Copyright 2015 Splunk Inc. Affordable Security: Making the most of free tools and data. Craig Merchant. Senior Security Architect, Oracle
|
|
|
- Charles Daniels
- 10 years ago
- Views:
Transcription
1 Copyright 2015 Splunk Inc. Affordable Security: Making the most of free tools and data Craig Merchant Senior Security Architect, Oracle
2 Disclaimer During the course of this presentafon, we may make forward looking statements regarding future events or the expected performance of the company. We caufon you that such statements reflect our current expectafons and esfmates based on factors currently known to us and that actual events or results could differ materially. For important factors that may cause actual results to differ from those contained in our forward- looking statements, please review our filings with the SEC. The forward- looking statements made in the this presentafon are being made as of the Fme and date of its live presentafon. If reviewed aqer its live presentafon, this presentafon may not contain current or accurate informafon. We do not assume any obligafon to update any forward looking statements we may make. In addifon, any informafon about our roadmap outlines our general product direcfon and is subject to change at any Fme without nofce. It is for informafonal purposes only and shall not, be incorporated into any contract or other commitment. Splunk undertakes no obligafon either to develop the features or funcfonality described or to include any such feature or funcfonality in a future release. 2
3 AddiFonal Disclaimer I am here as a member of the Splunk community. I am not here as a representafve of Oracle or the Oracle Cloud. Due to the sensifve nature of some of our customers, I am only authorized to disclose a limited amount of specific informafon about our environment. 3
4 Personal IntroducFon Craig Merchant, Senior Security Architect, Oracle Cloud Over 20 years of experience in security, networking, and systems management Joined Oracle through the Responsys acquisifon in 2014 Oracle Cloud was announced on June 7, 2012 Offerings include SaaS, PaaS, IaaS Growth has been driven by over a dozen acquisifons My role: To Build the Be^er Mouse Trap 4
5 Agenda AugmenFng Nessus vulnerability data with vfeed project Dynamic vulnerability scanning using SNMP and ARP tables IntegraFng the CollecFve Intelligence Framework into Splunk Running SCAP security checklists using Splunk and joval Gain total visibility into network flows using Argus and Sysdig All content available at: h^ps://github.com/splunksec/.conf2015 5
6 Vulnerability Data Enrichment
7 The Incomplete Picture Vulnerability Management is the foundafon of a mature security pracfce A successful remediafon strategy depends on knowing: Is the vulnerability a local or remote exploit? Can an unauthenfcated user perform the exploit? How easy is it to perform the exploit? Is there a known exploit for the vulnerability in the wild? Which patches or updates will reduce the most amount of risk? The data contained in the plugins from most vulnerability scanners cannot answer all of those quesfons 7
8 What is vfeed? h^ps://github.com/toolswatch/vfeed vfeed integrates a wealth of vulnerability data: CVE Common VulnerabiliFes and Exposures CWE Common Weakness EnumeraFon CPE Common Plaform EnumeraFon OVAL Open Vulnerability and Assessment Language CAPEC Common A^ack Pa^ern EnumeraFon and ClassificaFon CVSS Common Vulnerability Scoring System MulFple exploit databases: Exploit- DB, Metasploit, Saint MulFple vulnerability databases: OSVDB, Bugtraq, NVD Vendor Security Advisories: MSFT, Red Hat, Cisco 8
9 Filling in the Gaps vfeed provides mappings between Nessus and CVE IDs Mapping the CVSS metrics to CVE IDs answers: Is the vulnerability a local or remote exploit? Can an unauthenfcated user perform the exploit? How easy is it to perform the exploit? Mapping CVE IDs to public exploit databases answers: Is there a known exploit for the vulnerability in the wild? Mapping CVE IDs to CPE entries answers: Which patches or updates will reduce the most amount of risk? 9
10 How to Build It Install vfeed and create a cron job for daily updates Connect to the vfeed SQLite database using the DB Connect 1 app Create a lookup in Splunk for each table in vfeed Dump each table, sanifze the data, and augment with URL info Download Common InformaFon Model (CIM) app and augment the Vulnerability data model with vfeed fields Modify the CIM Vulnerability data model to perform required lookups Populate the kvstore with vulnerability data Build dashboards driven off data model searches 10
