If the system is powered off:
- Create image of all storage devices.
- If encrypted: Try to get the (backup) encryption keys and make an image of the decrypted image too.
If the system is active:
- Perform live analysis
- Perform memory dump, if possible.
- Perform network analysis, if possible.
- On another network device.
- Or wireshark
- Or at least some network commands, e.g.
lsof -i,netstat, …
- Check if hard drive can be analysed after shutdown.
If the system is a VM:
- Determine hypervisor
- Create snapshot
- of hard drive
- of RAM/memory, if possible
- Export data/snapshots (not just the last one!)
Other systems:
- If other network devices are logging something (firewalls, proxies), store/save/lock it.
- If there is a SIEM, store/save/lock data from it.
- If there is a central logging server, store/save/lock the data.
Questions:
- How do I could conclude that there was no incident?
- How should I priotorize?
- What are indicators of compromise (IOC) for which I should look for?
Leave a Reply
You must be logged in to post a comment.