Tracking Hackers on Your Network with Sysinternals Sysmon
|
|
|
- Vincent Wilkerson
- 9 years ago
- Views:
Transcription
1 HTA-W05 Tracking Hackers on Your Network with Sysinternals Sysmon Mark Russinovich CTO, Microsoft Azure Microsoft
2 Windows Forensic Monitoring Limitations When attackers or malware get on your network, you need to construct a timeline What was the entry point? Did it spread between systems? What happened on a particular system? Built-in Windows tooling make it hard to answer these questions: Limited information captured for process creates and DLL loading Network connection information simultaneously too limited and verbose No way to capture common attacker behavior (e.g. thread injection) 2
3 Sysinternals Sysmon (System Monitor) Background system monitoring utility Record system events to the Windows event log Can be used for system anomaly detection Forensics can trace intruder activity across the network I wrote it for use within Microsoft corporate network To understand attacker behavior and tools Significant contributions by Thomas Garnier Free download from Sysinternals.com
4 Agenda Sysmon Overview Architecture and Advanced Filtering System Forensics Network Analysis Tips 4
5 Sysmon Overview 5
6 Sysmon Command-Line Usage Installation: sysmon -i -accepteula [options] Extracts binaries into %systemroot% Registers event log manifest Enables default configuration Viewing and updating configuration: sysmon -c [options] Updates take effect immediately Options can be basic options or a configuration file Register event manifest for viewing logs only: sysmon -m Uninstall: sysmon -u 6
7 Sysmon Events Category Event ID Process Create 1 Process Terminated 5 Driver Loaded 6 Image Loaded 7 File Creation Time Changed 2 Network Connection 3 CreateRemoteThread 8 RawAccessRead* 9 Sysmon Service State Change 4 Error 255 *Contributed by David Magnotti 7
8 Basic Configuration Options Installing with no options logs all the following with SHA1 hashes where applicable: Process create, Process terminate, Driver loaded, File creation time changed, RawAccessRead, CreateRemoteThread, Sysmon service state changed Additional basic options: Option 8 Description -h [SHA1] [MD5] [SHA256] [IMPHASH] [*] Hash algorithm(s) -n [process, ] Logs network events -l [process, ] Logs image load events -- Restores default configuration (-c only)
9 Hashes and VirusTotal You can extract a hash and paste it into VT search for a report: 9
10 Advanced Configuration Basic options are limited: Cannot disable events via basic options (e.g. CreateRemoteThread, RawAccessRead) Advanced filtering not possible (e.g. process name filters) Sysmon configuration file supports all configuration options: install: sysmon -i -accepteula c:\sysmonconfig.xml update: sysmon -c c:\sysmonconfig.xml 10
11 Configuration File Schema Schema version: current is 2.01 (RawReadAccess added) HashAlgorithms: Applies to all events * for all hash types EventFiltering: Flexible filtering rules If event type not specified, default capture rule applies 11
12 Event Tags Each event is specified using its tag Onmatch can be include or exclude Include and exclude refer to filter effect Filters described later <tag onmatch= include > <include filter/> </tag> <tag onmatch= exclude > <exclude filter/> </tag> Tags ProcessCreate ProcessTerminate FileCreateTime NetworkConnect DriverLoad ImageLoad CreateRemoteThread RawAccessRead 12
13 Event Tags With No Filters Useful for enabling specific event types If no filter, onmatch has opposite effect: Include: don t log any events Exclude: log all events of the tag type This configuration enables the following: ProcessCreate: because of onmatch exclude ProcessTerminate: because it is omitted and by default enabled 13
14 Architecture and Advanced Filtering 14
15 Sysmon Architecture Windows service and device driver (~1.5 MB total) Single binary includes 32-bit and 64-bit versions of both Service doubles as command-line frontend Configuration stored in HKLM\System\CCS\Services\SysmonDrv\Parameters Sysmon (Cmd) Sysmon (Service) User Mode Kernel Mode SysmonDrv 15
16 Advanced Filtering Filters are specified as event field conditions: Field is any field in event schema Condition types can be used with any field <eventtag onmatch= include > <field condition= conditiontype >value</field> </eventtag> ConditionType is Is not contains excludes begin with end with less than more than image 16
