Richard Bejtlich richard@taosecurity.com www.taosecurity.com / taosecurity.blogspot.com BSDCan 14 May 04



Similar documents
Network Security Monitoring Theory and Practice

The principle of Network Security Monitoring[NSM]

Open Source Network Security Monitoring With Sguil

Network Traffic Analysis

Missing the Obvious: Network Security Monitoring for ICS

When prevention FAILS: Extending IR and Digital Forensics to the corporate network. Ismael Valenzuela

THE ROLE OF IDS & ADS IN NETWORK SECURITY

Networks and Security Lab. Network Forensics

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

CS5008: Internet Computing

Exercise 7 Network Forensics

Deployment of Snort IDS in SIP based VoIP environments

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

You Don t Know What You Can t See: Network Security Monitoring in ICS Rob Caldwell

Open Source Network Security Monitoring With Sguil

HoneyBOT User Guide A Windows based honeypot solution

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Hands-on Network Traffic Analysis Cyber Defense Boot Camp

Chapter 8 Security Pt 2

APPLICATION PROGRAMMING INTERFACE

Concierge SIEM Reporting Overview

Network Intrusion Analysis (Hands-on)

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

CMPT 471 Networking II

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Network Security Monitoring

2010 Carnegie Mellon University. Malware and Malicious Traffic

Global Partner Management Notice

Flow Visualization Using MS-Excel

IDS / IPS. James E. Thiel S.W.A.T.

The Bro Network Intrusion Detection System

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

Topics in Network Security

Intrusion Detection in AlienVault

UNMASKCONTENT: THE CASE STUDY

Second-generation (GenII) honeypots

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Chapter 14 Analyzing Network Traffic. Ed Crowley

Nixu SNS Security White Paper May 2007 Version 1.2

Six Days in the Network Security Trenches at SC14. A Cray Graph Analytics Case Study

How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01

CS 356 Lecture 16 Denial of Service. Spring 2013

Linux Network Security

Networks & Security Course. Web of Trust and Network Forensics

Locking down a Hitachi ID Suite server

How To Protect Your Network From Attack From Outside From Inside And Outside

Architecture Overview

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013

April 11, (Revision 2)

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Introduction to Network Discovery and Identity

Cisco IPS Tuning Overview

Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.

TheTao of Network Security Monitoring

Top 5 Essential Log Reports

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

Security Event Management. February 7, 2007 (Revision 5)

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Peeling Back the Layers of the Network Security with Security Onion Gary Smith, Pacific Northwest National Laboratory

Introduction of Intrusion Detection Systems

INTRODUCTION TO FIREWALL SECURITY

Firewalls, IDS and IPS

Using Tofino to control the spread of Stuxnet Malware

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

An Overview of the Bro Intrusion Detection System

OSSIM. Correlation engine explained. Sample scenario: NETBIOS DCERPC ISystemActivator

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Looking for Trouble: ICMP and IP Statistics to Watch

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

A perspective to incident response or another set of recommendations for malware authors

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Detecting Botnets with NetFlow

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

Intrusion Detection & SNORT. Fakrul Alam fakrul@bdhbu.com

FREQUENTLY ASKED QUESTIONS

Attacks and Defense. Phase 1: Reconnaissance

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Network Security Monitoring

Intrusion Detection Systems (IDS)

The SIEM Evaluator s Guide

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario

Passive Vulnerability Detection

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

First Line of Defense

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Network Forensics: Log Analysis

Lab exercise: Working with Wireshark and Snort for Intrusion Detection

Websense Web Security Gateway: What to do when a Web site does not load as expected

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

Network Security Monitoring: Looking Beyond the Network

co Characterizing and Tracing Packet Floods Using Cisco R

Transcription:

Network Security Monitoring with Sguil Richard Bejtlich richard@taosecurity.com www.taosecurity.com / taosecurity.blogspot.com BSDCan 14 May 04

Overview Introduction to NSM The competition (ACID, etc.) Sguil Case 1: 403 forbidden Case 2: MS-SQL grinding Case 3: MS-SQL version overflow attempt Case 4: Portscan Case 5: Admin-PHP access Case 6: SMB grinding Case 7: Port 20 to port 20 Future developments

Introduction: My Background Hired 1 March 2004 by ManTech Intl. Corp. Previously at Foundstone (02-04), Ball Aerospace & Technology Corp (01-02) Captain in US Air Force CERT (98-01), trained as intel officer (96-01) Author of The Tao of Network Security Monitoring (Addison-Wesley, 800+ pages, due late July 2004) Co-author of Real Digital Forensics (AddisonWesley) with Keith Jones, Curtis Rose (early 2005)

Introduction: Network Security Monitoring NSM is the collection, analysis, and escalation of indications and warnings to detect and respond to intrusions NSM!= IDS Intrusion detection vendors are alert-focused and consider their job done when they activate the red blinking light NSM assumes prevention eventually fails and some intruders are smarter than you Prepare for the worst by collecting everything you can, technically and legally

The Competition: ACID, etc. ACID (acidlabs.sf.net) and the like are Webbased alert browsers They only query, display, and store Snort alerts Do not give enough information for an analyst to make a decision Predominantly consider the number of alerts as a proxy for their severity No capability for workflow, alert categorization, analyst responsibility, or information sharing

ACID's high count implies 'bad'

ACID's clunky query screen

ACID's questionable results

A packet -- so what?

