D&D of malware with exotic C&C
|
|
|
- Christina Morton
- 9 years ago
- Views:
Transcription
1 D&D of malware with exotic C&C D&D = Description & Detection C&C = Command & Control Automotive Consumer Energy & Chemicals Paul Rascagneres Eric Leblond Life Sciences & Healthcare
2 Introduction About us - Paul Rascagnères: malware analyst at G DATA SecurityLabs - Eric Leblond: co-founder of Stamus Networks, Suricata developer 2
3 Introduction Why this talk? - to explain advanced communication channel used by modern malware; - to explain how to correctly detect and contain attacks (to be blind in your network is the worst situation); - to show strength of Suricata; - to show why incident response team should work with network team; - and 3
4 Introduction Why this talk? - because: 4
5 Introduction Suricata Intrusion Detection System - Protocol recognition and dedicated keywords - File extraction Network Security Monitoring - Protocol request journalisation - EVE format: JSON output for all events and alerts 5
6 Introduction The described cases All malware appearing in this presentation are not fictitious. Any ressemblance to real malware, living or dead, is not purely coincidental. We only describes case in the wild, sorry no BadBIOS during the next 30 minutes 6
7 Case 1 HTTP communication Ex: Havex Quick description: havex is a Remote Administration Tool (RAT) uses on targeted attacks. The group mainly targets petrol companies. Network protocol: this malware uses common HTTP query with a specific pattern 7
8 Case 1 HTTP communication 8
9 Case 1: Detection HTTP communication The naive approach : - Detect 'havex' string in the flow - Use content keyword for that alert tcp any any -> any any (msg:"havex HTTP"; content:"<!--havex"; sid:1; rev:1;) Problem - All TCP flows are inspected - We want http coming from server 9
10 Case 1 : Detection HTTP communication Select the flow : This is HTTP communication Use Suricata http keywords : Dynamic detection of protocol independent of port - Flow with content to detect comes from server alert http any any -> any any (msg:"havex HTTP"; flow:established,from_server; pcre:"/<\!--havex.*havex-->/"; sid:1; rev:1;) - Content has to be find in http body: use Pcre modifier alert http any any -> any any (msg:"havex HTTP"; flow:established,from_server; pcre:"/<\!--havex.*havex-- >/Q"; sid:1; rev:1;) 10
11 Case 1#BringBackOurPerf HTTP communication Problem - Fire a regexp for all HTTP content - In the body Solution - Do a pre match on partial content Simple string matching no pcre complexity - Choose it as fast pattern Tell suricata rule multi pattern matching that the string is on differenciator alert http any any -> any any (msg:"havex HTTP"; flow:established,from_server ; content:"<!--havex"; http_server_body; fast_pattern; pcre:"/<\!--havex.*havex-->/q"; sid:1; rev:1;) 11
12 Case 2 HTTPS + GZIP communication Ex: IcoScript Quick description: IcoScript is a Remote Administration Tool (RAT) used on targeted attacks. Network protocol: It uses it own scripting language to manipulate the user s browser (thanks to COM and CoCreateInstance()). The malware uses popular webmail as C&C (for example Yahoo). 12
13 Case 2 HTTPS + GZIP communication Ex: IcoScript The orders are present in the content of an stored on Yahoo webmail. The command is located between <<<<<< and >>>>>>. To detect this pattern, we need to solve two difficulties: - Yahoo uses SSL to encrypt the network flow; - The web content is compressed thanks to GZIP algorithm. 13
14 Case 2 Detection HTTPS + GZIP communication Suricata http handling - Based on libhtp by Ivan Ristic - Libhtp handles gzip transparently - Any match on a gziped HTTP object is done on ungzipped content alert http any any -> any any (msg:"havex HTTP"; flow:established,from_server ; content:"<<<<<"; http_server_body; fast_pattern; pcre:"/<<<<<.*>>>>>/q"; sid:2; rev:1;) 14
15 Case 3 Named pipe communication Ex: Uroburos, r*g*n, Quick description: Uroburos is a rootkit. The purpose is to provide a remote acces on the infected malware and to steal data. This malware was used during targeted attacks against government. Network protocol: this rootkit used several network protocol. This case is only limited to the usage of named pipe between infected machines. 15
16 Case 3 Named pipe communication Ex: Uroburos, r*g*n, 16
17 Case 3 Named pipe communication Ex: Uroburos, r*g*n, The rootkit uses the following named pipe: - \\machine_name\\pipe\isapi_http - \\machine_name\\pipe\isapi_dg - \\machine_name\\pipe\isapi_dg2 17