17 Process Events Generated from PsSetCreateProcessNotifyRoutine PsSetCreateThreadNotifyRoutine Image, command line, etc. captured from PEB Hashes captured by driver ProcessGuid, LogonGuid uniquely identify process (PID and LogonId can be reused) ProcessCreate UtcTime ProcessGuid ProcessId Image CommandLine CurrentDirectory User LogonGuid LogonId TerminalSessionId IntegrityLevel Hashes ParentProcessGuid ParentProcessId ParentImage ParentCommandLine ProcessTerminate UtcTime ProcessGuid ProcessId Image 17
18 Image and Driver Loaded Generated from PsSetLoadImageNotifyRoutine Hash captured by driver Signature captured by service Image is process image ImageLoaded is driver/dll image ImageLoaded UtcTime ProcessGuid ProcessId Image ImageLoaded Hashes Signed Signatures DriverLoaded UtcTime ImageLoaded Hashes Signed Signature 18
19 File Events Generated by file system mini-filter File timestamps commonly changed by attackers covering their tracks Dropped files blend in Altered files appear unchanged Watch for false positives: ZIP extractors change timestamps to match source files Browsers change timestamps to match original file download File Creation Time Changed UtcTime ProcessGuid ProcessId Image TargetFileName CreationUtcTime PreviousCreationUtcTime 19
20 Network Events Generated by service ETW tracing Both UDP and TCP Includes DNS and port name resolution Initiated indicates process initiated TCP connection Recorded on first process+source+dest tuple observed 20 Network Connection Detected UtcTime ProcessGuid ProcessId Image User Protocol Initiated SourceIsIpv6 SourceIp SourceHostName SourcePort SourcePortName DestinationIsIpv6 DestinationIp DestinationHostName DesinationPort DesinationPortName
21 Thread Events Generated from PsSetCreateThreadNotifyRoutine when source process different from thread process Start module determined from thread start address mapping to PEB loaded module list Start function is reported if exact match to function in image export table Common for malware injecting code into another process To cover tracks To easily operate in target address space There can be false positives: debuggers, crash dumps 21 CreateRemoteThread Detected UtcTime SourceProcessGuid SourceProcessId SourceImage TargetProcessGuid TargetProcessId TargetImage NewThreadId StartAddress StartModule StartFunction
22 Disk/Volume Read Events Generated from file system mini-filter when volume/disk is opened directly Common for malware bypassing standard security protections/auditing e.g. extracting password hashes from data files RawReadAccess Detected UtcTime ProcessGuid ProcessId Image Device 22
23 Filter Examples Include only Google Chrome network activity: <NetworkConnect onmatch= include"> <Image condition="contains">chrome.exe</image> </NetworkConnect > Include thread injections into winlogon and lsass: <CreateRemoteThread onmatch="include"> <TargetImage condition="image">lsass.exe</targetimage> <TargetImage condition="image">winlogon.exe</targetimage> </CreateRemoteThread > Exclude all Microsoft-signed image loads: <ImageLoad onmatch="exclude"> <Signature condition="contains">microsoft</signature> <Signature condition="contains">windows</signature> </ImageLoad> 23
24 System Forensics: The Case of the Unwanted Software, SONAR 24
25 The Case of My Mom s Chronically Infected PC Mom s PC repeatedly infected with malware Either MS Security Essentials or I would clean it Made her standard user She still got infected
26 The Case of My Mom s Chronically Infected PC Saw from Defender log that malware was using the name drvinst: Where was it coming from? Installed Sysmon to hope to trace the cause Sure, enough, system was reinfected 26
27 The Case of My Mom s Chronically Infected PC Remotely connected and downloaded Sysmon log Searched for drvinst and found MSEE cleaning infection at 9/14/14 4:21 AM, but no suspicious entries nearby:
28 The Case of My Mom s Chronically Infected PC Searched again for drvinst and came across Drvinst-2.exe launch Launched by SwvUpdater, so searched for that
29 The Case of My Mom s Chronically Infected PC Saw entry that showed it was launched by scheduled task:
30 The Case of My Mom s Chronically Infected PC Used Sigcheck to submit it to VirusTotal Many engines flagged it as malicious Sadly, MSEE did not (subsequently submitted to MS) How could I have missed it?
