FINFISHER: FinFly ISP 2.0 Infrastructure Product Training



Similar documents
Introduction to Operating Systems

Troubleshooting This document outlines some of the potential issues which you may encouter while administering an atech Telecoms installation.

Cisco Application Networking Manager Version 2.0

Using RADIUS Agent for Transparent User Identification

vcenter Server Appliance Configuration

CYAN SECURE WEB APPLIANCE. User interface manual

Troubleshooting the Firewall Services Module

TECHNICAL NOTE. Technical Note P/N REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)

Troubleshooting the Firewall Services Module

NEFSIS DEDICATED SERVER

Securing Networks with PIX and ASA

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

LOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

Configuration Manual

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

Preinstallation Requirements Guide

Viking VPN Guide Linux/UNIX

LifeSize Transit Deployment Guide June 2011

Setting Up Scan to SMB on TaskALFA series MFP s.

File Transfer Examples. Running commands on other computers and transferring files between computers

ISERink Installation Guide

F-Secure Messaging Security Gateway. Deployment Guide

Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux

Configuring Logging. Information About Logging CHAPTER

Command Line Interface User Guide for Intel Server Management Software

Nixu SNS Security White Paper May 2007 Version 1.2

Host Configuration (Linux)

LifeSize Video Communications Systems Administrator Guide

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.

Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements

OpenVPN over SSH tunneling

VoIP Recorder V2 Setup Guide

HP Device Manager 4.6

Cloud.com CloudStack Community Edition 2.1 Beta Installation Guide

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

HOMEROOM SERVER INSTALLATION & NETWORK CONFIGURATION GUIDE

HowTo: Logging, reporting, log-analysis and log server setup Version 2007nx Release 3. Log server version 2.0

Intego Enterprise Software Deployment Guide

Install Guide for JunosV Wireless LAN Controller

NAS 272 Using Your NAS as a Syslog Server

Report on virtualisation technology as used at the EPO for Online Filing software testing

Freshservice Discovery Probe User Guide

.Trustwave.com Updated October 9, Secure Web Gateway Version 11.0 Setup Guide

Management, Logging and Troubleshooting

Basic System. Vyatta System. REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging VYATTA, INC.

Penetration Testing LAB Setup Guide

PZVM1 Administration Guide. V1.1 February 2014 Alain Ganuchaud. Page 1/27

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu (Amd66) On Ubuntu 4.5 On A Windows Box

Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup

LOCKSS on LINUX. Installation Manual and the OpenBSD Transition 02/17/2011

CCNA Security. Chapter Two Securing Network Devices Cisco Learning Institute.

HP A-IMC Firewall Manager

Locking down a Hitachi ID Suite server

OnCommand Performance Manager 1.1

Configuring System Message Logging

Basic Exchange Setup Guide

How to deploy console cable to connect WIAS-3200N and PC, to reset setting or check status via console

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture

Veritas Cluster Server

TimeIPS Server. IPS256T Virtual Machine. Installation Guide

Network Defense Tools

ClearOS Network, Gateway, Server Quick Start Guide

COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command Document Revision History... 10

Executive Summary and Purpose

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering

Implementation of Business Linux Routers

Syslog & xinetd. Stephen Pilon

BorderWare Firewall Server 7.1. Release Notes

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

NetIQ Advanced Authentication Framework - MacOS Client

Access Instructions for United Stationers ECDB (ecommerce Database) 2.0

Installing and Configuring Active Directory Agent

Virtual Appliance Setup Guide

FWSM introduction Intro 5/1

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

Chapter 9 Monitoring System Performance

PARALLELS SERVER BARE METAL 5.0 README

Setting up pfsense as a Stateful Bridging Firewall.

SonicWALL PCI 1.1 Implementation Guide

HP StorageWorks XP Performance Advisor Software Installation Guide

Security Configuration Guide P/N Rev A05

System Area Manager. Remote Management

Troubleshooting Tools to Diagnose or Report a Problem February 23, 2012

Passive Vulnerability Scanner 4.2 User Guide. June 8, 2015 (Revision 12)

GlobalSCAPE DMZ Gateway, v1. User Guide

SSL Tunnels. Introduction

Installing and Using the vnios Trial

Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release

Cisco Setting Up PIX Syslog

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

White Paper. Intrusion Detection Deploying the Shomiti Century Tap

Output Interpreter. SHOW RUNNING-CONFIG SECURITY Analysis SHOW RUNNING-CONFIG - FW Analysis. Back to top

NOC PS manual. Copyright Maxnet All rights reserved. Page 1/45 NOC-PS Manuel EN version 1.3

