Just quick note that I have updated:
- PESectionExtractor. It’s just a minor fix to make it parse PE32+ files.
- PECluester. Again, it’s just a minor fix for parsing the arguments + dates.
Just quick note that I have updated:
Have you ever heard of SCCM?
Yes?
You probably know what I am going to talk about.
No?
Well, you are going to like it.
It’s been a few years since I discovered this gem and successfully used it for Incident Response work.
Cutting long story short, SCCM (System Center Configuration Manager) is a a configuration platform that helps to manage large networks of computers. On top of typical admin tasks, it also can regularly gather information from the systems including very interesting artifacts e.g. file lists.
Now you know where this post is heading.
Having a database of artifacts from the system, a snapshot, if you will gives the company a very powerful tool for both individual system analysis and a global view of all the files stored across the company (when I say ‘all’ here, it usually means a subset, e.g. .exe; this is due to performance hit and database size limitations; talk to your SCCM admin guys to find out what you have).
So, what potentially can you do then with SCCM?
Let me list a few interesting properties of this system:
Accessing SCCM gives the IR folk many opportunities to access very interesting data useful for a daily IR work; to give you a couple of ideas, let’s run through a couple of scenarios one can utilize SCCM for:
Well, that’s it. If you don’t use SCCM yet you better have a good chat with your admins. The chances are that you may actually start using it on regular basis and generate a series of ‘quick wins’ which will not only please your bosses, but more importantly – improve the security of your company.