18 Case 3 Named pipe communication Ex: Uroburos, r*g*n, Specific context: - Inter desktop communication - Not on internet path - How to capture - Specific parameter on switch - Pcap capture on a host and replay 18
19 Case 3 Named pipe communication Network specificity The C&C is characterized by local trafic - IDS place must match Usual way is on the internet path Here IDS must intercept local trafic Local trafic can mean huge trafic - In forensic/analysis : Pcap or custom IDS 19
20 Case 3 Named pipe communication First attempt : - Use dce/rpc keywords to detect - Seems to use SMB protocol Back to the roots - Content based detection, offset - Port filtering alert tcp any any -> any 445 (msg:"isapi smb"; flow:established,to_server; content:" FF SMB a2 "; offset:4; content:" "; sid:5; rev:1;) 20
21 Case 4 User Agent communication Ex: Houdini Quick description: Houdini is a Remote Administration Tool (RAT) developed in VBS. It was used during targeted campaign. Network protocol: This malware use common HTTP query. However the communication is perform with the User Agent field. 21
22 Case 4 User Agent communication Ex: Houdini 22
23 Case 4 User Agent communication Got a characterisation on user-agent - Can use a fast pattern on basic motif - Do a pcre on user agent Using V modifier alert http any any -> any any (msg:"houdini"; flow:established,from_server ; content:"< >"; http_user_agent; fast_pattern; pcre:"/.+< >.+< >.+< >/V"; sid:2; rev:1;) 23
24 Case 5 DNS communication Ex: FrameworkPOS Quick description: On the G DATA SecurityLabs, we are currently working on new generation of Point Of Sale (POS) malware. The purpose of this kind of malware is to parse the memory of the infected system in order to get credit card data. Network protocol: to exfiltrate the data, the malware uses DNS query. 24
25 Case 5 DNS communication Ex: FrameworkPOS 25
26 Case 5 DNS communication Ex: FrameworkPOS Example of query: domain.vilain (not exactly correct but enough to understand) 26
27 Case 5 DNS communication Ex: FrameworkPOS Methodology Protocol recognition on DNS dns_query keyword alert dns any any -> any any (msg:"query to supervilain"; dns_query; content:"supervilain.ru"; sid:5; rev:1;) 27
28 Case 5 DNS communication Reverse exfiltration crypto ^ 0xAA ^ 0x9B ^ 0xC3 Equal to ^ 0xF2 28
29 Case 5 DNS communication Reverse exfiltration crypto What is lua script? - Run a lua script when all filters match - Script decides if sig matches or not Syntax is simple alert dns any any -> any any (msg:"query to supervilain"; dns_query; content:"supervilain.ru"; lua:dnsextract.lua; sid:5; rev:1;) Code available on github: 29
30 Case 5 Reverse exfiltration crypto function init (args) local needs = {} needs["dns.rrname"] = tostring(true) return needs end function match(args) a = tostring(args["dns.rrname"]) if #a > 0 then i = string.find(a, "%.") a = string.sub(a, 0, i-1) i = 0 var = "" while i < #a do hexa = tonumber(string.sub(a, i, i+2), 16) decod = bit.bxor(hexa, 0xF2) res = string.format("%c", decod) var = var.. res i = i +2 end -- keep for later, big data, you know print(var) -- alert return 1 end -- end if return 0 end 30
31 Case 6 Steganography communication Ex: Uroburos next gen Quick description: On the last generation of the Uroburos malware, the attackers decided to use steganography to communication. The steganography consists to hide message in another file (in particularly in image in our case). 31
32 Case 6 Steganography communication Ex: Uroburos next gen The rootkit uses an home-made steganography algorithm. To simplify the case, we will use well know Least Significant Bit (LSB) algorithm. Once the message contained in the image is obtained, the detection will be perform on the pattern: <!--Uroburos.*Uroburos--> The pattern is only here as an example. This pattern is not really used with the Uroburos rookit. 32
33 Case 6 Steganography communication No direct steganography capabilites in Suricata Current possibility Extract suspect file and store them on disk Got a script to analyse file and report Inotify is your friend alert http any any -> any any (msg:"filestore PNG"; flow:established,to_client; content:"twitter.com"; http_header; filemagic:"png image data"; filestore; sid:5; rev:1;) 33
34 Conclusion Yes, the attackers uses advanced techniques but nothing magic! With a good analysis (yes the reverse is yet useful) and efficient IDS rules, we are able to detect and contain complex attacks The knowledge is the key of the success: - how the attackers work? - how your infrastructure works? - how your tools works? - human capabilities > magic box 34
