The art of sinkholing. Tomasz Bukowski CERT Polska / NASK
|
|
|
- Lesley Carr
- 10 years ago
- Views:
Transcription
1
2 The art of sinkholing Tomasz Bukowski CERT Polska / NASK
3 About WHOIS Name:Tomasz Bukowski Works in CERT Polska/NASK 5 years in IRT Fight malware && monitor botnets Linux user and sysadadmin Programmer Member of Dragon Sector CTF team
4 Introduction
5 So, you want fight botnets? Botnet lifecycle: 1. write/buy malware 2. write/buy exploit pack 3. buy/hack VPS/hosting for (1) and (2) 4. buy domain for (3) 5. spred malware using exploit pack 6. $ profit $
6 So, you want fight botnets? Life of security researcher: 1. monitor spam/social media/internets 2. see malware spreding using exploit pack 3. gather samples 4. monitoring / analysis / incubation 5. locate CnC domains 6. locate rest of infrastructure 7. << action required! >>
7 Fighting botnets... Malware domain takedown: + cut off botmaster from his flock of sheep - devices still infected, no one get noticed Malware domain takeover: + cut off botmaster from his flock of sheep + malware will keep talking to CnC + can gather and share infrmation on infections! make cyberspace better place
8 Sinkholing
9 Sinkholing? Sinkholing let me google it for you... Sinkholing is a technique that researchers use to redirect the identification of the malicious command-and-control (C&C) server to their own analysis server. This way, the malicious traffic that comes from each client goes straight to the research box, ready to be analyzed. source: the internet
10 Sinkholing Scope : global Take over CnC domain Point to researcher box (directly or by nameserver) Doable Need to provide evidence Good will from domain operator (TLD) Take over CnC IP : Hard to do - need persuade IP owner (ISP/Hosting) Take over CnC infrastructure (server) Physicaly takeover Often can be done only by law enforcements
11 a lot of legislation problems Sinkholing Scope : global Take over CnC domain Point to researcher box (directly or by nameserver) Doable Need to provide evidence Good will from domain operator (TLD) Take over CnC IP : Hard to do - need persuade IP owner (ISP/Hosting) Take over CnC infrastructure (server) Physicaly takeover Often can be done only by law enforcements
12 source: the internet Sinkholing Local sinkholing (LAN) - redirect CnC traffic: By DNS : local DNS redirection By destination IP: traffic redirection Provide usefull information on infected workstations Especially when you run multi-layered big internal company network
13 Sinkholing DNS perspective sinkholed 1 IN A?? IN A domena-1.tld IN A IN CNAME sinkhole.cert.pl
14 Sinkholing DNS perspective sinkholed 1 IN A?? IN A domena-1.tld IN A IN CNAME sinkholed sinkhole.cert.pl 2 IN A?? IN A domena-1.tld IN NS sinkhole.cert.pl
15 Sinkholing DNS perspective sinkholed 1 IN A?? IN A domena-1.tld IN A IN CNAME sinkholed sinkhole.cert.pl 2 IN A?? IN A domena-1.tld IN NS sinkhole.cert.pl sinkholed 3 IN A?? IN A domena-1.tld IN NS domena-2.tld IN NS IN A sinkhole.cert.pl accidently sinkholed
16 Sinkholing the goal Allow malware to connect to your box Keep malware connected to your sinkhole as long as possible Prevent malware from using alternative/bacup communication channels
17 CnC
18 CnC Types TCP CnC UDP
19 CnC Types TCP CnC UDP other... DNS
20 CnC Types TCP CnC p2p UDP other... DNS TXT record IP calculation tunelling?
21 CnC Types +SSL? CnC TCP fancy encryption FTW p2p UDP other... DNS
22 CnC Types +SSL? HTTP 90+ %? CnC TCP fancy encryption FTW IRC p2p UDP other... DNS
23 CnC Types +SSL? HTTP CnC TCP fancy encryption FTW IRC other... p2p UDP other... DNS
24 CnC Types CnC TCP +SSL? fancy encryption FTW p2p HTTP IRC other... POST/GET params encrpted response content encrypted Extra content (i.e. jpg file ) Hidden in legit content other... UDP DNS
25 CnC Types CnC TCP +SSL? fancy encryption FTW p2p HTTP IRC other... POST/GET params encrpted response content encrypted Extra content (i.e. jpg file ) Hidden in legit content Facebook other... Twitter UDP DNS <!--? -->
26 CERT.PL story (1)
27 Timeline end of 2012 dorkbot Yet another malware using.pl domain as CnC Yet did not have TLD sinkhole procedure (in progres) Registrar decided to help (after abuse report) Am... but we do not have sinkhole!?
