HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS

Similar documents
HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

Maximize Network Visibility with NetFlow Technology. Andy Wilson Senior Systems Engineer Lancope

Scalable Extraction, Aggregation, and Response to Network Intelligence

Flow Based Traffic Analysis

Secure Cloud-Ready Data Centers Juniper Networks

Invisible attacks visible in your network. How to see and follow the tracks?

The Critical Role of Netflow/IPFIX Telemetry in the Next- Generation Network Security Infrastructure

Concierge SIEM Reporting Overview

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

Modular Network Security. Tyler Carter, McAfee Network Security

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM

NetFlow: What is it, why and how to use it? Miloš Zeković, ICmyNet Chief Customer Officer Soneco d.o.o.

Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1

Metric Matters. Dain Perkins, CISSP

RSA Security Analytics

Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013

Centre for the Protection of National Infrastructure Effective Log Management

Securing and Monitoring BYOD Networks using NetFlow

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Introducing IBM s Advanced Threat Protection Platform

Enabling Security Operations with RSA envision. August, 2009

Cisco dan Hotel Crowne Plaza Beograd, Srbija.

Internet infrastructure. Prof. dr. ir. André Mariën

NetFlow The De Facto Standard for Traffic Analytics

with NetFlow Technology Adam Powers Chief Technology Officer

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

NetFlow/IPFIX Various Thoughts

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help

Practical Steps To Securing Process Control Networks

How To Protect A Network From Attack From A Hacker (Hbss)

Take the NetFlow Challenge!

Additional Security Considerations and Controls for Virtual Private Networks

IBM Security QRadar QFlow Collector appliances for security intelligence

SANS Top 20 Critical Controls for Effective Cyber Defense

Cloud Network Security End to End Cloud Overview

Global Partner Management Notice

Security Solutions for the New Threads

Attack and Defense Techniques 2

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

STEALTHWATCH MANAGEMENT CONSOLE

IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

CTS2134 Introduction to Networking. Module Network Security

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Effective Methods to Detect Current Security Threats

The Value of QRadar QFlow and QRadar VFlow for Security Intelligence

USM IT Security Council Guide for Security Event Logging. Version 1.1

Extreme Networks: A SOLUTION WHITE PAPER

CISCO IOS NETFLOW AND SECURITY

Agenda , Palo Alto Networks. Confidential and Proprietary.

Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A

Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014

Firewall Firewall August, 2003

Effective Methods to Detect Current Security Threats

Malicious Network Traffic Analysis

STEALTHWATCH MANAGEMENT CONSOLE

PART D NETWORK SERVICES

74% 96 Action Items. Compliance

How to Get NetFlow from Cisco 3750s. Joe Buchanan System Engineer Manager

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

McAfee Network Security Platform

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)

CNS-301-3I ~ Citrix NetScaler 11 Advanced Implementation

INTRUSION DETECTION SYSTEMS and Network Security

True in Depth Security through Next Generation SIEM. Ray Menard Senior Principal Security Consultant Q1 Labs

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version and earlier

Understanding Flow and Packet Deduplication

Guidelines for Web applications protection with dedicated Web Application Firewall

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

REVOLUTIONIZE THE WAY YOU VIEW YOUR NETWORK GAIN A UNIFIED VIEW OF SECURITY AND NETWORK OPERATIONS ACROSS PHYSICAL AND VIRTUAL NETWORKS

DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

THE ROLE OF IDS & ADS IN NETWORK SECURITY

FileRunner Security Overview. An overview of the security protocols associated with the FileRunner file delivery application

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

The webinar will begin shortly

Firewalls, Tunnels, and Network Intrusion Detection

Basic & Advanced Administration for Citrix NetScaler 9.2

Cisco IOS Flexible NetFlow Technology

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Transcription:

HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS John Pierce jpierce@lancope.com 1

CREATING THE AUDIT TRAIL 2

Network Auditing Basics Maximize Visibility Don t trust the host Store audit data in a central location Use a consistent format Use a consistent time stamp Be mindful of NAT and DHCP Improved Auditing Tie users to network data Store additional information like URLs, DNS, Application IDs Store complete connection records 3

Creating the Trail Logging Provides user and application details Requires translation and aggregation Limited to configured hosts Packet Captures Provide complete network record and unencrypted content Large storage requirement limits visibility or retention length Difficult to search 4

NETFLOW 5

Netflow Basics Does not require host level configuration Devices with one or more Flow producing interfaces are Exporters Exporters cache and forward records to Collectors Common Exporters include firewalls, switches, and routers VPN Internet DMZ NetFlow Packets src and dst ip src and dst port start time end time mac address byte count 3G NetFlow Collector - more - 6