31 The Case of My Mom s Chronically Infected PC: Solved Opened Autoruns and found its scheduled task: Had overlooked it in cleanings because of generic description and valid signature Disabled it: problem solved
32 SONAR Detonation chamber for malware, O365 attachment validation, IE 0-day detection Sysmon logs detect malware escape from Windows, IE and Office sandboxes Sysmon log analysis can lead researchers to escape vulnerability Flash 0-day detected in December: Image CommandLine ParentImage ParentImage CommandLine C:\Program Files\Internet Explorer\iexplore.exe C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe C:\Users\User\AppData\Local\Temp\Low\execb.exe C:\Program Files\Internet Explorer\iexplore.exe SCODEF:512 CREDAT: /prefetch:2 C:\Program Files\Internet Explorer\iexplore.exe cmd /c C:\Program Files\Internet Explorer\iexplore.exe echo set/p="mz">"c:\users\user\appdata\local\temp\low\execb.exe"&type "c:\users\user\appdata\local\temp\low\s">>"c:\users\user\appdata\local\temp\l ow\execb.exe"&"c:\users\user\appdata\local\temp\low\execb.exe" C:\Windows\system32\cmd.exe /S /D /c" set/p="mz" 1>"c:\users\user\appdata\local\temp\low\execb.exe"" "c:\users\user\appdata\local\temp\low\execb.exe" C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files\Internet Explorer\iexplore.exe SCODEF:512 CREDAT: /prefetch:2 C:\Windows\System32\cmd.exe cmd /c echo set/p="mz">"c:\users\user\appdata\local\temp\low\ execb.exe"&type "c:\users\user\appdata\local\temp\low\s">>"c:\users\user \appdata\local\temp\low\execb.exe"&"c:\users\user\appd ata\local\temp\low\execb.exe" C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" set/p="mz" 1>"c:\users\user\appdata\local\temp\low\execb.exe"" C:\Windows\System32\mshta.exe C:\Windows\system32\mshta.exe " c:\users\user\appdata\local\temp\low\execb.exe "c:\users\user\appdata\local\temp\low\execb.exe"
33 Network-Wide Monitoring: Splunk, Microsoft Operations Management Suite 33
34 Splunk Splunk enables collection and rich queries of Sysmon data Configuring Splunk for Sysmon ( Install Splunk universal forwarder on Sysmon systems Install Splunk Sysmon TA on search heads Set Sysmon configuration to exclude Splunk binaries <Image condition= end with">splunk</image> <Image condition= end with">msg_replay.exe</image>
35 Splunk Example Queries See Processes grouped by logon GUID: sourcetype="xmlwineventlog:microsoft-windows-sysmon/operational" EventCode=1 NOT User="NT AUTHORITY\\SYSTEM" stats values(user) as User,values(CommandLine) as CommandLine,values(ProcessId) as ProcessId,values(ParentProcessId) as ParentProcessId values(parentcommandline) as ParentCommandLine by LogonGuid Outbound connections by process: sourcetype="xmlwineventlog:microsoft-windows-sysmon/operational" EventCode=3 Protocol=tcp Initiated=true eval src=if(isnotnull(sourcehostname), SourceHostname+":"+SourcePort, SourceIp+":"+SourcePort) eval dest=if(isnotnull(destinationhostname), DestinationHostname+":"+DestinationPort, DestinationIp+":"+DestinationPort) eval src_dest=src + " => " + dest stats values(src_dest) as Connection by ProcessGuid ProcessId User Computer Image Command line for non-local connections: sourcetype="xmlwineventlog:microsoft-windows-sysmon/operational" EventCode=3 Protocol=tcp Initiated=true where DestinationIp!=" " AND DestinationHostname!=SourceHostname table _time User Computer ProcessId ProcessGuid DestinationHostname DestinationPort join type=inner [search sourcetype="xmlwineventlog:microsoft-windowssysmon/operational" EventCode=1 table _time ProcessGuid ProcessId CommandLine] 35
36 Operations Management Suite OMS System monitoring and configuration for Windows and Linux systems (VMs, physical, cloud, etc.) Includes support for agent that can forward arbitrary logs to Operational Insights service Logs can be used for: Standing dashboard queries Visualization Ad-hoc exploration 36
37 Best Practices and Tips 37
38 Best Practices and Tips Install it on all your systems Proven at scale Data will be there when you need it for DFIR Configure all event types for maximum visibility Filter out noise, especially uninteresting image loads Test overhead on mission-critical systems Make sure event log is large enough to capture desired time window Forward events off box To prevent deletion by attackers For analyzing aggregate network behavior For tracing activity between systems (e.g. pass-the-hash) 38
39 Summary Sysmon can give you deep insights into intrusions and infections Send cases, tips and feature requests to Sysmon and other Sysinternals tools are documented in the upcoming Troubleshooting with the Sysinternals Tools 39
Collecting Windows Security Audit Log data with NXLog and Sysmon. Collecting Windows Security Audit Log data with NXLog and Sysmon