Network Security Monitoring
Network Security Monitoring Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
Uroburos Highly complex espionage software with Russian roots
G Data Red Paper 2014 Uroburos Highly complex espionage software with Russian roots G Data discovers alleged intelligence agency software G Data SecurityLabs Contact: [email protected] Red Paper_February-2014
Suricata 2.0, Netfilter and the PRC
Suricata 2.0, Netfilter and the PRC Éric Leblond Stamus Networks April 26, 2014 Éric Leblond (Stamus Networks) Suricata 2.0, Netfilter and the PRC April 26, 2014 1 / 52 Eric Leblond a.k.a Regit French
Cleaning Encrypted Traffic
Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Passive Logging. Intrusion Detection System (IDS): Software that automates this process
Passive Logging Intrusion Detection: Monitor events, analyze for signs of incidents Look for violations or imminent violations of security policies accepted use policies standard security practices Intrusion
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
Know Your Enemy Lite: Proxy Threats - Socks v666
Know Your Enemy Lite: Proxy Threats - Socks v666 Reverse Tunneling Into NAT Home Networks The Honeynet Project http://www.honeynet.org Last Modified: 22 January, 2008 INTRODUCTION A common assumption within
Network Security, ISA 656, Angelos Stavrou. Snort Lab
Snort Lab Purpose: In this lab, we will explore a common free Intrusion Detection System called Snort. Snort was written initially for Linux/Unix, but most functionality is now available in Windows. In
Introduction on Low level Network tools
Georges Da Costa [email protected] http: //www.irit.fr/~georges.da-costa/cours/addis/ 1 Introduction 2 Aircrack-ng 3 Wireshark Low level tools Hacking tools Aircrack-ng (ex Aircrack, ex Airsnort) WEP/WPA
A perspective to incident response or another set of recommendations for malware authors
A perspective to incident response or another set of recommendations for malware authors Alexandre Dulaunoy - TLP:WHITE [email protected] June 7, 2013 CIRCL, national CERT of Luxembourg CIRCL
Latest advance in Suricata I D P S
Latest advance in Suricata I D P S Éric Leblond OISF July 9th 2012 Éric Leblond (OISF) Latest advance in Suricata IP D S July 9th 2012 1 / 44 1 Introduction Introduction Goals of the project Ecosystem
Using a Malicious Proxy to Pilfer Data & Wreak Havoc. Edward J. Zaborowski [email protected]
Using a Malicious Proxy to Pilfer Data & Wreak Havoc Edward J. Zaborowski [email protected] Abstract...3 Malicious Web Proxy...3 Becoming the Proxy...3 ARP Spoofing...3 Static Configuration...3 Web Proxy
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security
VISA SECURITY ALERT December 2015 KUHOOK POINT OF SALE MALWARE. Summary. Distribution and Installation
VISA SECURITY ALERT December 2015 KUHOOK POINT OF SALE MALWARE Distribution: Merchants, Acquirers Who should read this: Information security, incident response, cyber intelligence staff Summary Kuhook
Basics of SSL Certification
Introduction To secure transmission of information from browser to a web server, a security protocol is used. SSL (Secure Socket Lock) is one of the most popular and widely accepted security protocols,
ShinoBOT ShinoC2. Can you prevent APT like me? Author: Shota Shinogi. - the pentest tool to measure the defense against APT/RAT -
ShinoBOT ShinoC2 Can you prevent APT like me? - the pentest tool to measure the defense against APT/RAT - Author: Shota Shinogi 1 >whoami Name: Shota Shinogi pronounce: ʃota ʃinogi @sh1n0g1 work in the
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
The Power of SNORT SNORT Update
The Power of SNORT SNORT Update Jean-Paul Kerouanton 11 th May 2010 2 Leveraging the Snort Brand The Power SNORT = The Power of Open Source The SNORT- Universe AMAZON - +100 items GOOGLE +3.700.000 hits
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
StreamServe Persuasion SP4 Service Broker
StreamServe Persuasion SP4 Service Broker User Guide Rev A StreamServe Persuasion SP4 Service Broker User Guide Rev A 2001-2009 STREAMSERVE, INC. ALL RIGHTS RESERVED United States patent #7,127,520 No
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Network Security. Mobin Javed. October 5, 2011
Network Security Mobin Javed October 5, 2011 In this class, we mainly had discussion on threat models w.r.t the class reading, BGP security and defenses against TCP connection hijacking attacks. 1 Takeaways
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