28 CnC example: Dorkbot TCP SSL IRC IRC server
29 Timeline end of 2012 dorkbot -> Take this old unused server and do somethink (4 GB RAM, 2x 3.0 Ghz CPU, 160 GB HDD, decend 1U!) -> We need TLS IRC ->Take charybdis irc server, remove 80 % functions
30 Timeline end of 2012 dorkbot begin of 2013 virut Realy long-living malware still sitting on.pl domains TLD sinkhole procedure in progres Promising results from sinkholing dorkbot Decistion : we need to do this!
31 Timeline end of 2012 dorkbot begin of 2013 virut We already got hadrware (+) We need (a lot) more software
32 CnC example: Virut (expectations) TCP IRC (crippled) IRC server TCP ENCRYPT IRC (crippled) IRC server random key Not working?
33 CnC example: Virut - reality (reality) traffic TCP PORT 80 (GET POST)_ HTTP NICK_ brute the key PLAIN ENCRYPT random key IRC (crippled) else?
34 Timeline end of 2012 dorkbot begin of 2013 virut Write python script peek first 5 bytes (decision: irc/http/crypted) keep TCP connection as long as possible
35 Timeline end of 2012 dorkbot begin of 2013 virut 200 K connections in established state!?
36 Timeline Encountered problems: TCP timeouts close timeout = 10s close-wait timeout = 60s established timeout = 5 days fin-wait timeout = 120s last-ack timeout = 30s syn-received timeout = 60s syn-sent timeout = 120s time-wait timeout = 120s srsly! it is just waiting for RST
37 Timeline Encountered problems: software (you know them when you hit the limit ) Somewhere in code you need to select() over opened file descriptors. It uses limited size bit-fields! Hint: on Linux use poll!
38 Timeline Encountered problems: default OS limits (you know them when you hit the limit ) max opened file descriptors (each tcp connection=new FD) can be easily fixed : ulimit n max entries in contract table requires kernel param tweak, fixable
39 Timeline Conclusion (1) Establishing TCP connection and leaving it with default settins is bad idea! Use SO_KEEPALIVE socet option (obvious?)
40 Timeline Conclusion (2) SELECT() POLL()
41 Timeline end of 2012 dorkbot begin of 2013 virut 30K simultanious connections
42 Timeline end of 2012 dorkbot begin of 2013 virut spring 2013 few ZueS domains Write python script that will understand HTTP and decode incoming zeus data...
43 CnC example: ZeuS TCP SSL HTTP POST /gate.php RC4 visualencrypt binstorage pack records key RC4 visualencrypt binstorage extract records CNC
44 Timeline end of 2012 dorkbot begin of 2013 virut spring 2013 few ZueS domains summer 2013 domainsilver takedown A LOT of various malware domains Write python scripts......?