Collecting Windows Security Audit Log data with NXLog and Sysmon i Collecting Windows Security Audit Log data with NXLog and Sysmon Collecting Windows Security Audit Log data with NXLog and Sysmon ii Contents
Malware Hunting with the Sysinternals Tools
SESSION ID: HTA-T07R Malware Hunting with the Sysinternals Tools Mark Russinovich CTO, Microsoft Azure Microsoft @markrussinovich When combining the results from all four AV engines, less than 40% of the
Using Process Monitor
Using Process Monitor Process Monitor Tutorial This information was adapted from the help file for the program. Process Monitor is an advanced monitoring tool for Windows that shows real time file system,
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
Storm Worm & Botnet Analysis
Storm Worm & Botnet Analysis Jun Zhang Security Researcher, Websense Security Labs June 2008 Introduction This month, we caught a new Worm/Trojan sample on ours labs. This worm uses email and various phishing
WINDOWS SPLUNK LOGGING CHEAT SHEET - Win 7 - Win2012
This Windows Splunk Logging Cheat Sheet is intended to help you get started setting up Splunk reports and alerts for the most critical Windows security related events. By no means is this list extensive;
Networks and Security Lab. Network Forensics
Networks and Security Lab Network Forensics Network Forensics - continued We start off from the previous week s exercises and analyze each trace file in detail. Tools needed: Wireshark and your favorite
finding malware on compromised Windows machines
S TEVEN ALEXANDER finding malware on compromised Windows machines Steven is a programmer for Merced College. He manages the college s intrusion detection system. [email protected] This article
Stalking Hackers with Core Splunk. Derek Arnold, CISSP Senior Splunk Consultant
Stalking Hackers with Core Splunk Derek Arnold, CISSP Senior Splunk Consultant Your Presenter Derek Arnold 12 years in security Enterprise IT Industries: Retail, medical tech, health insurance Specialties:
Advanced Malware Cleaning Techniques for the IT Professional
Advanced Malware Cleaning Techniques for the IT Professional Mark Russinovich Microsoft Technical Fellow This section of the Microsoft Security Intelligence Report provides information and guidance for
Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA
Configuring Personal Firewalls and Understanding IDS Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA 1 Configuring Personal Firewalls and IDS Learning Objectives Task Statements 1.4 Analyze baseline
Novell Sentinel Log Manager 1.2 Release Notes. 1 What s New. 1.1 Enhancements to Licenses. Novell. February 2011
Novell Sentinel Log Manager 1.2 Release Notes February 2011 Novell Novell Sentinel Log Manager collects data from a wide variety of devices and applications, including intrusion detection systems, firewalls,
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Redline Users Guide. Version 1.12
Redline Users Guide Version 1.12 Contents Contents 1 About Redline 5 Timeline 5 Malware Risk Index (MRI) Score 5 Indicators of Compromise (IOCs) 5 Whitelists 5 Installation 6 System Requirements 6 Install
Amadeus Selling Platform 3.1 P120
Amadeus Selling Platform 3.1 P120 Installation Guide Terminal Server and Citrix Index 1 Introduction... 3 1.1 About this guide... 3 1.2 Intended audience... 3 2 Limitations and requirements... 3 3 Technical
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals
A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals Ae Chan Kim 1, Won Hyung Park 2 and Dong Hoon Lee 3 1 Dept. of Financial Security, Graduate School of Information Security,
McAfee Network Security Platform Administration Course
McAfee Network Security Platform Administration Course Intel Security Education Services Administration Course The McAfee Network Security Platform Administration course from McAfee Education Services
Webapps Vulnerability Report
Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during
Manage Traps in a VDI Environment. Traps Administrator s Guide. Version 3.3. Copyright 2007-2015 Palo Alto Networks
Manage Traps in a VDI Environment Traps Administrator s Guide Version 3.3 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
FortKnox Personal Firewall
FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
TLP: GREEN FBI. FBI Liaison Alert System # A-000049-MW
Liaison Alert System # A-000049-MW The following information was obtained through investigation and is provided in conjunction with the s statutory requirement to conduct victim notification as outlined
NetWrix USB Blocker. Version 3.6 Administrator Guide
NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.