CIA Lab Assignment: Web Servers
CIA Lab Assignment: Web Servers A. Bakker N. Sijm C. Dumitru J. van der Ham Feedback deadline: October 17, 2014 10:00 CET Abstract Web servers are an important way of putting information out on the Internet
Maximizing Performance with SPDY & SSL. Billy Hoffman [email protected] @zoompf
Maximizing Performance with SPDY & SSL Billy Hoffman [email protected] @zoompf What is SPDY? Massive Browser Support Massive Server Support Cast of Characters TCP HTTP SSL X.509 Certificate Cryptography
This presentation explains how to monitor memory consumption of DataStage processes during run time.
This presentation explains how to monitor memory consumption of DataStage processes during run time. Page 1 of 9 The objectives of this presentation are to explain why and when it is useful to monitor
JAVASCRIPT AND COOKIES
JAVASCRIPT AND COOKIES http://www.tutorialspoint.com/javascript/javascript_cookies.htm Copyright tutorialspoint.com What are Cookies? Web Browsers and Servers use HTTP protocol to communicate and HTTP
APPLICATION PROGRAMMING INTERFACE
DATA SHEET Advanced Threat Protection INTRODUCTION Customers can use Seculert s Application Programming Interface (API) to integrate their existing security devices and applications with Seculert. With
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
Snort Installation - Ubuntu FEUP. SSI - ProDEI-2010. Paulo Neto and Rui Chilro. December 7, 2010
December 7, 2010 Work Proposal The purpose of this work is: Explain a basic IDS Architecture and Topology Explain a more advanced IDS solution Install SNORT on the FEUP Ubuntu distribution and test some
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
ARP and DNS. ARP entries are cached by network devices to save time, these cached entries make up a table
ARP and DNS Both protocols do conversions of a sort, but the distinct difference is ARP is needed for packet transfers and DNS is not needed but makes things much easier. ARP Address Resolution Protocol
Networks and Security Lab. Network Forensics
Networks and Security Lab Network Forensics Network Forensics - continued We start off from the previous week s exercises and analyze each trace file in detail. Tools needed: Wireshark and your favorite
Detecting Anonymous Proxy Usage
Detecting Anonymous Proxy Usage John Brozycki March 2008 GIAC GPEN, GCIH, GSEC, GCIA, GCFW, GCFA, GREM [email protected] SANS Technology Institute - Candidate for Master of Science Degree 1 1 John
The Bro Network Intrusion Detection System
The Bro Network Intrusion Detection System Robin Sommer International Computer Science Institute, & Lawrence Berkeley National Laboratory [email protected] http://www.icir.org System Philosophy Bro
SSL Inspection Step-by-Step Guide. June 6, 2016
SSL Inspection Step-by-Step Guide June 6, 2016 Key Drivers for Inspecting Outbound SSL Traffic Eliminate blind spots of SSL encrypted communication to/from the enterprise Maintaining information s communication
How Attackers are Targeting Your Mobile Devices. Wade Williamson
How Attackers are Targeting Your Mobile Devices Wade Williamson Today s Agenda Brief overview of mobile computing today Understanding the risks Analysis of recently discovered malware Protections and best
HTTPS Inspection with Cisco CWS
White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a
Web Application Security Considerations
Web Application Security Considerations Eric Peele, Kevin Gainey International Field Directors & Technology Conference 2006 May 21 24, 2006 RTI International is a trade name of Research Triangle Institute
Configuring Snort as a Firewall on Windows 7 Environment
Configuring Snort as a Firewall on Windo Environment Moath Hashim Alsafasfeh a, Abdel Ilah Noor Alshbatat b a National university of Malaysia UKM, Selengor, Malaysia. b Tafila Technical University, Electrical
DiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
Description: Objective: Attending students will learn:
Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of
Data Mining in Incident Response Challenges and Opportunities
Data Mining in Incident Response Challenges and Opportunities Alexandre Dulaunoy - TLP:WHITE Information Security Education Day 1 of 22 CIRCL The Computer Incident Response Center Luxembourg (CIRCL) is
1 Download & Installation... 4. 1 Usernames and... Passwords
Contents I Table of Contents Part I Document Overview 2 Part II Document Details 3 Part III EventSentry Setup 4 1 Download & Installation... 4 Part IV Configuration 4 1 Usernames and... Passwords 5 2 Network...