45 Timeline Encountered problems: we already got numerous different python scripts running different CnC
46 Timeline Conclusion (3) Need decent sinkhole software (obvious?)
47 CERT.PL sink-soft
48 Requirements Build consistent framework for sinkholing Make event logging/sharing easy Identify common content processing functions Handle undret of TCP connections from Be as elastic as possible Implement any fancy encryption/encoding anywhere Allow to sinkhole new malware with lowest possible effort
49 Design Build your sinkhole out of blocks (modules) TCP SSL HTTP POST /gate.php RC4 visualencrypt binstorage pack records key RC4 visualencrypt binstorage extract records CNC
50 CnC Types CnC TCP +SSL? fancy encryption FTW HTTP IRC POST/GET params encrypted response content encrypted rot13 visualencrypt gzip b64 XOR... RC4 AES
51 Design Provide TCP conevtivity layer Use MQ ZeroMQ (fast && simple) PUB-SUB messaging pattern Deployed as standalone package with lowest possible requirements (msgpack && zmq-python) Easy configuration (chose ip,port and modules chain) unpack & config & run
52 Design
53 Sink-soft Sinkholing > 200 active malware domains
54 Sink-soft demo :)
55 Fin. Tomasz Bukowski
Adventures in Cybercrime. Piotr Kijewski CERT Polska/NASK
Adventures in Cybercrime Piotr Kijewski CERT Polska/NASK Would you like a Porsche? Porsche Cayenne S Turbo: 149 000 USD Or maybe a different type? Porsche 911 Turbo: 149 000 USD The car is there Porsche
Report. Takeover of Virut domains
Report Takeover of Virut domains February 25, CONTENTS Contents 1 Executive summary 2 2 Introduction 2 2.1 What is Virut?................................ 2 2.2 Takeover of Virut domains..........................
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
TCP Performance Management for Dummies
TCP Performance Management for Dummies Nalini Elkins Inside Products, Inc. Monday, August 8, 2011 Session Number 9285 Our SHARE Sessions Orlando 9285: TCP/IP Performance Management for Dummies Monday,
Snapt Balancer Manual
Snapt Balancer Manual Version 1.2 pg. 1 Contents Chapter 1: Introduction... 3 Chapter 2: General Usage... 4 Configuration Default Settings... 4 Configuration Performance Tuning... 6 Configuration Snapt
Malicious Network Traffic Analysis
Malicious Network Traffic Analysis Uncover system intrusions by identifying malicious network activity. There are a tremendous amount of network based attacks to be aware of on the internet today and the
Resilient Botnet Command and Control with Tor
Resilient Botnet Command and Control with Tor Dennis Brown July 2010 10/14/10 1 Who am I? Dennis Brown Security Researcher for Tenable Network Solutions Toorcon 10, 11 Defcon 18 PaulDotCom Podcast Rhode
WHEN THE HUNTER BECOMES THE HUNTED HUNTING DOWN BOTNETS USING NETWORK TRAFFIC ANALYSIS
WHEN THE HUNTER BECOMES THE HUNTED HUNTING DOWN BOTNETS USING NETWORK TRAFFIC ANALYSIS /ABOUT/ME Thomas Chopitea - Incident handler @CertSG Digital forensics & incident response (#DFIR), malware analysis,
Botnets: The Advanced Malware Threat in Kenya's Cyberspace
Botnets: The Advanced Malware Threat in Kenya's Cyberspace AfricaHackon 28 th February 2014 Who we Are! Paula Musuva-Kigen Research Associate Director, Centre for Informatics Research and Innovation (CIRI)
DNS Resolving using nslookup
DNS Resolving using nslookup Oliver Hohlfeld & Andre Schröder January 8, 2007 Abstract This report belongs to a talk given at the networking course (Institue Eurecom, France) in January 2007. It is based
VIRUS TRACKER CHALLENGES OF RUNNING A LARGE SCALE SINKHOLE OPERATION
VIRUS TRACKER CHALLENGES OF RUNNING A LARGE SCALE SINKHOLE OPERATION Kleissner & Associates Botconf 14, 3-5 Dec 2014, Nancy/France Worlds largest botnet monitoring system Since September 2012 Originally
Avalanche Remote Control User Guide. Version 4.1.3
Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095
HIDING THE NETWORK BEHIND THE NETWORK. BOTNET PROXY BUSINESS MODEL Alexandru Maximciuc, Cristina Vatamanu & Razvan Benchea Bitdefender, Romania
HIDING THE NETWORK BEHIND THE NETWORK. BOTNET PROXY BUSINESS MODEL Alexandru Maximciuc, Cristina Vatamanu & Razvan Benchea Bitdefender, Romania Email {amaximciuc, cvatamanu, rbenchea}@ bitdefender.com
Multifaceted Approach to Understanding the Botnet Phenomenon
Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
Report on Cyber Security Alerts Processed by CERT-RO in 2014
Section III - Cyber-Attacks Evolution and Cybercrime Trends Report on Cyber Security Alerts Processed by CERT-RO in 2014 Romanian National Computer Security Incident Response Team [email protected] The
The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links. Filippo Costa on behalf of the ALICE DAQ group
The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links Filippo Costa on behalf of the ALICE DAQ group DATE software 2 DATE (ALICE Data Acquisition and Test Environment) ALICE is a
10. Exercise: Automation in Incident Handling
107 10. Exercise: Automation in Incident Handling Main Objective Targeted Audience Total Duration Time Schedule Frequency The purpose of this exercise is to develop students abilities to create custom
Firewalls. Pehr Söderman KTH-CSC [email protected]
Firewalls Pehr Söderman KTH-CSC [email protected] 1 Definition A firewall is a network device that separates two parts of a network, enforcing a policy for all traversing traffic. 2 Fundamental requirements
Workshop on Network Traffic Capturing and Analysis IITG, DIT, CERT-In, C-DAC. Host based Analysis. {Himanshu Pareek, himanshup@cdac.