Who DIT It? Detecting and Mitigating Privilege Escalation Attacks on the Active Directory Data Store
Who DIT It? Detecting and Mitigating Privilege Escalation Attacks on the Active Directory Data Store Mike Middleton Justin Prosco Mandiant, A FireEye Company Mike Middleton Principal Consultant Joined
Getting Started With Halo for Windows
Getting Started With Halo for Windows For CloudPassage Halo Protecting your Windows servers in a public or private cloud is much easier and more secure with CloudPassage Halo for Windows. Halo for Windows
Log Processing Tools. PS Tools Suite. PSTools Suite. PSTools Suite
Log Processing Tools Dr. Guillermo A Francia, III Jacksonville State University PS Tools Suite Developed by Mark Russinovich and Dave Solomon of SysInternals A collection of tools for viewing the detailed
Understand Backup and Recovery Methods
Understand Backup and Recovery Methods Lesson Overview Understand backup and recovery methods. In this lesson, you will explore: Backup management Backup options Recovery methods Backup Management Windows
Detecting Malware With Memory Forensics. Hal Pomeranz SANS Institute
Detecting Malware With Memory Forensics Hal Pomeranz SANS Institute Why Memory Forensics? Everything in the OS traverses RAM Processes and threads Malware (including rootkit technologies) Network sockets,
Rally Installation Guide
Rally Installation Guide Rally On-Premises release 2015.1 [email protected] www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
For Splunk Universal Forwarder and Splunk Cloud
Quick Start Guide; For Splunk Universal Forwarder and Splunk Cloud This document details the procedure for manually installing Layer8 software agents, and forwarding data to an existing Splunk Enterprise
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 9 Firewalls and Intrusion Prevention Systems First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Firewalls and Intrusion
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Ekran System Help File
Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/ Fall 2010 Sonja Buchegger [email protected] Lecture 6, Nov. 10, 2010 Firewalls, Intrusion Prevention, Intrusion Detection
WINDOWS PROCESSES AND SERVICES
OBJECTIVES: Services o task manager o services.msc Process o task manager o process monitor Task Scheduler Event viewer Regedit Services: A Windows service is a computer program that operates in the background.
IBM Security QRadar Vulnerability Manager Version 7.2.6. User Guide IBM
IBM Security QRadar Vulnerability Manager Version 7.2.6 User Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 91. Product information
Monitor Network Activity
Monitor Network Activity Panorama provides a comprehensive, graphical view of network traffic. Using the visibility tools on Panorama the Application Command Center (ACC), logs, and the report generation
Using TestLogServer for Web Security Troubleshooting
Using TestLogServer for Web Security Troubleshooting Topic 50330 TestLogServer Web Security Solutions Version 7.7, Updated 19-Sept- 2013 A command-line utility called TestLogServer is included as part
TROUBLESHOOTING GUIDE
TROUBLESHOOTING GUIDE (When using SQL Server 2008 R2) Third edition, (3 Dec 2013) This manual applies to these networked products: Lucid CoPS, Lucid Rapid, LASS 8-11, LASS 11-15 LADS, LADS Plus, Lucid
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper Details: Introduction When computers in a private network connect to the Internet, they physically
Using IPSec in Windows 2000 and XP, Part 2
Page 1 of 8 Using IPSec in Windows 2000 and XP, Part 2 Chris Weber 2001-12-20 This is the second part of a three-part series devoted to discussing the technical details of using Internet Protocol Security
Application for Splunk Enterprise
Application for Splunk Enterprise User Guide Document Version 1.77 28 October 2015 10004-01 EN Rev. A 2015 ThreatConnect, Inc. ThreatConnect is a registered trademark of ThreatConnect, Inc. UNIX is a registered
Things To Do After You ve Been Hacked
Problem: You ve been hacked! Now what? Solution: Proactive, automated incident response from inside the network Things To Do After You ve Been Hacked Tube web share It only takes one click to compromise