SSL BEST PRACTICES OVERVIEW
SSL BEST PRACTICES OVERVIEW THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1%
Research on the Essential Network Equipment Risk Assessment Methodology based on Vulnerability Scanning Technology Xiaoqin Song 1
International Conference on Informatization in Education, Management and Business (IEMB 2015) Research on the Essential Network Equipment Risk Assessment Methodology based on Vulnerability Scanning Technology
Network Monitoring for Cyber Security
Network Monitoring for Cyber Security Paul Krystosek, PhD CERT Network Situational Awareness 2006 Carnegie Mellon University What s Coming Up The scope of network monitoring Cast of characters Descriptions
A Tale of the Weaknesses of Current Client-Side XSS Filtering
Call To Arms: A Tale of the Weaknesses of Current Client-Side XSS Filtering Martin Johns, Ben Stock, Sebastian Lekies About us Martin Johns, Ben Stock, Sebastian Lekies Security Researchers at SAP, Uni
CardSwipe Integration
CardSwipe Integration CardSwipe is an app that passes data from a Mag Stripe Reader to your application. No data is stored in CardSwipe making it PCI Compliant. Communication between CardSwipe and your
Defending Behind The Device Mobile Application Risks
Defending Behind The Device Mobile Application Risks Tyler Shields Product Manager and Strategist Veracode, Inc Session ID: MBS-301 Session Classification: Advanced Agenda The What The Problem Mobile Ecosystem
The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.
Content Introduction... 2 Data Access Server Control Panel... 2 Running the Sample Client Applications... 4 Sample Applications Code... 7 Server Side Objects... 8 Sample Usage of Server Side Objects...
Fighting Advanced Persistent Threats (APT) with Open Source Tools
Fighting Advanced Persistent Threats (APT) with Open Source Tools What is APT? The US Air Force invented the term in 2006 APT refers to advanced techniques used to gain access to an intelligence objective
IDS and Penetration Testing Lab III Snort Lab
IDS and Penetration Testing Lab III Snort Lab Purpose: In this lab, we will explore a common free Intrusion Detection System called Snort. Snort was written initially for Linux/Unix, but most functionality
SHINOBOT/SHINOC2 MANUAL
SHINOBOT/SHINOC2 MANUAL Sh1n0g1 V E R : 1. 3. 2. 1 1 OVERVIEW ShinoBOT/ShinoC2 are penetration test tools for APT prevention. PURPOSE The purpose of ShinoBOT/ShinoC2 is to evaluate your protection against
Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy [email protected]
Cybercrime: evoluzione del malware e degli attacchi Cesare Radaelli Regional Sales Manager, Italy [email protected] About Palo Alto Networks We are the network security company World-class
BeamYourScreen Security
BeamYourScreen Security Table of Contents BeamYourScreen Security... 1 The Most Important Facts in a Nutshell... 3 Content Security... 3 User Interface Security... 3 Infrastructure Security... 3 In Detail...