Transactional Audits of ALL activities Much like a phone bill

Logging Standards NetFlow v9 (RFC-3950) IPFIX (RFC-5101) Rebranded NetFlow Jflow Juniper Cflowd Juniper/Alcatel-Lucent NetStream 3Com/Huawei Rflow Ericsson AppFlow - Citrix Basic/Common Fields 8

Extensible Data Fields Data sources can provide additional log information Examples of Extensible Fields Network Based Application Recognition Performance Metrics (SRT/RRT, Collisions) HTTP Headers NAT Data Security Action (Permit/Deny) TTL DSCP Payload 9

Stitching & De-duplication 1 Connection 3 Exporters 6 Interfaces 12 Flow entries Each exporter interface provides a unique view of the connection Internet 10

Stitching & De-duplication 11

NETFLOW TOOLS 12

SiLK Download at http://tools.netsa.cert.org Stores and processes flow Project Managed by Carnegie Mellon CERT 13

PySiLK 14

Commercial Solutions Arbor PeakFlow IBM Qradar Invea-Tech FlowMon Lancope StealthWatch ManageEngine McAfee NTBA Plixer Scrutinizer ProQSys FlowTraq Riverbed Cascade (formerly Mazu) * For comparison see Gartner Network Behavior Analysis Market December 2012 (G00245584) 15

NETWORK AUDIT LOG DETECTION 16

Signature Matching IP Blacklists / IP Reputation Match Indicators Of Compromise for stored values Policy Enforcement Measure Compliance 17

What can you detect with the audit log? Reveal BotNet Hosts Layer 3 Layer 4 and URL

What can you detect with the audit log? Unsanctioned Device and Application Detection Identify the use of unsanctioned applications Detect rogue servers and other rogue devices

Firewall Policy Monitoring And Enforcement Audit Firewall rules Immediately detect misconfigurations Enforce policy between hosts on the same segment 20

Intelligent Analysis Data Exfiltration/Collection Internal Pivot Worm Propagation Covert Channels Abnormal Behavior 21

What Can Intelligent NetFlow Analysis Do? Loss of Protected Data

What Can Intelligent NetFlow Analysis Do? Track Malware Propagation

What Can Intelligent NetFlow Analysis Do? Reveal Recon

FORENSIC INVESTIGATIONS USING THE NETWORK AUDIT TRAIL 25

The Five W s Who did this? What did they do? When did it happen? Where did they go inside my network? Why are they inside? 26

Who External IP/DNS (C&C server, Watering Hole) Internal IP (DMCA notice, Bot notification) Look for: Assets touching that address Activity on those Assets post contact Services used in the contact / post contact Geo location on the external addresses 27

What Self replicating Malware Data Exfiltration Suspect covert channel Look for: Analyze service usage across the network Look for strange Bytes per Connection (too large, small, or regular as appropriate) Look for reverse tunnels Look for very long connections 28

When Analysis should cover everything from the recon phase to today If intrusion/infection detected, all actions of that machine should be analyzed from initial intrusion to verified clean state Look for: Even after you think you have removed the intruder s presence, continue to look for IOC. 29

Where As you uncover new information (IP addresses, countries of origin, exploited services) search your whole data set for the new IOC Analyze all relationships between infected/compromised host and your other assets Look for: Be mindful- the intrusion you have observed may not be the first. 30

Why Are they after your resources or your data? If information was publicly disclosed, where does that info exist in your network? Also, who had access and may have stored local copies? Look for: How data could have left your network What other resources/data may have been attractive to the attacker 31

PUTTING IT TOGETHER 32

Following IOC Waterhole campaign targeting your industry has been publicly disclosed. A quick search of your network audit trail reveals an internal host that accessed the disclosed site. 33

Following IOC Check host details around that time Suspicious HTTP connections right after contact- good candidate for a drive-by download Suspicious download followed by a reverse SSH shell. Most SSH bytes sent by client 34

Following IOC Attacker recons your network. Investigate any hosts contacted by the compromised host. Additionally- look for any other hosts scanning for 445 and 135. 35

Following IOC Since we have uncovered a new IOC (IP address controlling the reverse SSH shell), we should check to see if that host has touched the network anywhere else. Another host showing a reverse shell 36

SQL Injection Large data transfer from your web server to an outside host was detected 37

SQL Injection Where did the data go? 38

SQL Injection Look for suspicious activity targeting the web server and your DMZ 39

Data Theft One of your users has uploaded a large amount of data to the internet. Beron s abnormal disclosure 40

Data Theft What did Beron send? Who received it? 41

Data Theft Where could have Beron gotten the data? 42

Data Theft 43

Data Theft Why did Beron do it? 44

Web www.lancope.com (Company) Twitter @Lancope (Company) @netflowninjas (Company Blog) John Pierce Sr. Security Researcher, Lancope jpierce@lancope.com