How To Analyze Data From Azure VMs In Magnet AXIOM Cyber

Jamie McQuaid: Hello everyone, Jamie McQuaid from Magnet Forensics here with a quick video to show you how to do an Azure acquisition using Magnet AXIOM Cloud.

So, we’ve got AXIOM up here ready to go. So I’m going to go to ‘Evidence sources’, we’re going to go over to ‘Cloud’, and choose a cloud evidence just like any other cloud evidence. And you can see we’ve got a huge list of sources that we can grab, and Azure is here, all alphabetical.

Click on Azure. It’ll ask you to sign in. Now first, you need to have all this information. It requires a bit of prep work beforehand if you’ve never done it before. If you haven’t, click on this link: it tells you how to get all these details: Application ID, Tenant ID, Subscription ID, Client secret. All of these are required from either Azure admin or, if you are the Azure admin, you have to get them yourself.

Now, let me bring this over here to give you a quick rundown of it. We’ve got a great how-to article here to show you how to get all of those details. So how to create a role; accessing the CLI; all of that sort of stuff; verifying it… and it allows you to get all of the required information that you need: client secret, app IDs, excursion IDs. I’m not going to walk you through how to do that; that would depend on your environment and where you’re pulling from on how to set that up. But like I said: if you’ve got an admin, ask them for this type of information, you can provide them with this document; if you are the admin, follow the steps, and it should be pretty straightforward.

So let’s get up and start doing our acquisition. Now, I’ve already got this ready, so I’m going to pause the video and load in my details here and hit ‘Sign in.’ So, just one second….


Get The Latest DFIR News

Join the Forensic Focus newsletter for the best DFIR articles in your inbox every month.


Unsubscribe any time. We respect your privacy - read our privacy policy.

OK, so it’s signed in, and we can see it’s pulled up this description that we want, and all of the details here. So again, a bit of detail for us: we’ve got a few VMs to grab, and this will pull down a VM. You can see they’re pretty big. You know, these are basically virtual machines that you’re going to be pulling down here. So, be prepared. The time it takes is going to be reflective of the time it takes to download that much data over your internet connection, at the very least.

And just be aware that there [are] some costs associated with this depending on your setup and how you’re pulling it down, so just be aware of that, in terms of storing the image or downloading it as well. So just be aware that there are additional costs to it. The default is to remove the image from the container. That’s usually what I leave, but if you want to leave it up there for completion’s sake, you can leave that up there.

So I’ve got a new VHD test here, just a sample one, this is a Linux image, 30GB. So I’m going to select that, hit ‘Next,’ and it adds in as a source.

Now from here, we can do everything that we normally would do. We can add other sources; we can go back into the cloud and add something else; we can do that AWS acquisition that we need to do; whatever you need to do. It might be good – just because it’s a very big download – to just do this one once, but if you’ve got multiple sources, you can easily add them in. I’m not going to go through the other items here.

I’m just going to go down to ‘Cloud artifacts.’ You can see all the cloud artifacts there, but obviously, we’d look for specific ones for that VM.

Hit ‘Go,’ ‘Analyze evidence,’ and it’ll start analyzing that data. Like it is now: this one’s 30GB, so however long it takes to download 30GB over my internet connection, that’s probably how long it’s going to take. It’s going to first create the data, and then download it. And then I’m just going to pause the video here and come back when it’s finished.

OK, we’re back and the search has completed. It took about 37 minutes or so to download and process the image. So with that, we’ve got a case up and ready. It processed… it was a Linux image, so it processed all of the artifacts and the file system as need be.

Just to take a quick look, we can see what actually got acquired here. You’ve got the JSON details, the zip of it, but if you drop dive in here, we can take a look at the VHD image here. It’s a bunch of folders deep, because Azure will create a bunch of folders to house the VM, and then AXIOM will as well, so it’s a few extra folders deep, but you’ll see as you dive in, you’ll get a VHD virtual machine image.

Now, you could open that up with a bunch of other tools too, as long as they… whether they’re forensics tools or other tools, as long as they support VHD images; or AXIOM can handle VMs and VHDs fine on its own, so if you receive a VHD and you didn’t do the acquisition, you can load the VHD itself in as an image. Either way – whether you use AXIOM for the acquisition or something else for the acquisition – you can load those in. And it’s basically just a snapshot of that VM at that given point in time.

Now, on the cloud it would have stored it, and then deleted it, based on our settings. And at the end, you get some basic case summaries here. The VM’s here, and we can go into the artifacts and you can see the regular artifacts that you would normally get in whatever image we’re looking at. Like I said, this one’s not a very large one, it was just a 30GB sample image that I used so that you can see anything that could be valuable there.