This report is a detailed analysis of the dropper and the payload of the HIMAN malware.
PAGE 5 Check Point Malware Research Group HIMAN Malware Analysis December 12, 2013 Researcher: Overview This report is a detailed analysis of the dropper and the payload of the HIMAN malware. This malware
Exercise 7 Network Forensics
Exercise 7 Network Forensics What Will You Learn? The network forensics exercise is aimed at introducing you to the post-mortem analysis of pcap file dumps and Cisco netflow logs. In particular you will:
Qlik REST Connector Installation and User Guide
Qlik REST Connector Installation and User Guide Qlik REST Connector Version 1.0 Newton, Massachusetts, November 2015 Authored by QlikTech International AB Copyright QlikTech International AB 2015, All
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :[email protected] Sr. Technology Consultant GCR
場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :[email protected] Sr. Technology Consultant GCR Minimum Requirements of Security Management and Compliance
Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006
Reverse Shells Enable Attackers To Operate From Your Network Richard Hammer August 2006 Reverse Shells? Why should you care about reverse shells? How do reverse shells work? How do reverse shells get installed
How Secure are your Channels? By Morag Hughson
How Secure are your Channels? By Morag Hughson Building Blocks So, you ve gone to great lengths to control who has access to your queues, but would you care if someone could see the contents of your messages
Post-Access Cyber Defense
Post-Access Cyber Defense Dr. Vipin Swarup Chief Scientist, Cyber Security The MITRE Corporation November 2015 Approved for Public Release; Distribution Unlimited. 15-3647. 2 Cyber Security Technical Center
SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013
SOUTHERN POLYTECHNIC STATE UNIVERSITY Snort and Wireshark IT-6873 Lab Manual Exercises Lucas Varner and Trevor Lewis Fall 2013 This document contains instruction manuals for using the tools Wireshark and
English. Asema.com Portlets Programmers' Manual
English Asema.com Portlets Programmers' Manual Asema.com Portlets : Programmers' Manual Asema Electronics Ltd Copyright 2011-2013 No part of this publication may be reproduced, published, stored in an
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009
Proxy Blocking: Preventing Tunnels Around Your Web Filter Information Paper August 2009 Table of Contents Introduction... 3 What Are Proxies?... 3 Web Proxies... 3 CGI Proxies... 4 The Lightspeed Proxy
Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8
Release Notes for Epilog for Windows v1.7/v1.8 InterSect Alliance International Pty Ltd Page 1 of 22 About this document This document provides release notes for Snare Enterprise Epilog for Windows release
MIKOGO SECURITY DOCUMENT
MIKOGO SECURITY DOCUMENT Table of Contents Page 2. 6. 6. The Most Important Facts in a Nutshell In Detail Application Firewall Compatibility Quality Management: ISO 9001 Certification Data Compression
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Internet Mail Client Control Library SSL Supplement
Codestone Ltd Internet Mail Client Control Library SSL Supplement Codestone Ltd 2004 Page 1 / 22 Welcome to the Internet Mail Client Control Library SSL Supplement we hope you will find the library to
RSA Security Anatomy of an Attack Lessons learned
RSA Security Anatomy of an Attack Lessons learned Malcolm Dundas Account Executive John Hurley Senior Technology Consultant 1 Agenda Advanced Enterprise/ Threats The RSA Breach A chronology of the attack
UNMASKCONTENT: THE CASE STUDY
DIGITONTO LLC. UNMASKCONTENT: THE CASE STUDY The mystery UnmaskContent.com v1.0 Contents I. CASE 1: Malware Alert... 2 a. Scenario... 2 b. Data Collection... 2 c. Data Aggregation... 3 d. Data Enumeration...
