Forensic Workstation/Lab (pt. 1 Overview)

Forensic Workstation/Lab (pt. 1 Overview)

Part 1: Overview
Part 2: pfSense

I ran across Hacking&Coffee's post Red Team Laptop & Infrastructure (pt 1: Architecture) during research for SIFT Workstations and virtual technology. The blog post goes into great degree of explaining the overall architecture of the system which contains the following VMs:

  • pfSense
  • Windows (Corp related stuff)
  • Attack VMs (kali)
  • Untrusted VMs (basically non-related Corp stuff)

Each set of VMs is setup in different security zones connected to pfSense. pfSense provides excellent traffic segregation and enforces traffic where it needs to go. What I do enjoy about this setup is the ability to scale it up using other network, local, or cloud resources providing complete control over traffic paths.

I had been looking for a Forensic Workstation/Lab when I found the post and decided to do something similar for forensics (or even 'blue team' stuff) in relation to the same context as from this site. I decided my list of requirements would be as follows:

  • Segregated VM zones through pfSense
  • Primary VM (s) (similar to the Corp above) -- probably one Windows and one Linux
  • Ephemeral VMs:
    • SIFT Workstation VM(s)
    • REMnux VM(s)
    • BlackArch/Kali VM(s)
    • General Linux VMs
  • Ability to spin-up VMs as required
  • Some VMs should completely destroy themselves with ease
  • Local storage connected to VMs as required for evidence gathering

Why would I want 'ephemeral' VMs? I think this provides the best way to keep each different class of VM clean every time without dealing with extra cleanup states and configurations.

Currently, I am looking at a few different technologies to accomplish this task:

  • Vagrant - VM orchestration
  • Ansible - VM configuration/control
  • Docker - ephemeral VMs/light weight

In the article above, they use cloned-linked VMs to save space; however, I really want even smaller footprints which is why I want to use Docker. REMux does run some tools inside of docker already within the VM and I need to see how this will work with Docker-in-Docker problem.

More to follow as I decide my overall layout of the VMs and tools to use.