11 Bonus Value vfeed has mappings for Snort IDs to CVE IDs Create a search that will find IDS events and: Lookup the CVE IDs associated with each Snort ID Use mvexpand to create a single event per CVE ID Lookup the CVE ID in the Snort event against any CVEs for the dest/ dest_port/protocol in the Vulnerability kvstore Alarm on a match 11
12 Dynamic Vulnerability Scanning
13 Scheduled Scanning is Risky Missed assets Laptops and tablets may not be connected to the corporate network during the scheduled scanning window Fragile infrastructure Running large scans can exhaust resources on switches, routers, and firewalls Huge address spaces IPv6 networks can be massive and virtually impossible to scan within a typical scanning window Easy evasion Predictable scanning windows create opportunifes for a^ackers to hide evidence of their intrusion 13
14 Splunk Powers Dynamic Scanning Use scripted inputs or SNMP apps to poll network switches for the IP- to- MAC address relafonships Track the scanning history for each MAC address in a lookup table Use that history to launch scans via the Nessus API Index the status of each scan with a scripted input Generate a CSV report via the API when scans complete 14
15 Map IPs to Physical Address For IPv4, SNMP atphysaddress ( ) to enumerate the ARP cache: snmpwalk c public v 2c atphysaddress mib "3C 38 A6 D9 AA 4C " mib "A8 9D 21 DA 86 B3 " For both, SNMP ipnettophysicalphysaddress ( ): snmpwalk c public v 2c ipnettophysicaltable ê IP- MIB::ipNetToPhysicalPhysAddress.2.ipv4." " = STRING: 0:26:5a:f4:1a:28 ê IP- MIB::ipNetToPhysicalPhysAddress.2.ipv6."fe:80:00:00:00:00:00:00:ca:60:00:ff:fe:e9:1a:e9 = STRING: c8:60:0:e9:1a:e9 15
16 Build Scripted SNMP Input Create a search that will find all network switches, dedup the hostname or IP, and write the hostnames/ips to a lookup table Create a simple for loop in a bash script: for switch in `cat../lookups/switches.csv sed 1d ` do echo Switch: $switch snmpwalk c public v 2c $switch ipnettophysicalphysaddress done Schedule the scripted input to run every 5 minutes 16
17 Interact with Nessus 6 API Login and save authenfcafon token: curl - k - X POST - H 'Content- Type: applicafon/json' - d '{"username": nessus","password": ne55us"}' h^ps:// :8834/session 2>&1 grep - Po '(?<=\"token\":\")[^\"]+' List the configured scans on the scanner: curl - k - H 'X- Cookie: token=f99a30c7d590f07880f27aa913ee705955bcaa7b7d51e041' h^ps:// :8834/scans Launch a scan with a list of dynamic IPs: curl - k - X POST - H 'X- Cookie: token=f8f0b0821d0ef193d346a2951dbc9e28314bcf232d40e4e7' - H 'Content- Type: applicafon/json' - d '{"alt_targets": [ , , , "]}' h^ps:// :8834/scans/6/ launch Export a scan to CSV format: curl - k - X POST - H 'X- Cookie: token=f8f0b0821d0ef193d346a2951dbc9e28314bcf232d40e4e7' - H 'Content- Type: applicafon/json' - d '{"format": "csv"} ' h^ps:// :8834/scans/6/export e the scripted input to run every 5 minutes 17
18 How to Build It On each scanner, define the necessary policies and scan configs Use the Nessus API to find the ID of configured scans Create a CIDR match lookup table to assign Nessus IPs and scan IDs to hosts or subnets: dest, nessus_ip, scan_id /24, , /24, ,5 Create a lookup to track the last scan Fme for a MAC address and seed it with data that adds random padding to the last_scan Fme: (sourcetype="nessus" AND signature="12053" OR signature="19506") OR sourcetype=snmp_arp rex field=_raw "(? i)resolves as (?P<hostname>[^$]+)(?=\.)" rex mode=sed field=dest_mac "s/\s/:/g" transacfon maxspan=1h dest eval padding=random()/ *86400 eval last_scan=now()+padding table last_scan,hostname,dest,dest_mac outputlookup nessus_last_scan_lookup 18
19 How to Build It Create a lookup table to queue IPs that need to be scanned Create a search that will check incoming ARP events against the last scan lookup, lookup the scanner IP and scan ID, and save those events to the queue Create a scripted input to iterate through the Nessus scanners, list the status of scan jobs and index the results Create a lookup table to track completed scan jobs and export status Create a script that can iterate through the scan job lookup table and use the Nessus API to export the scan in CSV format Create a file monitor input on the Nessus scanner that will index all CSV files found in each user s files directory 19