Workshop on Network Traffic Capturing and Analysis IITG, DIT, CERT-In, C-DAC Host based Analysis {Himanshu Pareek, [email protected]} {C-DAC Hyderabad, www.cdachyd.in} 1 Reference to previous lecture Bots
How To Deploy Sangoma Sbc Vm At Amazon Cloud Service (Awes) On A Vpc (Virtual Private Cloud) On An Ec2 Instance (Virtual Cloud)
Sangoma VM SBC AMI at AWS (Amazon Web Services) SBC in a Cloud Based UC/VoIP Service. One of the interesting use cases for Sangoma SBC is to provide VoIP Edge connectivity between Soft switches or IPPBX's
Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity
Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity Manufacturing companies have invested billions of dollars in industrial
DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses.
Lab Exercise DNS Objective DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses. Step 1: Analyse the supplied DNS Trace Here we examine the supplied trace of a
Zeus Traffic Manager VA Performance on vsphere 4
White Paper Zeus Traffic Manager VA Performance on vsphere 4 Zeus. Why wait Contents Introduction... 2 Test Setup... 2 System Under Test... 3 Hardware... 3 Native Software... 3 Virtual Appliance... 3 Benchmarks...
Load Balancing Bloxx Web Filter. Deployment Guide
Load Balancing Bloxx Web Filter Deployment Guide rev. 1.1.8 Copyright 2002 2016 Loadbalancer.org, Inc. 1 Table of Contents About this Guide...4 Loadbalancer.org Appliances Supported...4 Loadbalancer.org
ACE Management Server Deployment Guide VMware ACE 2.0
Technical Note ACE Management Server Deployment Guide VMware ACE 2.0 This technical note provides guidelines for the deployment of VMware ACE Management Servers, including capacity planning and best practices.
2X SecureRemoteDesktop. Version 1.1
2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious
ENEE 757 CMSC 818V. Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park
21. Botnets ENEE 757 CMSC 818V Prof. Tudor Dumitraș Assistant Professor, ECE University of Maryland, College Park http://ter.ps/757 https://www.facebook.com/sdsatumd Today s Lecture Where we ve been AuthenDcaDon
Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013
Security workshop Belnet Aris Adamantiadis Brussels 18 th April 2013 Agenda What is a botnet? Symptoms How does it work? Life cycle How to fight against botnets? Proactive and reactive NIDS 2 What is a
Exam Questions SY0-401
Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened
Critical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security
Firewall. IPTables and its use in a realistic scenario. José Bateira ei10133 Pedro Cunha ei05064 Pedro Grilo ei09137 FEUP MIEIC SSIN
Firewall IPTables and its use in a realistic scenario FEUP MIEIC SSIN José Bateira ei10133 Pedro Cunha ei05064 Pedro Grilo ei09137 Topics 1- Firewall 1.1 - How they work? 1.2 - Why use them? 1.3 - NAT
Password Reset PRO INSTALLATION GUIDE
Password Reset PRO INSTALLATION GUIDE This guide covers the new features and settings available in Password Reset PRO. Please read this guide completely to ensure a trouble-free installation. March 2009
RSA Security Analytics
RSA Security Analytics Event Source Log Configuration Guide Microsoft Windows using Eventing Collection Last Modified: Thursday, July 30, 2015 Event Source Product Information: Vendor: Microsoft Event
CS3250 Distributed Systems
CS3250 Distributed Systems Lecture 4 More on Network Addresses Domain Name System DNS Human beings (apart from network administrators and hackers) rarely use IP addresses even in their human-readable dotted
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT
Track 2 Workshop PacNOG 7 American Samoa Firewalling and NAT Core Concepts Host security vs Network security What is a firewall? What does it do? Where does one use it? At what level does it function?