Red Hat Linux Networking

HP Client Automation Standard Fast Track guide

Gigabyte Content Management System Console User s Guide. Version: 0.1

11.1. Performance Monitoring

Installing and Configuring Websense Content Gateway

Transcription:

1 FINFISHER: FinFly ISP 2.0 Infrastructure Product Training

Table of content 2 1. Introduction 2. The infrastructure - ADMF Client and Infection GUI - Administration: ADMF - iproxy: NDP01/02 - Radius Probe: RP01/02 - Communication 3. Use Case Infection 4. System handling 5. Technical details 6. Incident handling

Vielen Dank für die Aufmerksamkeit 3 1. Introduction Who we are

Introduction 4 Delegates: Consultin g Security Audit Nicolas Mayencourt Head of Dreamlab Technologies AG Member of the Board of Directors, ISECOM Member OWASP Richard Sademach Head of Operations Dreamlab Technologies AG Education Solutions / Operation

Vielen Dank für die Aufmerksamkeit 5 2. The infrastructure Overview & components

Infrastructure overview: components 6 3 4 1. ADMF-Client & Infection GUI 2. ADMF 3. iproxy NDP01/02 4. Radius Probe RP01/02 1 2

1. ADMF Client and Infection GUI 7 ADMF Client Graphical User Interface for managing Infections Configuring Infections Selection of Infection method Realtime status information Management of all components

1. ADMF Client Infection GUI 8 Separate Training

1. ADMF Client and Infection GUI 9 Hardware: HP Compaq 8000 Elite Business PC 1 x Copper 10/100/1000 Software: FinFly ISP GUI XMPP Client Windows 7 Ultimate

2. ADMF - Central Administration Function 10 Core component of the FinFly ISP infrastructure Realtime communication with all components NDP, RP, FinFly Gui Configuration and initiation of infections on the ADMF Provisioning of the ADMF Client, iproxy and RP Realtime exchange of information and states Targets coming online, being infected, etc RFC XMPP protocol used for secure and encrypted communication (TLS based)

2. ADMF - Central Administration Function 11 Hardware: HP DL380 G6 2x Intel(R) Xeon(R) CPU X5550 @ 2.67GHz Memory: 12 GB 3 x 146 GB SAS 2,5'' (Raid 5) 4 x Copper 10/100/1000 1 x ILO (Integrated Lights Out) OS:Linux GNU (Debian 5.0), hardened by Dreamlab best practices Software: ADMF Adminstration function Ejabberd (XMPP server)

ADMF Configuration 12 ADMF Configuration Name: instance.conf Path: /home/iproxy/service/admf/etc/

3. NDP01 / NDP02 iproxy 13 Network data processing component Infections remotely activated/deactivated via the ADMF/ADMF GUI Provisioning of the actual target IP-Address from the RP via the ADMF Each NDP bridge is equipped with a carrier grade 10GB/s fiber bypass module In case of hardware or logical failures this module switches automatically to bypass-mode. Thus traffic will never be interrupted. Attention this is a highly dynamic bridge / fw environment: DO NOT change any configuration manually The NDP has been specifically configured for this network. Any configuration change of the network i.e. protocolstacks, media, failover features etc must be tightly coordinated with Dreamlab. Not doing so most probably will lead to an unusable system.

3. NDP01 / NDP02 iproxy Hardware: 14 HP DL380 G7 2x Intel(R) Xeon(R) CPU X5650 @ 2.67GHz Memory: 12 GB 3 x 146 GB SAS 2,5'' (Raid 5) 4 x Copper 10/100/1000 1 x Fiber Multimode Bypass NIC 1 x ILO (Integrated Lights Out) OS:Linux GNU (Debian 5.0), hardened by Dreamlab best practices Software: NDP Network Data Processor IProxy infection Proxy ADMF Client

NDP Configuration 15 NDP Configuration Name: instance.conf Path: /home/iproxy/service/ndp0[12]/etc/

4. RP01 / RP02 Radius probe 16 Realtime monitoring of the AAA processes: Targets coming online, receiving IP addresses, changing IP addresses, going offline Recording of the RADIUS authentications and accounting dialogues Being always up-to-date of the target IP address RP sends information to the ADMF The ADMF provisions the NDP's For statically configured IP addresses this is not needed The target identification has been specifically configured for the local setup. Any configuration changes of the AAA / Radius setup must be tightly coordinated with Dreamlab. Failure to do so will most probably lead to an unusable system.

