. What IP addresses need to be blocked?

c. What countermeasures should we deploy to slow or stop these attackers if they come back?

d. What recommendations would you make to detect these intruders in our network again?

ADDITIONAL NOTES:

If you have attended FOR500, you may want to bring your copy of the FOR500 - Windows SIFT Workstation Virtual Machine, as you can use it for the final challenge and for many of the exercises in FOR508.

Bring/install any other forensic tool you feel could be useful (Splunk, EnCase, FTK, etc). For the final challenge at the end of the course, you can utilize any forensic tool to help you and your team perform the analysis, including commercial capabilities. If you have any dongles, licensed software, etc., you are free to use them.

Please do not plan to use the version of the SIFT Workstation downloaded from the Internet. We will provide you with a version specifically configured for the FOR508 materials on Day 1 of the course.

If you have additional questions about the laptop specifications, please contact laptop_prep@sans.org.

Additional Information

Important! Bring your own system configured according to these instructions!

We ask that you do 5 things to prepare prior to class start. This early preparation will allow you to get the most out of your training. One of those five steps is ensuring that you bring a properly configured system to class. This document details the required system hardware and software configuration for your class. You can also watch a series of short videos on these topics at the following web link https://sansurl.com/sans-setup-videos.

A properly configured system is required to fully participate in this course. If you do not carefully read and follow these instructions, you will likely leave the class unsatisfied because you will not be able to participate in hands-on exercises that are essential to this course. Therefore, we strongly urge you to arrive with a system meeting all the requirements specified for the course.

This is common sense, but we will say it anyway. Back up your system before class. Better yet, do not have any sensitive data stored on the system. SANS can't responsible for your system or data.

MANDATORY FOR508 SYSTEM HARDWARE REQUIREMENTS:

  • CPU: 64-bit Intel i5/i7 (4th generation+) - x64 bit 2.0+ GHz processor or more recent processor is mandatory for this class (Important - Please Read: a 64-bit system processor is mandatory)
  • It is critical that your CPU and operating system support 64-bit so that our 64-bit guest virtual machine will run on your laptop. VMware provides a free tool for Windows that will detect whether or not your host supports 64-bit guest virtual machines. For further troubleshooting, this article also provides good instructions for Windows users to determine more about the CPU and OS capabilities. For Macs, please use this support page from Apple to determine 64-bit capability.
  • BIOS settings must be set to enable virtualization technology, such as "Intel-VT".

    Be absolutely certain you can access your BIOS if it is password protected, in case changes are necessary. Test it!

  • 16 GB (Gigabytes) of RAM or higher is mandatory for this class (Important - Please Read: 16 GB of RAM or higher of RAM is mandatory and minimum.
  • USB 3.0 Type-A port is required. At least one open and working USB 3.0 Type-A port is required. (A Type-C to Type-A adapter may be necessary for newer laptops.) (Note: Some endpoint protection software prevents the use of USB devices - test your system with a USB drive before class to ensure you can load the course data.)
  • 200 Gigabytes of Free Space on your System Hard Drive - Free Space on Hard Drive is critical to host the VMs we distribute
  • Local Administrator Access is required. This is absolutely required. Don't let your IT team tell you otherwise. If your company will not permit this access for the duration of the course, then you should make arrangements to bring a different laptop.
  • Wireless 802.11 Capability

MANDATORY FOR508 HOST OPERATING SYSTEM REQUIREMENTS:

  • Host Operating System: Latest version of Windows 10 or macOS 10.15.x
  • Please note: It is necessary to fully update your host operating system prior to the class to ensure you have the right drivers and patches installed to utilize the latest USB 3.0 devices.

PLEASE INSTALL THE FOLLOWING SOFTWARE PRIOR TO CLASS:

  1. Download and install VMware Workstation Pro 15.5.X+, VMware Player 15.5.X+ or Fusion 11.5+ on your system prior to class beginning. If you do not own a licensed copy of VMware Workstation or Fusion, you can download a free 30-day trial copy from VMware. VMware will send you a time-limited serial number if you register for the trial at their website.
  2. Download and install 7Zip (for Windows Hosts) or Keka (macOS).