Revealing Botnets Using Network Traffic Statistics
Revealing Botnets Using Network Traffic Statistics P. Čeleda, R. Krejčí, V. Krmíček {celeda vojtec}@ics.muni.cz, [email protected] Security and Protection of Information 2011, 10-12 May 2011, Brno,
How to Make the Client IP Address Available to the Back-end Server
How to Make the Client IP Address Available to the Back-end Server For Layer 4 - UDP and Layer 4 - TCP services, the actual client IP address is passed to the server in the TCP header. No further configuration
CounterACT 7.0 Single CounterACT Appliance
CounterACT 7.0 Single CounterACT Appliance Quick Installation Guide Table of Contents Welcome to CounterACT Version 7.0....3 Included in your CounterACT Package....3 Overview...4 1. Create a Deployment
Linux Firewall. Linux workshop #2. www.burningnode.com
Linux Firewall Linux workshop #2 Summary Introduction to firewalls Introduction to the linux firewall Basic rules Advanced rules Scripting Redundancy Extensions Distributions Links 2 Introduction to firewalls
Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------
Arbor s Solution for ISP
Arbor s Solution for ISP Recent Attack Cases DDoS is an Exploding & Evolving Trend More Attack Motivations Geopolitical Burma taken offline by DDOS attack Protests Extortion Visa, PayPal, and MasterCard
Tools for penetration tests 1. Carlo U. Nicola, HT FHNW With extracts from documents of : Google; Wireshark; nmap; Nessus.
Tools for penetration tests 1 Carlo U. Nicola, HT FHNW With extracts from documents of : Google; Wireshark; nmap; Nessus. What is a penetration test? Goals: 1. Analysis of an IT-environment and search
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
Overview - Using ADAMS With a Firewall
Page 1 of 6 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular
Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015
CS168 Computer Networks Jannotti Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015 Contents 1 Introduction 1 2 Components 1 2.1 Creating the tunnel..................................... 2 2.2 Using the
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER
M-FILES CORPORATION ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER VERSION 2.3 DECEMBER 18, 2015 Page 1 of 15 CONTENTS 1. Version history... 3 2. Overview... 3 2.1. System Requirements... 3 3. Network
Network Fundamentals. 2010 Carnegie Mellon University
Network Fundamentals What We Will Cover Introduction Your Network Fundamentals of networks, flow, and protocols Malicious traffic External Events & Trends Malware Networks in the Broad Working Together
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins During initial stages of penetration testing it is essential to build a strong information foundation before you
UNMASKCONTENT: THE CASE STUDY
DIGITONTO LLC. UNMASKCONTENT: THE CASE STUDY The mystery UnmaskContent.com v1.0 Contents I. CASE 1: Malware Alert... 2 a. Scenario... 2 b. Data Collection... 2 c. Data Aggregation... 3 d. Data Enumeration...
