XPROBE. Building Efficient Network Discovery Tools. Fyodor Yarochkin



Similar documents
XPROBE-NG. What s new with upcoming version of the tool. Fyodor Yarochkin Armorize Technologies

Network/Internet Forensic and Intrusion Log Analysis

Linux Network Security

Xprobe2++: Low Volume Remote Network Information Gathering Tool

Network performance in virtual infrastructures

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION

Remote Network Analysis

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Countermeasure for Detection of Honeypot Deployment

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

Lab 5 Explicit Proxy Performance, Load Balancing & Redundancy

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

NETWORK SECURITY WITH OPENSOURCE FIREWALL

Proxy Server, Network Address Translator, Firewall. Proxy Server

Information Security Training. Assignment 1 Networking

- Basic Router Security -

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

Firewall Design Principles Firewall Characteristics Types of Firewalls

What communication protocols are used to discover Tesira servers on a network?

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

8 steps to protect your Cisco router

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

CSCE 465 Computer & Network Security

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

CMPT 471 Networking II

Network Monitoring and Traffic CSTNET, CNIC

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

Detecting rogue systems

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

Host Discovery with nmap

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Lecture 02b Cloud Computing II

What would you like to protect?

Security vulnerabilities in the Internet and possible solutions

VXLAN: Scaling Data Center Capacity. White Paper

IPv6 Hardening Guide for Windows Servers

Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures

Distributed Denial of Service Attack Tools

Multifaceted Approach to Understanding the Botnet Phenomenon

Network Access Security. Lesson 10

Dynamic Honeypot Construction

Basic Vulnerability Issues for SIP Security

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Protecting and controlling Virtual LANs by Linux router-firewall

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Chapter 9 Firewalls and Intrusion Prevention Systems

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan

Internet Protocol: IP packet headers. vendredi 18 octobre 13

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS

FortKnox Personal Firewall

Detection of illegal gateways in protected networks

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

HUAWEI OceanStor Load Balancing Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

Content Distribution Networks (CDN)

Content Delivery Networks

The Trivial Cisco IP Phones Compromise

Prevention, Detection and Mitigation of DDoS Attacks. Randall Lewis MS Cybersecurity

On A Network Forensics Model For Information Security

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

Cisco Intercloud Fabric Security Features: Technical Overview

CS5008: Internet Computing

HONE: Correlating Host activities to Network communications to produce insight

SDN and OpenFlow. Naresh Thukkani (ONF T&I Contributor) Technical Leader, Criterion Networks

The ntop Project: Open Source Network Monitoring

VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION

Chapter 8 Security Pt 2

VoIP Fraud and Misuse

Testing Network Security Using OPNET

Hillstone Intelligent Next Generation Firewall

Using SYN Flood Protection in SonicOS Enhanced

Security of IPv6 and DNSSEC for penetration testers

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Networks and Security Lab. Network Forensics

Intrusion Detection Systems

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

1. LAB SNIFFING LAB ID: 10

THE UNIVERSITY OF AUCKLAND

Protocol Security Where?

12. Firewalls Content

Overview - Using ADAMS With a Firewall

13 Ways Through A Firewall

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Network Forensics: Log Analysis

Packet Sniffers Submitted in partial fulfillment of the requirement for the award of degree Of MCA

Overview - Using ADAMS With a Firewall

A P2P SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt

Transcription:

XPROBE Building Efficient Network Discovery Tools Fyodor Yarochkin

Outline Introduction Some motivating stories: real-life attacks Efficient network mapping with Lazy Scan mode Layer 7 extensions Scripting Extensions Data Mining and Experimental Data sharing network

Introducing presenter Fyodor.Y Interests: Intelligence collection/analysis Network discovery and network protocols AI

Attack Trends

China vs. Taiwan briefs of cyber wars

Text Text Text Mystic redirects (2009/03/05)

Attack observations Large number of users were redirected to malware-infected servers, while trying to visit legimate web sites hosted outside of Taiwan island (i.e. zdnet, msn.com, etc)

Traces

Guess.. A node was compromised somewhere enroute. TCP connections were non-blindly hijacked...

Tracing ghost node(s) some spaghetti to quickly discover the node

Discovered attack scenario

Lesson learnt Large number of target nodes are to be probed in order to identify potential enroute attacks. We need a high-performance network discovery tool, capable of operating at Layer7 we need automated tracing capability

more stuff @L7...

Motivation we need more application-level probes

And.. we could actually correlate L7 data with network probing results

but.. we need to minimize network load, because L7 might mean lots of traffic

Also.. Time is another player. We want to be able to monitor network fluctuations in time

So, the Xprobe now NG

The historical note: Xprobe Xprobe project started as remote fingngerprinting tool to probe remote systems using ICMP protocol queries. Other protocols support was added later. Fuzzy fingerprinting mechanism was introduced to improve precision

Further motivation Exploring other protocols running on the top of IP Bulk scanning Probing en-route systems Migrating to IPv6 Honeypots/Nets Improving precision by cross-correlation over time

On the top of IP SCTP/Sigtrans gateways IPv4 to IPv6 gateways...

en route findings Caching systems, transparent proxies etc. L7 switches Reactive IDS/IPS Application Firewalls Active spoofing attacks..

Honeypots Virtual Machines Virtual Networks Incomplete Services

Bulk Scanning Probing en-route devices by large-range scans IPv6

Data cross-correlation Currently correlating data between L7 and network layers.

Current Improvements

Minimizing Network Load Information Gain metrics Lazy-Mode execution Target driven execution New Scan engine (in progress)

Improving Precision Cross correlation between L7 and below

Improving Usability Language Extensions: Python (xprobepy)

Information Gain

Information gain A score calculated for a probe, characterizing how much information the probe is going to bring

Benefits Highest information gain probes are executed first 0 information gain probes are not executed (unless are part of dependency) Possible to optimally minimize network overhead by executing top X /target

Algorithm

Lazy scan and target-driven execution discovery process optimizations

Architecture, briefly..

Data dependency chains Each module is characterized with type of data it requires and provides

Data Dependency based execution

No portscan per se This technically makes port scanning AS IS unnecessary Significally reduces tool noise on the wire

Wire noise rough comparision

Benefits of Data Chaining Probe focused execution (by specifying intended probe) Restrictions can be set: no more than X queries/target use only normalized packets

Negative impact You still may not know about certain ports and applications running on the target system.

Application level

Application level Improving fingerprinting precision en-route interaction Honeypots

L7 fingerprinting Underlying OS can be probed via L7 tests and correlated with other data

Honeypots

VM tricks Possible to identify VMs (not all) by TCP stream analysis

Network level tricks Analyzing MAC addresses, when available

Application Level Tricks We can probe for incomplete implementations of L7 protocols

Current Developments

Work in progress Language bindings L7 modules new engine en-route modules

Future Plans By designing distributed data sharing network it d be possible to collect Multidimensional data Time Sources Targets

IPv6 Action plan Local node discovery: straightforward (multicast) Remote segments: DNS, text file parsing, educated guessing, search engine, beforementioned networking capability

Availability http://xprobe.sourceforge.net (git push in a couple of days) http://github.com/fygrave/xprobepy (due Mid of July)

Questions if you have no questions, feel free to throw your shoe ;-) *jk* fygrave@o0o.nu (o-zero-o)