Get Started Guide - PC Tools Internet Security
Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools
Medical Device Security Health Group Digital Output
Medical Device Security Health Group Digital Output Security Assessment Report for the Kodak Color Medical Imager 1000 (CMI-1000) Software Version 1.1 Part Number 1G0434 Revision 2.0 June 21, 2005 CMI-1000
Securing Your Business s Bank Account
Commercial Banking Customers Securing Your Business s Bank Account Trusteer Rapport Resource Guide For Business Banking January 2014 Table of Contents 1. Introduction 3 Who is Trusteer? 3 2. What is Trusteer
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
START YOUR INVENTORY WITH SCANFRE
START YOUR INVENTORY WITH SCANFRE April 2014 LANDPARK SCANFREE «Quickly estimate your data processing systems before considering their evolution. Landpark Scanfree, solution for your IT asset tracking
Redline User Guide. Release 1.14
Redline User Guide Release 1.14 FireEye and the FireEye logo are registered trademarks of FireEye, Inc. in the United States and other countries. All other trademarks are the property of their respective
AVG File Server. User Manual. Document revision 2015.08 (23.3.2015)
AVG File Server User Manual Document revision 2015.08 (23.3.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Chapter 14 Analyzing Network Traffic. Ed Crowley
Chapter 14 Analyzing Network Traffic Ed Crowley 10 Topics Finding Network Based Evidence Network Analysis Tools Ethereal Reassembling Sessions Using Wireshark Network Monitoring Intro Once full content
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
Network Intrusion Analysis (Hands-on)
Network Intrusion Analysis (Hands-on) TCP/IP protocol suite is the core of the Internet and it is vital to understand how it works together, its strengths and weaknesses and how it can be used to detect
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
Version 1.7. Inbound Email Integration (POP3 and IMAP) Installation, Configuration and User Guide. Last updated October 2011
Version 1.7 Inbound Email Integration (POP3 and IMAP) Installation, Configuration and User Guide Last updated October 2011 1 Introduction and Overview... 1 2 The Case for Email monitoring... 2 3 Installation
WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
Workshop on Network Traffic Capturing and Analysis IITG, DIT, CERT-In, C-DAC. Host based Analysis. {Himanshu Pareek, himanshup@cdac.
Workshop on Network Traffic Capturing and Analysis IITG, DIT, CERT-In, C-DAC Host based Analysis {Himanshu Pareek, [email protected]} {C-DAC Hyderabad, www.cdachyd.in} 1 Reference to previous lecture Bots
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Fighting Advanced Persistent Threats (APT) with Open Source Tools
Fighting Advanced Persistent Threats (APT) with Open Source Tools What is APT? The US Air Force invented the term in 2006 APT refers to advanced techniques used to gain access to an intelligence objective
AVG File Server 2012. User Manual. Document revision 2012.03 (8/19/2011)
AVG File Server 2012 User Manual Document revision 2012.03 (8/19/2011) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. This
Connection and Printer Setup Guide
Connection and Printer Setup Guide For connection issues, see the following sections of this document: "Connection Requirements" on page 1 "Log on" on page 2 "Troubleshooting Your Connection" on page 4
VERSION 9.02 INSTALLATION GUIDE. www.pacifictimesheet.com
VERSION 9.02 INSTALLATION GUIDE www.pacifictimesheet.com PACIFIC TIMESHEET INSTALLATION GUIDE INTRODUCTION... 4 BUNDLED SOFTWARE... 4 LICENSE KEY... 4 SYSTEM REQUIREMENTS... 5 INSTALLING PACIFIC TIMESHEET
CHAD TILBURY. [email protected]. http://forensicmethods.com @chadtilbury
CHAD TILBURY [email protected] 0 Former: Special Agent with US Air Force Office of Special Investigations 0 Current: Incident Response and Computer Forensics Consultant 0 Over 12 years in the trenches
PC Security and Maintenance
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
PktFilter A Win32 service to control the IPv4 filtering driver of Windows 2000/XP/Server 2003 http://sourceforge.net/projects/pktfilter/