2010 Carnegie Mellon University. Malware and Malicious Traffic
Malware and Malicious Traffic What We Will Cover Introduction Your Network Fundamentals of networks, flow, and protocols Malicious traffic External Events & Trends Malware Networks in the Broad Working
Grandstream Networks, Inc. UCM6100 Security Manual
Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL
Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs
Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,
DOSarrest Security Services (DSS) Version 4.0
DOSarrest Security Services (DSS) Version 4.0 DOSarrest DSS User Guide The DSS is the main customer portal where customers can view and manipulate traffic statistics from a wide variety of variables that
Inside the Storm: Protocols and Encryption of the Storm Botnet
Inside the Storm: Protocols and Encryption of the Storm Botnet Joe Stewart, GCIH Director of Malware Research, SecureWorks To be covered in this talk: Quick-and-dirty unpacking of Storm Structure of the
ComTrader Technical Requirements. version 1.6
Technical Requirements version 1.6 Page I Table of Contents 1 Technical Requirements to run... 1 1.1 Client PC... 1 1.2 Proxy server, Connection restrictions, URLs... 3 2 Check infrastructure (using EPEX
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
D-Link Central WiFiManager Configuration Guide
Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install
DOMAIN AND EMAIL GLOSSARY The phrases and terms you may encounter, when registering a domain name
DOMAIN AND EMAIL GLOSSARY The phrases and terms you may encounter, when registering a domain name Don t know your Registrar from your Registry? No idea what a Name server actually does? Well, don t worry.
DNS Footprint of Malware
DNS Footprint of Malware Ed Stoner [email protected] CERT Network Situational Awareness 2010 Carnegie Mellon University Anexa Automated Run-Time Analysis environment Malicious Software Catalog of millions of
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant What infrastructure security really means? Infrastructure Security is Making sure that your system services are always running
DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager
DEPLOYMENT GUIDE Version 1.1 DNS Traffic Management using the BIG-IP Local Traffic Manager Table of Contents Table of Contents Introducing DNS server traffic management with the BIG-IP LTM Prerequisites
SonicWALL WAN Acceleration FAQ Document
SonicWALL WAN Acceleration FAQ Document Technology, Models, Licensing 1. What is SonicWALL s WAN Acceleration solution and how is it deployed? The SonicWALL WXA series available as live CD, Hardware and
Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013
Integrated Approach to Network Security Lee Klarich Senior Vice President, Product Management March 2013 Real data from actual networks 2 2012, Palo Alto Networks. Confidential and Proprietary. 2008: HTTP,
OpenFlow with Intel 82599. Voravit Tanyingyong, Markus Hidell, Peter Sjödin
OpenFlow with Intel 82599 Voravit Tanyingyong, Markus Hidell, Peter Sjödin Outline Background Goal Design Experiment and Evaluation Conclusion OpenFlow SW HW Open up commercial network hardware for experiment
Zscaler Internet Security Frequently Asked Questions
Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices
Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明
Spirent Abacus SIP over TLS Test 编 号 版 本 修 改 时 间 说 明 1 1. TLS Interview (Transport Layer Security Protocol) (1) TLS Feature Introduction: 1. TLS is a successor of Secure Sockets Layer (SSL), a cryptographic
How to configure HTTPS proxying in Zorp 5
How to configure HTTPS proxying in Zorp 5 June 24, 2014 This tutorial describes how to configure Zorp to proxy HTTPS traffic Copyright 1996-2014 BalaBit IT Security Ltd. Table of Contents 1. Preface...
Integrating the F5 BigIP with Blackboard
Integrating the F5 BigIP with Blackboard Nick McClure [email protected] Lead Systems Programmer University of Kentucky Created August 1, 2006 Last Updated June 17, 2008 Integrating the F5 BigIP with Blackboard
Detecting data loss from cloud sync applications
Detecting data loss from cloud sync applications Jake Williams CSRgroup Consultants @MalwareJake [email protected] Cloud Synchronization Data Loss - 2013 Jake Williams 1 BLUF Just to level set expectations.
WebStore Guide. The Uniform Solution
WebStore Guide The Uniform Solution Copyright 2009-2013 Premier Data Systems All rights reserved. This publication is protected by copyright and all rights are reserved by Premier Data Systems. It may
Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.
