Darknet and Black Hole Monitoring a Journey into Typographic Errors



Similar documents
THE VOID AN INTERESTING PLACE FOR NETWORK SECURITY MONITORING

8 steps to protect your Cisco router

A perspective to incident response or another set of recommendations for malware authors

Internet Measurement Research

Security Toolsets for ISP Defense

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Strategies to Protect Against Distributed Denial of Service (DD

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Traffic Monitoring : Experience

Classification of Firewalls and Proxies

F-SECURE MESSAGING SECURITY GATEWAY

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Firewall Firewall August, 2003

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

- Basic Router Security -

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Security of IPv6 and DNSSEC for penetration testers

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

DNS security: poisoning, attacks and mitigation

QUESTION: 1 Which of the following are valid authentication user group types on a FortiGate unit? (Select all that apply.)

Introduction to Network Security Lab 1 - Wireshark

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

Network Traffic Analysis

Passive Vulnerability Detection

Lab PC Network TCP/IP Configuration

Firewall. FortiOS Handbook v3 for FortiOS 4.0 MR3

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address

Network Security CS 192

Chapter 3 LAN Configuration

Basic Network Configuration

4. Getting started: Performing an audit

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2

Setting Up Scan to SMB on TaskALFA series MFP s.

SonicOS 5.9 / / 6.2 Log Events Reference Guide with Enhanced Logging

HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide

General Network Security

EXPLORER. TFT Filter CONFIGURATION

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Linux Network Security

Overview - Using ADAMS With a Firewall

IBM. Vulnerability scanning and best practices

iviz Security Inc (In) Security in Security Products 2013

IBM Security QRadar Version Common Ports Guide

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Attack and Defense Techniques

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Step-by-Step Configuration

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Flow Analysis Versus Packet Analysis. What Should You Choose?

How To Understand A Network Attack

SCADA Security Example

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Cyber Essentials. Test Specification

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Payment Card Industry (PCI) Executive Report 08/04/2014

Practical Network Forensics

Chapter 7. Address Translation

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture

Penetration Testing with Kali Linux

TELE 301 Network Management. Lecture 17: File Transfer & Web Caching

Topics in Network Security

Payment Card Industry (PCI) Executive Report. Pukka Software

DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008

Attack Lab: Attacks on TCP/IP Protocols

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu (Amd66) On Ubuntu 4.5 On A Windows Box

Implementing Secure Converged Wide Area Networks (ISCW)

Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks

Securing Cisco Network Devices (SND)

Desktop Security. Overview and Technology Guidance. Michael Ramsey Network Specialist, NC DPI

Frequent Denial of Service Attacks

Firewall Troubleshooting

Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC)

Firewalls. Pehr Söderman KTH-CSC

Multifaceted Approach to Understanding the Botnet Phenomenon

Looking for Trouble: ICMP and IP Statistics to Watch

DVR Network Security

Client Server Registration Protocol

How to protect your home/office network?

FortKnox Personal Firewall

Challenges in NetFlow based Event Logging

Description: Objective: Attending students will learn:

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Detecting rogue systems

Barracuda Networks Web Application Firewall

Fully supported Antivirus software (Managed Antivirus)

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

Security vulnerabilities in the Internet and possible solutions

The HoneyNet Project Scan Of The Month Scan 27

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

Firewalls and Intrusion Detection

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Firewalls. Chapter 3

Chapter 4 Security and Firewall Protection

Chapter 8 Router and Network Management

How to launch and defend against a DDoS

Transcription:

Darknet and Black Hole Monitoring a Journey into Typographic Errors Alexandre Dulaunoy CIRCL - TLP:WHITE Team CIRCL - Team Restena 12 May 2014 - Honeynet Project Workshop

Motivation and background IP darkspace or black hole is Routable non-used address space of an ISP (Internet Service Provider), incoming traffic is unidirectional and unsolicited. Is there any traffic in those darkspaces? If yes, what and why does it arrive there? And on purpose or by mischance? What s the security impact? What are the security recommendations? 2 of 19

Origin of traffic in the black hole Attackers (and researchers) scan networks to find vulnerable systems (e.g. SSH brute-force) Backscatter traffic (e.g. from spoofed DoS) Self-replicating code using network as a vector (e.g. conficker, residual worms) Badly configured devices especially embedded devices (e.g. printers, server, routers) Our IP-darkspace is especially suited for spelling errors from the RFC1918 (private networks) address space 3 of 19

Why is there traffic Typing/Spelling errors with RFC1918 networks While typing an IP address, different error categories might emerge: Hit wrong key 192.x.z.y 193.x.y.z 172.x.y.z 152.x.y.z Omission of number 192.x.y.z 12.x.y.z Doubling of keys 10.a.b.c 100.a.b.c 4 of 19