PktFilter A Win32 service to control the IPv4 filtering driver of Windows 2000/XP/Server 2003 http://sourceforge.net/projects/pktfilter/ Jean-Baptiste Marchand [email protected] Contents 1
National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide
National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide NFIRS 5.0 Software Version 5.6 1/7/2009 Department of Homeland Security Federal Emergency Management Agency United States
avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide
avast! Internet Security 7.0 Quick Start Guide 1 Welcome to avast! Internet Security 7.0 The new avast! Antivirus 7.0 brings a range of new features and improvements which make it even faster and even
Microsoft Azure Security and Audit Log Management
Microsoft Azure Security and Audit Log Management Abstract The security logs in Microsoft Azure Cloud Services (which provides Platform as a Service or PaaS) and Virtual Machines (which provides Infrastructure
MaxSea TZ: Microsoft SQL Server problems End User
MaxSea TZ: Microsoft SQL Server problems End User This TechNote applies to MaxSea TimeZero Navigator and Explorer v1.9.5 and above Description: TimeZero uses Microsoft SQL server to manage routes, marks,
Forefront Client Security. Ronald Beekelaar Beekelaar Consultancy [email protected]
Forefront Client Security Ronald Beekelaar Beekelaar Consultancy [email protected] Introductions Presenter Ronald Beekelaar MVP Windows Security MVP Virtual Machine Technology E-mail: [email protected]
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
MALWAREBYTES PLUGIN DOCUMENTATION
Contents Requirements... 2 Installation Scenarios... 2 Malwarebytes 2.xx or 1.75 is already deployed.... 2 Install / Update Malwarebytes Plugin... 3 Configuring Malwarebytes Plugin... 5 About the Screens...
Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices
TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR PROTECTING RETAIL....... POS.... SYSTEMS............................. Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices Who
IBM Security. How BigFix Helps Investigate a Threat in Forensic Activities IBM
IBM Security How BigFix Helps Investigate a Threat in Forensic Activities IBM Document Author, Contributors, and Reviewers AUTHOR: Cristina Bonanni CONTRIBUTORS: Bernardo Pastorelli, Bradford Fisher, Rosario
AVG File Server 2013. User Manual. Document revision 2013.03 (11/13/2012)
AVG File Server 2013 User Manual Document revision 2013.03 (11/13/2012) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. This
International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
Ipswitch Client Installation Guide
IPSWITCH TECHNICAL BRIEF Ipswitch Client Installation Guide In This Document Installing on a Single Computer... 1 Installing to Multiple End User Computers... 5 Silent Install... 5 Active Directory Group
USER GUIDE WWPass Security for Windows Logon
USER GUIDE WWPass Security for Windows Logon December 2015 TABLE OF CONTENTS Chapter 1 Welcome... 3 Introducing WWPass Security for Windows Logon... 4 Related Documentation... 4 Presenting Your PassKey
IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide
IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 59. Copyright
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Advanced Endpoint Protection Overview
Advanced Endpoint Protection Overview Advanced Endpoint Protection is a solution that prevents Advanced Persistent Threats (APTs) and Zero-Day attacks and enables protection of your endpoints by blocking
Sophos Endpoint Security and Control Help
Sophos Endpoint Security and Control Help Product version: 10.3 Document date: June 2014 Contents 1 About Sophos Endpoint Security and Control...3 2 About the Home page...4 3 Sophos groups...5 4 Sophos
Enterprise Incident Response: Network Intrusion Case Studies and Countermeasures
Enterprise Incident Response: Network Intrusion Case Studies and Countermeasures Eric J. Eifert Vice President, Cyber Defense Division ManTech s Mission, Cyber, & Technology Solutions Presentation Overview
FortiWeb 5.0, Web Application Firewall Course #251
FortiWeb 5.0, Web Application Firewall Course #251 Course Overview Through this 1-day instructor-led classroom or online virtual training, participants learn the basic configuration and administration