RimApp RoadBLOCK goes beyond simple filtering! Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes. However, traditional
How To Set Up Foglight Nms For A Proof Of Concept
Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is
Detecting Botnets with NetFlow
Detecting Botnets with NetFlow V. Krmíček, T. Plesník {vojtec plesnik}@ics.muni.cz FloCon 2011, January 12, Salt Lake City, Utah Presentation Outline NetFlow Monitoring at MU Chuck Norris Botnet in a Nutshell
How to Add Domains and DNS Records
How to Add Domains and DNS Records Configure the Barracuda NextGen X-Series Firewall to be the authoritative DNS server for your domains or subdomains to take advantage of Split DNS or dead link detection.
Firewalls with IPTables. Jason Healy, Director of Networks and Systems
Firewalls with IPTables Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 Host-based Firewalls with IPTables 5 1.1 Introduction.............................. 5 1.2 Concepts...............................
How To Get The Most Out Of Your Email From Your Mail Server (For A Small Business)
Hosted Exchange +SharePoint: Communication and Collaboration This is the next generation of affordable, reliable messaging and portal solutions with Microsoft Exchange 2010 and Microsoft SharePoint 2010.
Building Your Firewall Rulebase Lance Spitzner Last Modified: January 26, 2000
Building Your Firewall Rulebase Lance Spitzner Last Modified: January 26, 2000 Building a solid rulebase is a critical, if not the most critical, step in implementing a successful and secure firewall.
SANS: The 2010 European Digital Forensics and Incident Response Summit. Retrieving Information... Then what? 8 September 2010. Righard J.
SANS: The 2010 European Digital Forensics and Incident Response Summit Page 1 Retrieving Information... Then what? Righard J. Zwienenberg Abstract Page 2 While combating cybercrime, you may gather lots
Server Installation Manual 4.4.1
Server Installation Manual 4.4.1 1. Product Information Product: BackupAgent Server Version: 4.4.1 2. Introduction BackupAgent Server has several features. The application is a web application and offers:
Real-Time Analysis of CDN in an Academic Institute: A Simulation Study
Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Deploying the Barracuda Load Balancer with Office Communications Server 2007 R2. Office Communications Server Overview.
Deploying the Barracuda Load Balancer with Office Communications Server 2007 R2 Organizations can use the Barracuda Load Balancer to enhance the scalability and availability of their Microsoft Office Communications
ReadyNAS Remote White Paper. NETGEAR May 2010
ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that
Exchange 2013 mailbox setup guide
Fasthosts Customer Support Exchange 2013 mailbox setup guide This article covers the setup of Exchange 2013 mailboxes in Microsoft Outlook 2013, 2010 and Outlook 2011 for Mac. Contents Exchange 2013 Mailbox
Smoothwall Web Filter Deployment Guide
Smoothwall Web Filter Deployment Guide v1.0.7 Copyright 2013 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org Software Versions
Password Reset PRO. Quick Setup Guide for Single Server or Two-Tier Installation
Password Reset PRO Quick Setup Guide for Single Server or Two-Tier Installation This guide covers the features and settings available in Password Reset PRO version 3.x.x. Please read this guide completely
How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)
Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network
Check Point FireWall-1 HTTP Security Server performance tuning
PROFESSIONAL SECURITY SYSTEMS Check Point FireWall-1 HTTP Security Server performance tuning by Mariusz Stawowski CCSA/CCSE (4.1x, NG) Check Point FireWall-1 security system has been designed as a means
User Identification (User-ID) Tips and Best Practices
User Identification (User-ID) Tips and Best Practices Nick Piagentini Palo Alto Networks www.paloaltonetworks.com Table of Contents PAN-OS 4.0 User ID Functions... 3 User / Group Enumeration... 3 Using
Fasthosts Internet Parallels Plesk 10 Manual
Fasthosts Internet Parallels Plesk 10 Manual Introduction... 2 Before you begin... 2 Logging in to the Plesk control panel... 2 Securing access to the Plesk 10 control panel... 3 Configuring your new server...
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
Desktop Central Managing Windows Computers in WAN
Overview ManageEngine Desktop Central is Web-Based windows desktop administration software that helps administrators to effectively manage the desktops from a central point. It provides Software Deployment,