So, that’s how you do an Azure acquisition with AXIOM Cloud. Thanks for watching.

Leave a Comment

Latest Videos

In this episode of the Forensic Focus podcast, Desi and Si discuss different online programming courses and what they think about the popular platform, Udemy. They also talk about Flipper, Dev boards, and Raspberry Pi, and delve into the fascinating phenomenon of running the classic game Doom on unlikely devices.

Throughout the episode, Desi and Si share their digital forensics expertise, referencing some of the cases they have been working on and highlighting particular methodologies and technologies that have an impact on cybersecurity.

Show Notes:

100 Days of Code: The Complete Python Pro Bootcamp for 2023 - https://www.udemy.com/course/100-days-of-code/

Domestika - https://www.domestika.org/en

MIT OpenCourseWare - https://www.youtube.com/@mitocw 

MasterClass - https://www.masterclass.com/

Raspberry Pi 400 Complete Kit - https://core-electronics.com.au/raspberry-pi-400-kit.html

Flipper Discord - https://discord.com/invite/flipper

Flipper Zero - https://flipperzero.one/

This Programmer Figured Out How to Play Doom on a Pregnancy Test - https://www.popularmechanics.com/science/a33957256/this-programmer-figured-out-how-to-play-doom-on-a-pregnancy-test/

Here’s a dude playing Doom Eternal on his fridge - https://www.polygon.com/2020/10/13/21514933/doom-eternal-refrigerator-door-samsung-smart-refrigerator-xbox-game-pass-richard-mallard

Doom hacker gets Doom running in Doom - https://www.pcgamer.com/doom-hacker-gets-doom-running-in-doom/

Doom Running On A Calculator Powered By Old Potatoes - https://kotaku.com/doom-running-on-a-calculator-powered-by-old-potatoes-1845374069

GoldenEra - https://www.imdb.com/title/tt11753760/

Racing the Beam - https://en.wikipedia.org/wiki/Racing_the_Beam

High Score (TV series) - https://en.wikipedia.org/wiki/High_Score_(TV_series)

Microcontroller Courses (Udemy) - https://www.udemy.com/topic/microcontroller/

The story of Final Fantasy XIV’s renegade do-good modders - https://www.pcgamesn.com/final-fantasy-xiv/ffxiv-modders-renegade-do-gooders

Logical fallacies - https://yourlogicalfallacyis.com/

In this episode of the Forensic Focus podcast, Desi and Si discuss different online programming courses and what they think about the popular platform, Udemy. They also talk about Flipper, Dev boards, and Raspberry Pi, and delve into the fascinating phenomenon of running the classic game Doom on unlikely devices.

Throughout the episode, Desi and Si share their digital forensics expertise, referencing some of the cases they have been working on and highlighting particular methodologies and technologies that have an impact on cybersecurity.

Show Notes:

100 Days of Code: The Complete Python Pro Bootcamp for 2023 - https://www.udemy.com/course/100-days-of-code/

Domestika - https://www.domestika.org/en

MIT OpenCourseWare - https://www.youtube.com/@mitocw

MasterClass - https://www.masterclass.com/

Raspberry Pi 400 Complete Kit - https://core-electronics.com.au/raspberry-pi-400-kit.html

Flipper Discord - https://discord.com/invite/flipper

Flipper Zero - https://flipperzero.one/

This Programmer Figured Out How to Play Doom on a Pregnancy Test - https://www.popularmechanics.com/science/a33957256/this-programmer-figured-out-how-to-play-doom-on-a-pregnancy-test/

Here’s a dude playing Doom Eternal on his fridge - https://www.polygon.com/2020/10/13/21514933/doom-eternal-refrigerator-door-samsung-smart-refrigerator-xbox-game-pass-richard-mallard

Doom hacker gets Doom running in Doom - https://www.pcgamer.com/doom-hacker-gets-doom-running-in-doom/

Doom Running On A Calculator Powered By Old Potatoes - https://kotaku.com/doom-running-on-a-calculator-powered-by-old-potatoes-1845374069

GoldenEra - https://www.imdb.com/title/tt11753760/

Racing the Beam - https://en.wikipedia.org/wiki/Racing_the_Beam

High Score (TV series) - https://en.wikipedia.org/wiki/High_Score_(TV_series)

Microcontroller Courses (Udemy) - https://www.udemy.com/topic/microcontroller/

The story of Final Fantasy XIV’s renegade do-good modders - https://www.pcgamesn.com/final-fantasy-xiv/ffxiv-modders-renegade-do-gooders

Logical fallacies - https://yourlogicalfallacyis.com/

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_5f72B6DD5wk

Programming Languages, Flipper And Gaming

Forensic Focus 24th May 2023 11:43 am

In this episode of the Forensic Focus podcast, Si and Desi talk to Mackenzie Jackson, Developer Advocate at Git Guardian. 