4. RP01 / RP02 Radius probe 17 Hardware: HP DL380 G6 2x Intel(R) Xeon(R) CPU X5550 @ 2.67GHz Memory: 12 GB 3 x 146 GB SAS 2,5'' (Raid 5) 4 x Copper 10/100/1000 1 x Intel quad port 1G copper 1 x ILO (Integrated Lights Out) OS:Linux GNU (Debian 5.0), hardened by Dreamlab best practices Software: RP Radius Probe ADMF Client

RP Configuration 18 RP Configuration Name: instance.conf Path: /home/iproxy/service/rp0[12]/etc/

Communication visualized 19 NIC NDP Infection SW Radius Probe NIC The communication of all components always is initiated towards the ADMF: RP ADMF NDP ADMF Inf.SW NDP ADMF ADMF-Client ADMF ADMF Once the communication is established the information flow is bidirectional (red arrows). ADMF-Client Infection GUI

Communication: Traffic matrix 20 from / to ADMF ADMF- GUI NDP RP ADMF none none TCP 62200 TCP 62200 ADMF-GUI TCP 62200 / TCP 17990 / TCP 443 / TCP 5222 TCP 23 none TCP 62200 / TCP 17990 / TCP 443 TCP 23 TCP 62200 / TCP 17990 / TCP 443 TCP 23 NDP TCP 62200 / TCP 5222 none none TCP 62200 RP TCP 62200 / TCP 5222 none TCP 62200 none

Vielen Dank für die Aufmerksamkeit 21 3. Use Case Infection

Use Case Infection 22 Step Direction Action content Details 1 GUI -> ADMF Infect a target Send infection information Target information / infection mode 2 ADMF -> Radius probe Start monitoring and set a trap on this target Actual IP address of target is known 3 Radius -> ADMF -> NDP / iproxy Handover actual IP address IP address 4 iproxy -> NDP Iproxy requests NDP to analyse the datastream on IP address and interesting traffic 5 NDP -> iproxy Handover traffic matching the request Target IP address Stream is redirected to iproxy 6 iproxy changes the traffic and modifies the data by adding the infection parts

Use Case Infection 23 Step Direction Action content Details 6 iproxy changes the traffic and modifies the data by adding the infection parts 7 iproxy -> NDP iproxy sends the modifed traffic back to NDP 8 NDP Reinject NDP recalculates checksums, resequences TCP/IP packets and reinjects the traffic into the stream 9 Target infection done Data successfully sent to target

Use Case Infection 24 10. Infection succeeded Start operating the target Seperate training

Vielen Dank für die Aufmerksamkeit 25 3. System handling Management network ILO access

Management network 26

Management network access 27 The iproxy components can either be accessed via SSH or ILO. These interfaces are solely made available on the management network. SSH : Secure shell is being used to directly access the iproxy components for all configuration changes, operation and debugging on system-level ILO : Integrated lights out management is the dedicated access being used to manage system HW-components. i.e.: stop/start of the system hardware, hardware-monitoring, remote system console, etc

SSH access 28 SSH : secure shell maintenance access on system level

ILO access 29

ILO access 30

ILO access 31 ILO Power: button press for power on/power off Attention: It really works!

ILO access 32

ILO access 33

ILO access 34

ILO access 35 Log information from low level hardware components

ILO access 36 ILO System remote console information: choose the remote console

ILO access 37 ILO: access the OS via the ILO remote console

Vielen Dank für die Aufmerksamkeit 38 6. Technical Details Commonly used SW components System and Bios Hardening

Commonly used SW components 39 Daemontools: Used to provide a high level of availability for the installed core SW components Ssh: Ntp: Remote secure command-line access to the iproxy components for management purposes Being used for synchronizing the time on the iproxy components Syslog-ng: Used for collecting all system and application events Possibility to send a copy of the events to a defined e-mail address Shorewall (Except the NDP-Component): High level configuration user-land frontend for the onboard firewalls

System and Bios Hardening 40 System: Firewall configured deny all, allow specifically Removed unnecessary services Disabled Ipv6 No direct root login allowed Minimal software stack Security optimized configuration for all services Bios: Boot order and media Bios password In case of power failure: Auto power on

Vielen Dank für die Aufmerksamkeit 41 7. Incident Handling Hands on / System Training

SSH access 42 Secure shell / SSH is used for accessing the iproxy-components: Command: ssh host l user p 62200 Parameters: host: hostname -l username -p portnumber

User Identification 43 The command `id` is used for identifying the active user: Command: Parameters: Output: id n.a. uid (user-id), gid (group-id), groups (groups the user belongs to)

Using root-privileges 44 The command `su` is used to gain root-privileges: Command: su - Parameters: - (to start the root-shell from home-path) Output: n.a. Attention: You are working on live systems, you may break things!