NSM Requirements Need to investigate different sorts of events Normal activity triggers alerts but is not harmful Suspicious activity is unusual but probably not harmful Malicious activity is definitely designed to harm targets Need supporting data to make decisions Alert data provides a potential indicator of security incidents Session data is a content neutral summary of transactions Full content data captures packet-level details, including application contents Statistical data summarizes traffic

Sguil (sguil.sf.net) Sguil is an open source interface for NSM Written by Bamm Visscher, mostly in Tcl/Tk (cross-platform, especially the client) Consists of components to collect NSM data: Alert data: Snort and Barnyard Session data: SANCP or Snort stream4 keepstats Full content data: Second instance of Snort Statistical data: Nothing formal (yet) Detailed install docs for FreeBSD available; Linux, other BSDs work

Sguil Architecture Credit: Chris Reining

Case studies The following case studies show real data collected during the last few weeks Local sensor watches traffic to and from various network perimeters Data has been sanitized to remove identifying information

Case 1 Why did the target respond with 403 Forbidden? This isn't very useful -- it's the intruder's attempt which is more important (even though it failed)

Transcript shows an attempted HTTP MOVE was not accepted by the server. This is not an attack.

Case 2 MS-SQL version overflow attempt -- what caused this?

Because we capture everything technically and legally possible, we see the outbound DNS query prompted a response which triggered Snort

Case 3 MS-SQL sa login failed alerts indicate MS-SQL brute forcing

Integration with Ethereal facilitates understanding binary protocols like TDS, SMB, RPC, etc. Full content data retrieved from sensor is archived locally for forensic and investigative purposes

Case 4 Sguil portscan data is integrated and shows targets and ports scanned, plus TCP flags

Query for traffic from intruder IP shows at least one lengthy interaction with a target. Since full content collection to port 443 is disabled, no transcripts available.

Still query for session data around the time of the attack to see if target system suddenly initiated an outbound connection, or if a new party connected to the victim on another port. Essentially, look for anything suspicious. Nothing happened here, so our estimate is all is well.

Case 5 Alert indicates admin.php access from Brazilian IP Packet data gives details: op=addauthor, id kiegera

Transcript captures Web server reply showing 405 error

Did intruder do anything else? Query session data. Exercise SQL-fu here or use query builder

Session data shows only one transaction, and it corresponds to packet which caused alert Can also launch transcripts from this window or execute a new query by modifying query bar at top

Case 6 4 5 A user in Alaska is trying to establish SMB connections to port 445 TCP. Is this legitimate?

Ethereal follows the entire session and shows this is part of a brute forcing attempt. The target account is locked out.

Query for session data shows hundreds of similar sessions to multiple systems.

Adding a Snort rule to knock down connections with TCP RSTs foils a similar brute forcing attack.

Case 7 Repeated traffic from port 20 to port 20, with no application data. What is this?

Session data query shows traffic from the local IP outbound to the Total Velocity IP, using ports 80, 20, and 21 TCP.

Transcript shows local IP failing to retrieve AddybK.dll; probably infected with malware. Research ties DLL to centralmedia.ws, an adware developer. Note the private source IP in the PORT command.

Bonus Coverage! As I was preparing this presentation, something changed at a client's site...

Never-before-seen (at this site) NetBIOS DCERPC ISystemActivator path overflow alerts appear!

A query for session data shows worm/intruder tried connecting to port 4444 TCP on two targets. Neither shows any bytes of data sent by the source or the destination, so the exploit probably did not succeed. Full content data reveals SYN - RST ACK sessions.

A more complicated session data query tries to discover why these alerts appeared out of nowhere. By querying for one of the target IPs, with session bytes > 0, and ignoring ports 80 and 443, we see exactly when the outside world began interacting with newly available ports on this target. Thanks again to session data, we can inform the client when a change was made to the access control at the client site.

Future Developments Snort rule and sensor management features Sguil 0.4.0 offers SANCP (www.metre.net) to replace Snort keepstats session logging Augment database output to include PostgreSQL and Oracle Test ability to scale Rewrite some components in compiled languages Live CD or install CDs to ease installation FreeBSD port

Questions? Thank you for your time.