20 IntegraFng Threat Intelligence
21 Why Threat Intel? Today s a^ackers are incredibly sophisfcated and agile Threat Intel providers take the offensive against hackers Data is updated more frequently than tradifonal AV vendors Indicators of Compromise (IOCs) can be found in a wide range of security data types 21
22 What is CIF? h^ps://code.google.com/p/collecfve- intelligence- framework/ CIF collects, normalizes, qualifies, and categorizes free and commercial threat intelligence feeds Supported data types: File Hashes (MD5s) IPv4 Addresses Host Names Domain Names URLs (MD5s) v1 stores each category of threat in a separate Postgres database table 22
23 What Data can it Enrich? Network Intrusion DetecFon events (IPv4, Host/Domain names) Network Flow events (IPv4, Host/Domain Names, URL) Proxy Logs (IPv4 Host/Domain names, URL) Firewall Logs (IPv4, URL) Endpoint ProtecFon SoluFons (File Hash, IPv4, Host/Domain names) AnF- Malware solufons (File Hash, IPv4, Host/Domain names, URL) 23
24 How to Build It Install CIF v1 and configure threat intel feeds Connect to the Postgres database using DB Connect App Create Splunk lookup tables for each classificafon type botnet, phishing, spam, etc. Create searches to periodically dump the database tables into lookup tables Create automafc lookups to enhance log data OpFonal: Add a menu context item to check fields against the HTTP API: h^p://eyeis.net/2012/04/querying- cif- data- from- splunk/ 24
25 Automated Security ConfiguraFon Monitoring with SCAP
26 Value and Challenges Security configurafon monitoring can measure the compliance of systems and applicafons against a set of enterprise security standards The human checklist approach is slow, expensive, and prone to error CreaFng customized scripts to perform configurafon checks is expensive to develop and maintain and difficult to instrument and report on 26
27 What is SCAP? SCAP: Security Content AutomaFon Protocol XCCDF: Extensible ConfiguraFon Checklist DefiniFon Format OVAL: Open Vulnerability and Assessment Language Public repositories of SCAP content: h^ps://web.nvd.nist.gov/view/ncp/repository h^p://usgcb.nist.gov/ h^p://iase.disa.mil/sfgs/scap/pages/index.aspx h^ps://benchmarks.cisecurity.org/downloads/ SCAP scanners: Free: h^p:// scap.org/ Commercial: h^p://jovalcm.com/ 27
28 What Does the Data Look Like? XCCDF scan using OpenSCAP: Title Uninstall squid Package Rule uninstall_squid Ident CCE Result pass Title Disable snmpd Service Rule disable_snmpd Ident CCE Result pass OVAL scan using OpenSCAP: DefiniFon oval:ssg:def:959: false DefiniFon oval:ssg:def:957: true DefiniFon oval:ssg:def:955: true 28
29 How to Build It joval Install on central scanning host OpenSCAP yum install openscap openscap- ufls openscap- content Index the XCCDF or OVAL XML files Extract important fields from the rule objects id, Ftle, descripfon, severity, weight, and fixtext Create a lookup table or kvstore containing the policy name and the rule objects above Create automafc lookup to enrich scanner logs with rule data Create an app for the policy files and scripted inputs!!! You must change the file extension from XML or you will break Splunk!!! 29
30 Improving Visibility With Network Flows
31 Ge ng Flow Security Right is Hard What collecfon method to use Neflow protocols or taps/span ports? Where to collect the data Internet connecfons, internal switches, or individual hosts? What flow metrics need to be collected for security or ops? What flow aggregafon and filtering method to use? What events are worth sending to Splunk? How can flows be used to complement other security data? 31
32 What is Argus? h^p://qosient.com/argus/ Free, open source tool capable of generafng flow records from both flow protocols (Neflow, IPFIX) and raw network streams Capable of capturing all, some, or none of the packet payload Supports a rich set of flow metrics Allows tagging of flows based on CIDR match Key architecture components: argusd: Argus flow collector daemon radium: Collects and dedups flows from mulfple Argus daemons Argus clients: Individual client applicafons to search and manage Argus data 32