Your course media will now be delivered via download. The media files for class can be large, some in the 40 - 50 GB range. You need to allow plenty of time for the download to complete. Internet connections and speed vary greatly and are dependent on many different factors. Therefore, it is not possible to give an estimate of the length of time it will take to download your materials. Please start your course media downloads as you get the link. You will need your course media immediately on the first day of class. Waiting until the night before the class starts to begin your download has a high probability of failure.

SANS has begun providing printed materials in PDF form. Additionally, certain classes are using an electronic workbook in addition to the PDFs. The number of classes using eWorkbooks will grow quickly. In this new environment, we have found that a second monitor and/or a tablet device can be useful by keeping the class materials visible while the instructor is presenting or while you are working on lab exercises.

If you have additional questions about the laptop specifications, please contact laptop_prep@sans.org.

Who Should Attend

  • Incident Response Team Members who regularly respond to complex security incidents/intrusions from APT groups/advanced adversaries and need to know how to detect, investigate, remediate, and recover from compromised systems across endpoints in the enterprise.
  • Threat Hunters who are seeking to understand threats more fully and how to learn from them in order to more effectively hunt threats and counter their tradecraft.
  • SOC Analysts looking to better understand alerts, build the skills necessary to triage events, and fully leverage advanced endpoint detection and response (EDR) capabilities.
  • Experienced Digital Forensic Analysts who want to consolidate and expand their understanding of memory and timeline forensics, investigation of technically advanced individuals, incident response tactics, and advanced intrusion investigations.
  • Information Security Professionals who directly support and aid in responding to data breach incidents and intrusions.
  • Federal Agents and Law Enforcement Professionals who want to master advanced intrusion investigations and incident response, and expand their investigative skills beyond traditional host-based digital forensics.
  • Red Team Members, Penetration Testers, and Exploit Developers who want to learn how their opponents can identify their actions, how common mistakes can compromise operations on remote systems, and how to avoid those mistakes. This course covers remote system forensics and data collection techniques that can be easily integrated into post-exploit operating procedures and exploit- testing batteries.
  • SANS FOR500 and SEC504 Graduates looking to take their skills to the next level.

Use this sample training request letter, or elements of it, to justify the time and budget required to complete SANS training to your manager. Simply copy and paste text into an email to your manager, then make any necessary adjustments to personalize the information.

FOR508 is an advanced incident response and threat hunting course that focuses on detecting and responding to advanced persistent threats and organized crime threat groups. We do not cover the introduction or basics of incident response, Windows digital forensics, or hacker techniques in this course.

We recommend that you should have a background in FOR500: Windows Forensics prior to attending this course.

  • SIFT Workstation
    • This course extensively uses the SIFT Workstation to teach incident responders and forensic analysts how to respond to and investigate sophisticated attacks.
    • The SIFT Workstation contains hundreds of free and open-source tools, easily matching any modern forensic and incident response commercial response tool suite.
    • A virtual machine is used with many of the hands-on class exercises.
    • Ubuntu Linux LTS Base.
    • 64-bit base system.
    • Better memory utilization.
    • Auto-DFIR package update and customizations.
    • Latest forensics tools and techniques.
    • VMware Appliance ready to tackle forensics.
    • Cross-compatibility between Linux and Windows.
    • Expanded file system support (NTFS, HFS, EXFAT, and more).

  • F-Response Enterprise (Endpoint Collection Capability)
    • Enables incident responders to access remote systems and physical memory of a remote computer via the network.
    • Gives any incident response or forensics tool the capability to be used across the enterprise.
    • Perfect for intrusion investigations and data breach incident response situations.
    • Deployable agent to remote systems.
    • SIFT Workstation compatible.
    • Vendor neutral - works with just about any tool.
    • Number of simultaneous examiners = unlimited.
    • Number of simultaneous agents deployed = unlimited.
    • The six-month license allows F-Response Enterprise to continue to be used and benchmarked in your environment at work/home.

  • Electronic Download Pacakge containing:
    • APT case images, memory captures, SIFT Workstation 3, tools, and documentation.
    • SANS DFIR APT Case Electroninc Exercise Workbook
    • Electronic Exercise book is over 250 pages long with detailed step-by-step instructions and examples to help you become a master incident responder.