Mackenzie discusses the problem of hard-coded and leaked credentials in Git repositories, the task of scanning Git repositories for leaked credentials, and how that’s helped by the setup of GitHub and Git. 

He also looks at some public and private cases of security breaches through Git repositories and recommends tools you can use to combat attackers on Git. 

Show Notes:

Toyota Suffered a Data Breach by Accidentally Exposing A Secret Key Publicly On GitHub (GitGuardian) - https://blog.gitguardian.com/toyota-accidently-exposed-a-secret-key-publicly-on-github-for-five-years/

GitHub.com rotates its exposed private SSH key (Bleeping Computer) - https://www.bleepingcomputer.com/news/security/githubcom-rotates-its-exposed-private-ssh-key/

Conpago - https://www.conpago.com.au/

Source Code as a Vulnerability - A Deep Dive into the Real Security Threats From the Twitch Leak (GitGuardian) - https://blog.gitguardian.com/security-threats-from-the-twitch-leak/

Teenagers Leveraging Insider Threats: Lapsus$ Hacker Group (Forbes) - https://www.forbes.com/sites/emilsayegh/2023/03/15/teenagers-leveraging-insider-threats-lapsus-hacker-group

Lapsus$: Oxford teen accused of being multi-millionaire cyber-criminal (BBC) - https://www.bbc.co.uk/news/technology-60864283

Dynamic Secrets (HashiCorp) - https://developer.hashicorp.com/vault/tutorials/getting-started/getting-started-dynamic-secrets

Crappy code, crappy Copilot. GitHub Copilot is writing vulnerable code and it could be your fault (GitGuardian) - https://blog.gitguardian.com/crappy-code-crappy-copilot/

trufflesecurity/trufflehog (GitHub) - https://github.com/trufflesecurity/trufflehog

gitleaks/gitleaks (GitHub) - https://github.com/gitleaks/gitleaks

Git (Wikipedia) - https://en.wikipedia.org/wiki/Git

awslabs/git-secrets (GitHub) - https://github.com/awslabs/git-secrets

In this episode of the Forensic Focus podcast, Si and Desi talk to Mackenzie Jackson, Developer Advocate at Git Guardian.

Mackenzie discusses the problem of hard-coded and leaked credentials in Git repositories, the task of scanning Git repositories for leaked credentials, and how that’s helped by the setup of GitHub and Git.

He also looks at some public and private cases of security breaches through Git repositories and recommends tools you can use to combat attackers on Git.

Show Notes:

Toyota Suffered a Data Breach by Accidentally Exposing A Secret Key Publicly On GitHub (GitGuardian) - https://blog.gitguardian.com/toyota-accidently-exposed-a-secret-key-publicly-on-github-for-five-years/

GitHub.com rotates its exposed private SSH key (Bleeping Computer) - https://www.bleepingcomputer.com/news/security/githubcom-rotates-its-exposed-private-ssh-key/

Conpago - https://www.conpago.com.au/

Source Code as a Vulnerability - A Deep Dive into the Real Security Threats From the Twitch Leak (GitGuardian) - https://blog.gitguardian.com/security-threats-from-the-twitch-leak/

Teenagers Leveraging Insider Threats: Lapsus$ Hacker Group (Forbes) - https://www.forbes.com/sites/emilsayegh/2023/03/15/teenagers-leveraging-insider-threats-lapsus-hacker-group

Lapsus$: Oxford teen accused of being multi-millionaire cyber-criminal (BBC) - https://www.bbc.co.uk/news/technology-60864283

Dynamic Secrets (HashiCorp) - https://developer.hashicorp.com/vault/tutorials/getting-started/getting-started-dynamic-secrets

Crappy code, crappy Copilot. GitHub Copilot is writing vulnerable code and it could be your fault (GitGuardian) - https://blog.gitguardian.com/crappy-code-crappy-copilot/

trufflesecurity/trufflehog (GitHub) - https://github.com/trufflesecurity/trufflehog

gitleaks/gitleaks (GitHub) - https://github.com/gitleaks/gitleaks

Git (Wikipedia) - https://en.wikipedia.org/wiki/Git

awslabs/git-secrets (GitHub) - https://github.com/awslabs/git-secrets

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_BX15Z_xF8mA

Preventing Data Leaks With Git Guardian

Forensic Focus 3rd May 2023 11:07 am

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.

Latest Articles

Share to...