33 What Can Argus Do? ralabel: Uses CIDR network and host matches to apply labels to flows radark: Looks for high numbers of ICMP unreachable messages to detect scanning behavior rapolicy: Monitors network traffic for violafons of Cisco ACL rules Using advanced ji^er analysis, Argus can detect keystrokes in encrypted tunnels excellent for detecfng back doors Regex pa^ern matching on payload can idenffy SSH on unusual ports 33
34 How to Build It Compile argusd for collecfon servers Compile argus- clients Convert Splunk IPv4 threat intel lookup table to Argus label file format Configure Argus client searches Create Splunk searches to index output of Argus clients Advanced: Use radium to save X minutes/hours/days of all flow records and selecfvely index the data in Splunk 34
35 But Wait Who Dunnit? Argus has no user or process a^ribufon capabilifes all its sees is the network Enter Sysdig Think of sysdig as strace + tcpdump + htop + iqop + lsof + awesome sauce h^p:// Sysdig is a Linux kernel module that can gather data about: User acfvity such as shell commands and network connecfons Process acfvity System performance I/O, CPU, network, and memory Limited Windows/OS X support 35
36 Compile and install sysdig How to Build It Create a scripted input to capture user, UID, PID, PPID, process names and arguments, and IP/port/protocol data for each network connecfon: sysdig evt.type=connect and fd.lip!= p %evt.rawfme.s,%evt.type,%fd.cip,%fd.cport,%fd.sip,%fd.sport, %fd.l4proto,%proc.name,%proc.args,%proc.pid,%proc.ppid,%proc.pname,%user.uid,%user.name Create Create searches for flow/ids/firewall and sysdig events and bind them together with the transacfon command Build alarms and reports that take advantage of the a^ribufon metadata 36
37 Final Thoughts
38 Making the Most of Free All of the ideas presented require basic Splunking skill lookups, transacfons, data models, and database connecfons The vfeed and CIF projects provide excellent metadata enhancement capabilifes without consuming your Splunk license Dynamic vulnerability scanning and SCAP scanning can dramafcally improve vulnerability management with a trivial license cost Argus offers a number of security client tools that offer great visibility with minimal license consumpfon Sysdig allows security to link network events with the users and programs responsible for them 38
39 Future InvesFgaFons Project ArFllery: h^ps:// A python- based low- interacfon honeypot that can be deployed and managed with Splunk Google Rapid Response (GRR) h^ps://github.com/google/grr A comprehensive incident response framework that could be automated using data stored in Splunk, such as Notable Events in the Enterprise Security app 39
40 Get It at Github h^ps://github.com/splunksec/.conf
41 QuesFons? 41
42 THANK YOU
How To Use A Policy Auditor 6.2.2 (Macafee) To Check For Security Issues
Vendor Provided Validation Details - McAfee Policy Auditor 6.2 The following text was provided by the vendor during testing to describe how the product implements the specific capabilities. Statement of
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
Continuous security audit automation with Spacewalk, Puppet, Mcollective and SCAP
Continuous security audit automation with Spacewalk, Puppet, Mcollective and SCAP Vasileios A. Baousis (Ph.D) Network Applications Team Slide 1 Agenda Introduction Background - SCAP - Puppet &Mcollective
Security compliance automation with Red Hat Satellite
Security compliance automation with Red Hat Satellite Matt Micene Solution Architect, DLT Solutions @cleverbeard @nzwulfin Created with http://wordle.net Compliance is a major problem About half of the
IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide
IBM Security QRadar SIEM Version 7.1.0 MR1 Vulnerability Assessment Configuration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
IBM Security QRadar Version 7.2.5. Vulnerability Assessment Configuration Guide IBM
IBM Security QRadar Version 7.2.5 Vulnerability Assessment Configuration Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 93. Product
BMC Client Management - SCAP Implementation Statement. Version 12.0
BMC Client Management - SCAP Implementation Statement Version 12.0 BMC Client Management - SCAP Implementation Statement TOC 3 Contents SCAP Implementation Statement... 4 4 BMC Client Management - SCAP
Qualys PC/SCAP Auditor
Qualys PC/SCAP Auditor Getting Started Guide August 3, 2015 COPYRIGHT 2011-2015 BY QUALYS, INC. ALL RIGHTS RESERVED. QUALYS AND THE QUALYS LOGO ARE REGISTERED TRADEMARKS OF QUALYS, INC. ALL OTHER TRADEMARKS