Configuring Snort as a Firewall on Windows 7 Environment
Journal of Ubiquitous Systems & Pervasive Networks Volume 3, No. 2 (2011) pp. 3- Configuring Snort as a Firewall on Windo Environment Moath Hashim Alsafasfeh a, Abdel Ilah Noor Alshbatat b a National University
How To Detect An Advanced Persistent Threat Through Big Data And Network Analysis
, pp.30-36 http://dx.doi.org/10.14257/astl.2013.29.06 Detection of Advanced Persistent Threat by Analyzing the Big Data Log Jisang Kim 1, Taejin Lee, Hyung-guen Kim, Haeryong Park KISA, Information Security
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
LEVERAGING PROACTIVE DEFENSE TO DEFEAT MODERN ADVERSARIES. Jared Greenhill RSA Incident Response. September 17 th, 2015
LEVERAGING PROACTIVE DEFENSE TO DEFEAT MODERN ADVERSARIES Jared Greenhill RSA Incident Response September 17 th, 2015 Current State of Detection Many organization's depend on alerts and feel this provides
Indexing Full Packet Capture Data With Flow
Indexing Full Packet Capture Data With Flow FloCon January 2011 Randy Heins Intelligence Systems Division Overview Full packet capture systems can offer a valuable service provided that they are: Retaining
ios Testing Tools David Lindner Director of Mobile and IoT Security
ios Testing Tools David Lindner Director of Mobile and IoT Security Who is this guy? David Lindner @golfhackerdave [email protected] 15+ years consulting experience I hack and golf, sometimes at
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)
SIEM FOR BEGINNERS EVERYTHING YOU WANTED TO KNOW ABOUT LOG MANAGEMENT BUT WERE AFRAID TO ASK www.alienvault.com A Rose By Any Other Name SLM/LMS, SIM, SEM, SEC, SIEM Although the industry has settled on
Vuurmuur - iptables manager
Vuurmuur - iptables manager Victor Julien July 7, 2014 Victor Julien Vuurmuur - iptables manager July 7, 2014 1 / 23 About me Vuurmuur founder and lead developer of Vuurmuur Open Source Suricata IDS/IPS
G DATA SECURITYLABS CASE STUDY OPERATION TOOHASH HOW TARGETED ATTACKS WORK
G DATA SECURITYLABS CASE STUDY OPERATION TOOHASH HOW TARGETED ATTACKS WORK CONTENTS Executive Summary... 2 The Malware used 2 Information Stealing 2 Campaign Analysis... 3 Targets 3 Spear Phishing Campaign
SSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
EFFECTIVE IMPLEMENTATION OF DYNAMIC CLASSIFICATION FOR NETWORK FORENSIC AND TRAFFIC ANALYSIS
EFFECTIVE IMPLEMENTATION OF DYNAMIC CLASSIFICATION FOR NETWORK FORENSIC AND TRAFFIC ANALYSIS Manu Bansal Assistant Professor Department of IT University Institute of Engineering & Technology Panjab University,
Alert (TA14-212A) Backoff Point-of-Sale Malware
Alert (TA14-212A) Backoff Point-of-Sale Malware Original release date: July 31, 2014 Systems Affected Point-of-Sale Systems Overview This advisory was prepared in collaboration with the National Cybersecurity
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities Thomas Moyer Spring 2010 1 Web Applications What has changed with web applications? Traditional applications
TELE 301 Network Management. Lecture 17: File Transfer & Web Caching
TELE 301 Network Management Lecture 17: File Transfer & Web Caching Haibo Zhang Computer Science, University of Otago TELE301 Lecture 17: File Transfer & Web Caching 1 Today s Focus FTP & Web Caching!
Network Monitoring using MMT:
Network Monitoring using MMT: An application based on the User-Agent field in HTTP headers Vinh Hoa LA Ɨ Raul FUENTES Ɨ PhD Student Prof. Ana CAVALLI Ɨ Ƭ Supervisor Ɨ Telecom SudParis, IMT Ƭ Montimage
Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway
TESTING & INTEGRATION GROUP SOLUTION GUIDE Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway INTRODUCTION...2 RADWARE SECUREFLOW... 3
OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS
OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS Eric Vyncke (@evyncke) Cisco Session ID: ARCH W01 Session Classification: Advanced Agenda Status of WorldWide IPv6 Deployment IPv6 refresher:
Collecting Windows Security Audit Log data with NXLog and Sysmon. Collecting Windows Security Audit Log data with NXLog and Sysmon
Collecting Windows Security Audit Log data with NXLog and Sysmon i Collecting Windows Security Audit Log data with NXLog and Sysmon Collecting Windows Security Audit Log data with NXLog and Sysmon ii Contents
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