  • SANS DFIR Cheatsheets to Help Use the Tools in the Field

  • Learn and master the tools, techniques, and procedures necessary to effectively hunt, detect, and contain a variety of adversaries and to remediate incidents.
  • Detect and hunt unknown live, dormant, and custom malware in memory across multiple Windows systems in an enterprise environment.
  • Hunt through and perform incident response across hundreds of unique systems simultaneously using PowerShell or F-Response Enterprise and the SIFT Workstation.
  • Identify and track malware beaconing outbound to its command and control (C2) channel via memory forensics, registry analysis, and network connection residue.
  • Determine how the breach occurred by identifying the beachhead and initial attack mechanisms.
  • Identify living of the land techniques, inluduing malicious use of PowerShell and WMI.
  • Target advanced adversary anti-forensics techniques like hidden and time-stomped malware, along with utility-ware used to move in the network and maintain an attacker's presence.
  • Use memory analysis, incident response, and threat hunting tools in the SIFT Workstation to detect hidden processes, malware, attacker command lines, rootkits, network connections, and more.
  • Track user and attacker activity second-by-second on the system you are analyzing through in-depth timeline and super-timeline analysis.
  • Recover data cleared using anti-forensics techniques via Volume Shadow Copy and Restore Point analysis.
  • Identify lateral movement and pivots within your enterprise across your endpoints, showing how attackers transition from system to system without detection.
  • Understand how the attacker can acquire legitimate credentials - including domain administrator rights - even in a locked-down environment.
  • Track data movement as the attackers collect critical data and shift them to exfiltration collection points.
  • Recover and analyze archives and .rar files used by APT-like attackers to exfiltrate sensitive data from the enterprise network.
  • Use collected data to perform effective remediation across the entire enterprise.

One of the biggest complaints you hear in the threat hunting and incident response community is the lack of realistic intrusion data. Most real-world intrusion data are simply too sensitive to be shared

.

The FOR508 course authors created a realistic scenario based on experiences surveyed from a panel of responders who regularly combat targeted APT attacks. They helped review and guide the targeted attack "script" used to create the scenario. The result is an incredibly rich and realistic attack scenario across multiple enterprise systems. This APT attack lab forms the basis for training during the week. The network was set up to mimic a standard "protected" enterprise network using standard compliance checklists:

  • Full auditing turned on per recommended Federal Information Security Management Act guidelines
  • Windows domain controller (DC) set up and configured; DC hardened similarly to what is seen in real enterprise networks
  • Systems installed with the real software on them that is used (Office, Adobe, Skype, Tweetdeck, Email, Dropbox, Firefox, Chrome)
  • Fully patched systems (patches are automatically installed)
  • Endpoint Detection and Response (EDR) agents
  • Enterprise A/V and on-scan capability based on the Department of Defense's Host-based Security System
    • Endpoint Protection Software - Anti-virus, Anti-spyware, Safe surfing, Anti-spam, Device Control, Onsite Management, Host Intrusion Prevention (HIPS)
  • Firewall only allows inbound port 25 and outbound ports 25, 80, 443

This exercise and challenge are used to show real adversary traces across host systems, system memory, hibernation/pagefiles, and more:

  • Phase 1 - Patient zero compromise and malware C2 beacon installation
  • Phase 2 - Privilege escalation, lateral movement to other systems, malware utilities download, installation of additional beacons, and obtaining domain admin credentials
  • Phase 3 - Search for intellectual property, profile network, dump email, dump enterprise hashes
  • Phase 4 - Collect data to exfiltrate and copy to staging system. Archive data using .rar and a complex passphrase
  • Phase 5 - Exfiltrate .rar files from staging server, perform cleanup on staging server

"THIS WAS PROBABLY THE MOST COMPREHENSIVE AND USEFUL OF ALL THE TRAINING I HAVE EVER RECEIVED BY SANS." - DoD Student, USAF

"THE SANS508 COURSE EXCEEDED MY EXPECTATIONS IN EVERY WAY. IT PROVIDED ME THE SKILLS, KNOWLEDGE, AND TOOLS TO EFFECTIVELY RESPOND TO AND HANDLE APTS AND OTHER ENTERPRISE WIDE THREATS." -Josh Moulin NSTEC/NNSA/DOE

"THE EXAMPLES IN THE COURSE RELATE TO WHAT I NEED TO KNOW TO DEAL WITH REAL WORLD THREATS." -Tim Weaver, Digital Mtn. Inc.