How to Grow and Transform your Security Program into the Cloud
How to Grow and Transform your Security Program into the Cloud Wolfgang Kandek Qualys, Inc. Session ID: SPO-207 Session Classification: Intermediate Agenda Introduction Fundamentals of Vulnerability Management
Shellshock. Oz Elisyan & Maxim Zavodchik
Shellshock By Oz Elisyan & Maxim Zavodchik INTRODUCTION Once a high profile vulnerability is released to the public, there will be a lot of people who will use the opportunity to take advantage on vulnerable
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels
Scrutinizer Competitor Worksheet Scrutinizer Malware Incident Response Scrutinizer is a massively scalable, distributed flow collection system that provides a single interface for all traffic related to
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
Extreme Networks Security Vulnerability Assessment Configuration Guide
Extreme Networks Security Vulnerability Assessment Configuration Guide 9034869 Published July 2015 Copyright 2007 2015 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to make
ClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014
1 ClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014 About the Presenters Ms. Irene Selia, Product Manager, ClearSkies SecaaS SIEM Contact: [email protected],
Software Vulnerability Assessment
Software Vulnerability Assessment Setup Guide Contents: About Software Vulnerability Assessment Setting Up and Running a Vulnerability Scan Manage Ongoing Vulnerability Scans Perform Regularly Scheduled
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
Network/Internet Forensic and Intrusion Log Analysis
Course Introduction Enterprises all over the globe are compromised remotely by malicious hackers each day. Credit card numbers, proprietary information, account usernames and passwords, and a wealth of
Getting Started with the iscan Online Data Breach Risk Intelligence Platform
Getting Started with the iscan Online Data Breach Risk Intelligence Platform 2 Table of Contents Overview... 3 Data Breach Risk Intelligence... 3 Data Breach Prevention Lifecycle Defined... 3 Choosing
Speed Up Incident Response with Actionable Forensic Analytics
WHITEPAPER DATA SHEET Speed Up Incident Response with Actionable Forensic Analytics Close the Gap between Threat Detection and Effective Response with Continuous Monitoring January 15, 2015 Table of Contents
Threat Advisory: Accellion File Transfer Appliance Vulnerability
Threat Advisory: Accellion File Transfer Appliance Vulnerability Niara Threat Advisories provide timely information regarding new attacks along with how Niara helps companies quickly detect an attack to
WordPress Security Scan Configuration
WordPress Security Scan Configuration To configure the - WordPress Security Scan - plugin in your WordPress driven Blog, login to WordPress as administrator, by simply entering the url_of_your_website/wp-admin
Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008
Automated Penetration Testing with the Metasploit Framework NEO Information Security Forum March 19, 2008 Topics What makes a good penetration testing framework? Frameworks available What is the Metasploit
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
McAfee Web Gateway 7.4.1
Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this
Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM
Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM TODAY S AGENDA Describe the need for SIEM Explore different options available for SIEM Demonstrate a few Use Cases Cover some caveats
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
April 11, 2011. (Revision 2)
Passive Vulnerability Scanning Overview April 11, 2011 (Revision 2) Copyright 2011. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of
SCAP for VoIP Automating Configuration Compliance. 6 th Annual IT Security Automation Conference
SCAP for VoIP Automating Configuration Compliance 6 th Annual IT Security Automation Conference Presentation Overview 1. The Business Challenge 2. Securing Voice over IP Networks 3. The ISA VoIP Security
NetFlow Analytics for Splunk
NetFlow Analytics for Splunk User Manual Version 3.5.1 September, 2015 Copyright 2012-2015 NetFlow Logic Corporation. All rights reserved. Patents Pending. Contents Introduction... 3 Overview... 3 Installation...
Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours
Ethical Hacking and Information Security Duration Detailed Module Foundation of Information Security Lecture with Hands On Session: 90 Hours Elements of Information Security Introduction As technology
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
SourceFireNext-Generation IPS
D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 [email protected] Our Customers Biggest Security Challenges Maintaining security posture
Nessus Agents. October 2015
Nessus Agents October 2015 Table of Contents Introduction... 3 What Are Nessus Agents?... 3 Scanning... 4 Results... 6 Conclusion... 6 About Tenable Network Security... 6 2 Introduction Today s changing
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn
Critical Infrastructure Security: The Emerging Smart Grid Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn Overview Assurance & Evaluation Security Testing Approaches
More Comprehensive Digital Intelligence - CorrelaFng Client and Server- side Data
Copyright 2013 Splunk Inc. More Comprehensive Digital Intelligence - CorrelaFng Client and Server- side Data Allan, Mike, Rahul, Sondra #splunkconf About Us! Allan Tomkinson Senior Developer @Lincoln Financial
mbits Network Operations Centrec
mbits Network Operations Centrec The mbits Network Operations Centre (NOC) is co-located and fully operationally integrated with the mbits Service Desk. The NOC is staffed by fulltime mbits employees,
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests
The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
1 Scope of Assessment
CIT 380 Project Network Security Assessment Due: April 30, 2014 This project is a security assessment of a small group of systems. In this assessment, students will apply security tools and resources learned
Network Security Monitoring: Looking Beyond the Network
1 Network Security Monitoring: Looking Beyond the Network Ian R. J. Burke: GCIH, GCFA, EC/SA, CEH, LPT [email protected] [email protected] February 8, 2011 2 Abstract Network security monitoring
CloudPassage Halo Technical Overview
TECHNICAL BRIEF CloudPassage Halo Technical Overview The Halo cloud security platform was purpose-built to provide your organization with the critical protection, visibility and control needed to assure
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Linux Server Support by Applied Technology Research Center. Proxy Server Configuration
Linux Server Support by Applied Technology Research Center Proxy Server Configuration We configure squid for your LAN. Including transparent for HTTP and proxy for HTTPS. We also provide basic training
Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)
Nessus Enterprise Cloud User Guide October 2, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Enterprise Cloud... 3 Subscription and Activation... 3 Multi Scanner Support... 4 Customer Scanning
Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :
Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh Written Exam in Network Security ANSWERS May 28, 2009. Allowed aid: Writing material. Name (in block letters)
GETTING STARTED WITH THE ISCAN ONLINE DATA BREACH PREVENTION LIFECYCLE
GETTING STARTED WITH THE ISCAN ONLINE DATA BREACH PREVENTION LIFECYCLE iscan Online 5600 Tennyson Parkway Suite 343 Plano, Tx 75024 Table of Contents Overview... 3 Data Breach Prevention... 4 Choosing
Managing Vulnerability Assessment
Security Threat Response Manager Release 2012.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2013-03-12 Copyright Notice Copyright 2013
Federated Threat Data Sharing with the Collective Intelligence Framework (CIF)
Federated Threat Data Sharing with the Collective Intelligence Framework (CIF) Gabriel Iovino (REN-ISAC), Kevin Benton (REN-ISAC), Yoshiaki Kasahara (Kyushu University), Yasuichi Kitamura (APAN) TIP2013
Chapter 1 The Principles of Auditing 1
Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls
COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H.
COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H. IMPLEMENTING A WEB SERVER Apache Architecture Installing PHP Apache Configuration Files httpd.conf Server Settings httpd.conf Main
5 Steps to Advanced Threat Protection
5 Steps to Advanced Threat Protection Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources 20 Years of Chasing Malicious
TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE
TRIPWIRE PURECLOUD TRIPWIRE PureCloud USER GUIDE 2001-2015 Tripwire, Inc. All rights reserved. Tripwire and ncircle are registered trademarks of Tripwire, Inc. Other brand or product names may be trademarks
Whitepaper. Business Service monitoring approach
Whitepaper on Business Service monitoring approach - Harish Jadhav Page 1 of 15 Copyright Copyright 2013 Tecknodreams Software Consulting Pvt. Ltd. All Rights Reserved. Restricted Rights Legend This document
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
INFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
GFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
Eight Essential Elements for Effective Threat Intelligence Management May 2015
INTRODUCTION The most disruptive change to the IT security industry was ignited February 18, 2013 when a breach response company published the first research that pinned responsibility for Advanced Persistent
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life Trevor Richmond, Sales Engineer Trend Micro Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock)
Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser
Security and Billing for Azure Pack Presented by 5nine Software and Cloud Cruiser Meet our Speakers Symon Perriman VP of Business Development 5nine Software [email protected] @SymonPerriman Paul Zinn Senior
Running custom scripts which allow you to remotely and securely run a script you wrote on Windows, Mac, Linux, and Unix devices.
About Foglight NMS Foglight NMS is a comprehensive device, application, and traffic monitoring and troubleshooting solution. It is capable of securely monitoring single and multi-site networks of all sizes,
Cyber Essentials. Test Specification
Cyber Essentials Test Specification Contents Scope of the Audit...2 Assumptions...3 Success Criteria...3 External systems...4 Required tests...4 Test Details...4 Internal systems...7 Tester pre-requisites...8
Using Nessus to Detect Wireless Access Points. March 6, 2015 (Revision 4)
Using Nessus to Detect Wireless Access Points March 6, 2015 (Revision 4) Table of Contents Introduction... 3 Why Detect Wireless Access Points?... 3 Wireless Scanning for WAPs... 4 Detecting WAPs using
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe
Intro to QualysGuard IT Risk & Asset Management Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe A Unified and Continuous View of ICT Security, Risks and Compliance
GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III
QWERTYUIOP{ GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III This GL254 course is designed to follow an identical set of topics as the Red Hat RH254, RH255 RHCE exam prep courses with the added
Application for Splunk Enterprise
Application for Splunk Enterprise User Guide Document Version 1.77 28 October 2015 10004-01 EN Rev. A 2015 ThreatConnect, Inc. ThreatConnect is a registered trademark of ThreatConnect, Inc. UNIX is a registered
TECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.
TECHNICAL NOTE EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.0 and later Technical Note P/N 300-999-649 REV 03 February 6, 2014 This technical note describes how to configure
Securing and Monitoring BYOD Networks using NetFlow
Securing and Monitoring BYOD Networks using NetFlow How NetFlow can help with Security Analysis, Application Detection and Traffic Monitoring Don Thomas Jacob Technical Marketing Engineer ManageEngine
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Sisense. Product Highlights. www.sisense.com
Sisense Product Highlights Introduction Sisense is a business intelligence solution that simplifies analytics for complex data by offering an end-to-end platform that lets users easily prepare and analyze
Introduction to Network Discovery and Identity
The following topics provide an introduction to network discovery and identity policies and data: Host, Application, and User Detection, page 1 Uses for Host, Application, and User Discovery and Identity
CloudPassage Halo Technical Overview
TECHNICAL BRIEF CloudPassage Halo Technical Overview The Halo cloud security platform was purpose-built to provide your organization with the critical protection, visibility and control needed to assure
Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9)
Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Perimeter Service... 3 Subscription and Activation... 3 Multi Scanner Support...
Attacks from the Inside
Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Shellshock Security Patch for X86
Shellshock Security Patch for X86 Guide for Using the FFPS Update Manager October 2014 Version 1.0. Page 1 Page 2 This page is intentionally blank Table of Contents 1.0 OVERVIEW - SHELLSHOCK/BASH SHELL
CH ENSA EC-Council Network Security Administrator Detailed Course Outline
CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DR V2.0 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents Table of Contents
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document
IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide
IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide Note Before using
How To Set Up Foglight Nms For A Proof Of Concept
Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
Managing Qualys Scanners
Q1 Labs Help Build 7.0 Maintenance Release 3 [email protected] Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