Kernel debug messages 45 The command `dmesg` is used for displaying kernel debug messages: Command: Parameters: Output: dmesg n.a. see above

Dir containing all system logs 46 The command `ls` lists the directory containing all system log files: Command: Parameters: Path: Important Log Files: ls i.e: -lah /var/log daemon.log, messages, kern.log, auth.log, dmesg, syslog

List log directory by date 47 List the log directory by date: Command: Parameters: Output: ls -laht -l = list -a= all -h= human readable -t = sort by date all files sorted by date

Messages log 48 The messages file contains all important system logs: Command: Parameters: Output: cat /var/log/messages see above

ADMF Log 49 The ADMF log file contains all messages from the admf service: Log File Path: Command: Parameter: Output: /home/iproxy/service/admf/service/log/logfiles/current less /home/iproxy/service/admf/service/log/logfiles/current see above

NDP Log 50 The NDP log file contains all messages from the ndp service: Log File Path: Command: Parameter: Output: /home/iproxy/service/ndp/service/log/logfiles/current less /home/iproxy/service/ndp/service/log/logfiles/current see above

RP Log 51 The RP log file contains all messages from the rp service: Log File Path: Command: Parameter: Output: /home/iproxy/service/rp/service/log/logfiles/current less /home/iproxy/service/rp/service/log/logfiles/current see above

List all running processes 52 The command `ps` lists processes running on the system: Command: Parameters: Output: ps -aux -a = all processes, -u = list by user-id, -x = list by tty all running processes, see above

Realtime system performance statistics 53 The command `top` lists in realtime all processes running on the system: Command: top d1 Parameters: -d = delay in seconds (here = 1 second) Output: see above

Secure filecopy over SSH 54 The command `scp` is used for copying files from one server to another via ssh: Command: Parameters: Output: scp P 62200 files user@host:/directory -P 62200 (Portnumber to be used), files = the filename to be copied, user@host = user who logs into the target system, /directory: where to copy the file see above

List active network interface configurations 55 The command `ifconfig` is used for listing active nic configurations: Command: Parameters: Output: ifconfig n.a. see above

Network interface configuration 56 The network configuration is stored in configuratin files on the systems. The file is on /etc/network/interfaces

List active routing configuration 57 The command `route` is used for listing the active routes: Command: Parameters: Output: route -n = do not resolve IP addresses routing table

Show network statistics 58 The command `netstat` is used for listing network statistics: Command: Parameters: Output: netstat -t = tcp-connection, -u = udp, -l = list, -p = program, e= extended output, -n = do not resolve IP address Network statistics

Analyze network packets 59 The command `tcpdump` is used to analyze network packets: Command: Parameters: Output: tcpdump -n= do not resolve IP address, -i = interface name to dump see above

Analyze contents of packets on a network 60 The command `tcpdump` is used to analyze network packets: Command: Parameters: Output: tcpdump -n= do not resolve IP address, -i = interface name to dump, host = hostaddress to filter on see above

Analyze contents of packets on a network 61 The command `tcpdump` is used to analyze network packets: Command: Parameters: Output: tcpdump -n= do not resolve IP address, -i = interface name to dump, port = port to filter on see above

Analyze contents of packets on a network 62 The command `tcpdump` is used to analyze network packets: Command: tcpdump ni eth0 port 53 and proto UDP Parameters: -n= do not resolve IP address, -i = interface name to dump, port = Port to filter on, proto = Protocol to filter on, Output: see above

Daemon Tools Usage 63 Daemon Tools is used for starting / stopping the iproxy services a Daemon Tools File structure is needed: /home/iproxy/service/admf /data/ /etc/instance.conf /service /log/ /run /supervise/ To activate the service admf, the /home/iproxy/service/admf/service directory has to be linked in to the /etc/service folder

Daemon Tools Usage 64 Daemon Tools is used for starting / stopping the iproxy services Once the service is linked and activated it constantly restarts itself when having problems The activated service can be controlled via the svc command: svc -t /etc/service/admf: sends a TERM Signal, and automatically restarts the daemon after it dies svc -d /etc/service/admf: sends a TERM Signal, and leaves the service down svc -u /etc/service/admf: brings the service back up svc -o /etc/service/admf: runs the service once

Hands on experience on demand 65 What would you like to explore in greater detail? Collecting network traces Collecting logs Collecting evidence More system training Tell us

Incident handling 66 Basically the systems just work. In case something does not work or you are not sure: 1) Collect data, evidences, log files 2) Contact our helpdesk 3) More details (including contact) in the system manual 4) We fix things together

Vielen Dank für die Aufmerksamkeit 67 Questions? Thank you for your attention!