Research activities related to spelling errors Spelling errors apply to text but also network configuration 34% omissions of 1 character Example: Network Netork 23% of all errors happen on 3rd position of a word Example: Text Test) 94% spellings errors are single errors in word And do not reappear References Pollock J. J. and Zamora A., Collection and characterization of spelling errors in scientific and scholarly text. J. Amer. Soc. Inf. Sci. 34, 1, 51 58, 1983. Kukich K., Techniques for automatically correcting words in text. ACM Comput. Surv. 24, 4, 377-439, 1992. 5 of 19

IP-Darkspace: Data Collection Implementation tcpdump socat (SSL/TLS) socat (SSL/TLS) tcpdump file:sensorid/yy-mm-dd file:sensorid/yy-mm-dd... processor Minimal sensor collecting IP-Darkspace networks (close to RFC1918 address space) Raw pcap are captured with the full payload Netbeacon a developed to ensure consistent packet capture a www.github.com/adulau/netbeacon/ 6 of 19

Dataset collected and statistics From 2012-03-12 until Today (still active) Nearly 200 gigabytes of compressed raw pcap collected Constant stream of packets from two /22 network blocks no day/night profile. Some peaks at 800kbit/s (e.g. often TCP RST from backscatter traffic but also from typographic errors) 7 of 19

General observations A large part of traffic is coming from badly configured devices (RFC1918 spelling errors) Printers, embedded devices, routers or even server. Trying to do name resolution on non-existing DNS servers, NTP or sending syslog messages. Even if the black hole is passive, payload of stateless UDP packets or even TCP (due to asymmetric routing on misspelled network) datagrams are present Internal network scanning and reconnaissance tool (e.g. internal network enumeration) 8 of 19

Observation per AS Traffic seen in the darknet N Frequency ASN 1 4596319 4134 2 1382960 4837 3 367515 3462 4 312984 4766 5 211468 4812 6 166110 9394 7 156303 9121 8 153585 4808 9 135811 9318 10 116105 4788 Occurrences of activities matching the proportion of hosts in a country. Chinese great-wall is not filtering leaked packets. 9 of 19

Network reconnaissance (and potential misuse): DNS 3684 _msdcs.<companyname>.local 1232666 time.euro.apple.com 104 time.euro.apple.com.<mylocaldomain> 122 ocsp.tcs.terena.org 50000+ ocsp.<variousca> DNS queries to an incorrect nameserver could lead to major misuse A single typo in a list of 3 nameservers is usually unnoticed 10 of 19

A/V Statistics from Misconfigured Resolvers KASPERSKY AVAST KASPERSKY-LABS SYMANTEC MCAFEE SYMANTECLIVEUPDATE TRENDMICRO BITDEFENDER AVG COMODO SOPHOSXL SOPHOS F-SECURE DRWEB PANDASECURITY PANDADOMAINADVISOR KINGSOFT SYMANTECCLOUD PANDASOFTWARE CLAMAV SYMANTECMAIL AVGMOBILATION RISING KASPERSKYLABS FORTINET MCAFEESECURE NPROTECT NORMAN PANDA AVGCLOUD BAIDU PANDAAPP GDATASECURITY NPROTECT2 MALWAREBYTES MCAFEEMOBILESECURITY MCAFEEASAP AVGTHREATLABS AVGATE PANDAPOST BITDEFENDER-ES 11 of 19

Certificate Revocation and Queries from Misconfigured Resolvers The increase of 5% in late 2013 might be due to certificate requirements update (e.g. key size, hashing algorithm updates) A lot of software assumes a certificate to be valid when OCSP or CRL are not accessibles OCSP/CRL Requests 120000 100000 Queries Sources 80000 Frequency 60000 40000 20000 0 201306 201305 201304 201303 201307 201308 201402 201401 201312 201311 201310 201309 Month 12 of 19

Software Updates/Queries from Misconfigured Resolvers Discovering software usage (and vulnerabilities) can be easily done with passive reconnaissance Are the software update process ensuring the integrity of the updates? Update Requests Apple Product Requests 400000 350000 Queries Sources 600000 500000 Queries Sources 300000 Frequency 250000 200000 150000 Frequency 400000 300000 200000 100000 50000 100000 0 0 201306 201305 201304 201303 201307 201308 201402 201401 201312 201311 201310 201309 201306 201305 201304 201303 201307 201308 201402 201401 201312 201311 201310 201309 Month Month 13 of 19