"I WAS SURPRISED AND AMAZED AT HOW EASY IT IS TO DO MEMORY ANALYSIS AND HOW HELPFUL IT IS." - Brian Dugay, Apple

"THE LEVEL OF DETAIL IS AMAZING. THE METHODOLOGY IS CLEARLY EFFECTIVE AT FINDING PERTINENT ARTIFACTS." - Anonymous

"I'VE TAKEN OTHER NETWORK INTRUSION CLASSES BUT NOTHING THIS IN-DEPTH. THE CLASS IS OUTSTANDING!" - Craig Goldsmith, FBI

"CUTTING EDGE EXPERTISE TAUGHT BY WORLD CLASS EXPERTS." -Joseph Murray, Deloitte

"I AM A DIFFERENT MAN AS A RESULT OF THIS COURSE." - Travis Farral, XTO Energy

"ABSOLUTELY ESSENTIAL KNOWLEDGE. TRADITIONAL KNOWLEDGE IS USEFUL, BUT THIS COURSE PROVIDES THE PRACTICAL SIDE OF A GROWING TREND." -Erik Musick, Arkansas State Police

"THIS IS A GREAT CLASS AND SHOULD BE MANDATORY FOR ANYONE IN THE FORENSIC FIELD. GREAT JOB, ROB!" -Mark Merchant, State of Alaska/State Security Office

"COME PREPARED TO LEARN A LOT." -Todd Black Lee, The Golden 1 Credit Union

"YOU CAN DELETE IT, HIDE IT, RENAME IT, BUT WE WILL FIND IT." -Edward Fuller, Department of Defense

"GREAT COURSE! THIS NOT ONLY HELPS ME IN FORENSICS BUT ALSO IN CREATING USE-CASES FOR OUR OTHER INTRUSION ANALYSIS TOOLS." -Joseph Murray, Deloitte

"IT IS HARD TO REALLY SAY SOMETHING THAT WILL PROPERLY CONVEY THE AMOUNT OF MENTAL GROWTH I HAVE EXPERIENCED THIS WEEK." -Travis Farral, XTI Energy

"EXCELLENT COURSE, INVALUABLE HANDS-ON EXPERIENCE TAUGHT BY PEOPLE WHO NOT ONLY KNOW THE TOOLS AND TECHNIQUES, BUT KNOW THEIR QUIRKINESS THROUGH PRACTICAL, REAL-WORLD EXPERIENCE." -John Alexander, US Army

"THIS COURSE (FOR508) REALLY TAKES YOU FROM 0-60 IN UNDERSTANDING THE CORE CONCEPTS OF FORENSICS, ESPECIALLY THE FILE SYSTEM." -Matthew Harvey, U.S. Department of Justice

"IF YOU NEED TO TRACK DOWN WHAT HAPPENED IN YOUR ENVIRONMENTS, THIS IS A MUST HAVE COURSE!" -Fran Moniz, American National Insurance

"THE CAPSTONE EXERCISE IS AWESOME, PUTS TRACKING THE APT INTO PRACTICE." -Gavin Worden, SD-LECC

"BEST FORENSICS TRAINING I'VE HAD SO FAR. I THOUGHT THE SOME OTHERS COURSES WERE GREAT BUT 508 IS A LOT MORE CURRENT AND APPLICABLE TO THE REAL WORLD! EXCELLENT COURSE AND INSTRUCTOR OVERALL!" -Marc Bleicher, Bit9

"THE MORE I PROGRESS THROUGH THE COURSE, THE MORE I REALIZE JUST HOW MUCH CAPACITY THERE IS TO PRODUCE ANSWERS TO TOUGH QUESTIONS. WHERE I MIGHT NOT HAVE FOUND SUPPORTING EVIDENCE IN PAST CASES, I FEEL I HAVE SO MANY NEW AVENUES TO EXPLORE. A REAL EYE-OPENER. I ALSO GREATLY APPRECIATE THE FOCUS ON INCIDENT RESPONSE." - Dave Ockwell-Jenner, SITA

"I HAVE ALREADY USED SEVERAL OF THE TOOLS/TECHNIQUES FROM THE COURSE WITH PAST-CASE EVIDENCE TO UNCOVER THINGS I DID NOT PREVIOUSLY KNOW." - Dave Ockwell-Jenner, SITA

"MY SOC FOCUSES A LOT ON INCIDENT RESPONSE AND QUICK FORENSICS, SO THE COURSE MATERIAL IS EXTREMELY VALUABLE." - Anonymous

"I ROUTINELY PERFORM LIVE MEMORY CAPTURES AND HAVE GONE THROUGH THEM LOOKING FOR THE OBVIOUS, BUT I HAD NO IDEA, UNTIL FOR508, HOW MANY ARTIFACTS ARE CONTAINED IN RAM." - M Scott Saul, FBI

"THE SANS INSTITUTE IS CURRENTLY THE LEADER IN THE COMMERCIAL IR AND COMPUTER FORENSIC TRAINING MARKET. THEY HAVE A LARGE NUMBER OF QUALITY COURSES." - Luttgens, Jason; Pepe, Matthew; Mandia, Kevin. Incident Response & Computer Forensics, Third Edition - July 2014

"YOU HAVE THE CONTENT WHICH IS CLOSE TO REAL WHEN YOU HAVE THE INSTRUCTOR THAT GOES INTO A LOT OF REAL WORLD EXAMPLES. JUST GREAT." - Anonymous

"FOR508 COMBINED WITH FOR572 SHOWS A COMPLETE PICTURE FROM DISK SIDE TO NETWORK SIDE." - Dow Shirley, Energy Solutions

"MOST IN-DEPTH, STATE OF THE ART IR COURSE I CAN IMAGINE. FIRST TIME I THINK DEFENSE CAN ACTUALLY GAIN AN ADVANTAGE. THANK YOU." - Kai Thomsen, AUDI AG

FULL REVIEW AND WRITE UP OF FOR508 BY DAVID NIDES, KPMG-

PRESS ARTICLES ABOUT THE NEW FOR508 COURSE:

Should I take SANS 408 or 508? (part 1) - http://digitalforensicstips.com/category/training_reviews/

SANS 508 Compared to 408 Part Two (part 2) - http://digitalforensicstips.com/2013/04/sans-508-compared-to-408-part-two-plus-a-side-of-610/

Statements From Our Authors

"In describing the advanced persistent threat (APT) and advanced adversaries, many experts have said, 'There are people smarter than you, who have more resources than you, and who are coming for you. Good luck with that.' They were not joking. The results over the past several years clearly indicate that hackers employed by nation-states and organized crime are racking up success after success. The APT has compromised hundreds of organizations. Organized crime organizations using botnets are exploiting Automated Clearing House (ACH) fraud daily. Similar groups are penetrating banks and merchants, stealing credit card data. Fortune 500 companies are beginning to detail data breaches and hacks in their annual stockholder reports.

"In other words, the enemy is getting better and bolder, and their success rate is impressive.

"We can stop them, but to do so, we need to field more sophisticated incident responders and digital forensics investigators. We need lethal digital forensics experts who can detect and eradicate advanced threats immediately. A properly trained incident responder could be the only defense your organization has left during a compromise. Forensics 508: Advanced Digital Forensics, Incident Response, and Threat Hunting is crucial training for you to become the lethal forensicator who can step up to these advanced threats. The enemy is good. We are better. This course will help you become one of the best."

- Rob Lee

"We live in a world of unimaginable amounts of data stored on immensely large and complicated networks. Our adversaries use this complexity against us to slice through our defenses and take virtually anything they want, anytime they want it. While this is our current state, it will not be our future. Incident response is at an inflection point. Old models are being upgraded to make defenders more effective and nimble in response to more sophisticated and aggressive attackers. The most successful incident response teams are evolving rapidly due to near-daily interaction with adversaries. New tools and techniques are being developed, providing better visibility and making the network more defensible. There are an increasing number of success stories, with organizations quickly identifying intrusions and rapidly remediating them.

We created this course to build upon those successes. Like the field itself, the course is continuously updated, bringing the latest advances into the classroom. Whether you are just moving into the incident response field or are already leading hunt teams, FOR508 facilitates learning from others' experiences and develops the necessary skills to take you to the next level."

- Chad Tilbury