Network Reconnaissance - How To Build Smart DNS Brute-Forcer ASTTF.NET ASUEGYI.INFO ASUS1025C DEFAULT DELICIOUS.COM DELL DELL1400 DELL335873 DELL7777 DELL-PC DELLPOP3 HELP.163.COM HP CLIENT1 MACBOOKAIR-CAD7 MACBOOK-B5BA66 MACBOOKPRO-5357 MAIL.AFT20.COM S3.QHIMG.COM SERVERWEB SERVEUR SERVICE.QQ.COM SMTP.163.COM And many more... 14 of 19

Network Reconnaissance: NetBios Machine Types (1 week) 23 Browser Server 4 Client? 1 Client? M <ACTIVE> 21 Domain Controller 1 Domain Controller M <ACTIVE> 11 Master Browser 1 NameType=0x00 Workstation 1 NameType=0x20 Server 105 Server 26 Unknown 1 Unknown <GROUP> B <ACTIVE> 5 Unknown <GROUP> M <ACTIVE> 1322 Workstation 1 Workstation M <ACTIVE> 15 of 19

Printer syslog to the world or how to tell to the world your printer status 2012-03-12 18:00:42 SYSLOG lpr.error printer: offline or intervention needed 2012-03-23 21:51:24.985290 SYSLOG lpr.error printer: paper out... 2012-08-06 19:14:57.248337 SYSLOG lpr.error printer: paper jam Printers are just an example out of many syslog messages from various devices Information leaked could be used by attackers to gain more information or improve targeted attacks 16 of 19

How to configure your router (without security) Enable command logging and send the logs to a random syslog server Aug 13 10:11:51 M6000-G5 command-log:[10:11:51 08-13-2012 VtyNo: vty1 UserName: XXX IP: XXX ReturnCode: 1 CMDLine: show subscriber interface gei-0/2/1/12.60 Aug 13 10:46:05 M6000-G5 command-log:[10:46:05 08-13-2012 VtyNo: vty2 UserName: XXX IP: XXX ReturnCode: 1 CMDLine: conf t ] Aug 13 10:46:10 M6000-G5 command-log:[10:46:10 08-13-2012 VtyNo: vty2 UserName: XXX IP: XXX ReturnCode: 1 CMD Line: aaa-authentication-template 1100 ]... We will let you guess the sensitive part afterwards... 17 of 19

Misconfigured network interception in Iran for 2 hours? On April 08, 2013, a peak of ICMP time exceeded in-transit were received during 2 hours IP sources allocated in Iran with a nice distribution among Iranian Internet providers 12:29:49.255942 IP 93.126.56.1 > a.b.100.1: ICMP time exceeded in - transit, length 36 12:29:49.255957 IP 80.191.114.59 > a.b.100.1: ICMP time exceeded in - transit, length 36 12:29:49.255963 IP 80.191.114.59 > a.b.100.1: ICMP time exceeded in - transit, length 36 12:29:49.256144 IP 93.126.56.1 > a.b.100.1: ICMP time exceeded in - transit, length 36 12:29:49.256172 IP 93.126.56.1 > a.b.100.1: ICMP time exceeded in - transit, length 36 12:29:49.256481 IP 93.126.56.1 > a.b.100.1: ICMP time exceeded in - transit, length 36 12:29:49.256568 IP 93.126.56.1 > a.b.100.1: ICMP time exceeded in - transit, length 36 12:29:49.257086 IP 80.191.114.59 > a.b.100.1: ICMP time exceeded in - transit, length 36 12:29:49.257098 IP 80.191.114.59 > a.b.100.1: ICMP time exceeded in - transit, length 36 12:29:49.257470 IP 93.126.56.1 > a.b.100.1: ICMP time exceeded in - transit, length 36 12:29:49.257565 IP 80.191.114.59 > a.b.100.1: ICMP time exceeded in - transit, length 36 12:29:49.257603 IP 80.191.114.59 > a.b.100.1: ICMP time exceeded in - transit, length 36 12:29:49.258575 IP 178.173.128.245 > a.b.100.1: ICMP time exceeded in - transit, length 36 12:29:49.258657 IP 178.173.128.245 > a.b.100.1: ICMP time exceeded in - transit, length 36 12:29:49.258669 IP 178.173.128.245 > a.b.100.1: ICMP time exceeded in - transit, length 36 12:29:49.258677 IP 178.173.128.245 > a.b.100.1: ICMP time exceeded in - transit, length 36 18 of 19

Conclusions Security recommendations Default routing/nat to Internet in operational network is evil Use fully qualified domain names (resolver search list is evil too) Double check syslog exports via UDP (e.g. information leakage is easy) Verify any default configuration with SNMP (e.g. enable by default on some embedded devices) Offensive usage? What does it happen if a malicious ISP responds to misspelled RFC1918 addresses? (e.g. DNS/NTP requests, software update or proxy request) Some research projects on this topic? Contact us 19 of 19