How To Monitor Attackers On A Network On A Computer Or Network On An Uniden Computer (For Free) (For A Limited Time) (Czechian) (Cybercrime) (Uk) (Cek) (Kolomot



Similar documents
Extending Remote Desktop for Large Installations. Distributed Package Installs

Uncovering secret connections among attackers by using network theory and custom honeypots

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix

Flow-based detection of RDP brute-force attacks

Network Connect Performance Logs on MAC OS

CRYPTUS DIPLOMA IN IT SECURITY

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Pen Test Tips 2. Shell vs. Terminal

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

RMAR Technologies Pvt. Ltd.

FORENSIC ANALYSIS Aleš Padrta

Network Connect & Junos Pulse Performance Logs on Windows

The Value of Physical Memory for Incident Response

Thick Client Application Security

How To Gather Log Files On A Pulse Secure Server On A Pc Or Ipad (For A Free Download) On A Network Or Ipa (For Free) On An Ipa Or Ipv (For An Ubuntu) On Your Pc

Network Traffic Analysis

Networks and Security Lab. Network Forensics

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Penetration Testing Report Client: Business Solutions June 15 th 2015

Transformation of honeypot raw data into structured data

Penetration Test JSPLC. Contact: James, APS (CCNA, CEH) mail.biz

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

The HoneyNet Project Scan Of The Month Scan 27

File Transfer Examples. Running commands on other computers and transferring files between computers

A Critical Investigation of Botnet

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

IDS and Penetration Testing Lab III Snort Lab

Operation Liberpy : Keyloggers and information theft in Latin America

Evolution Of Cyber Threats & Defense Approaches

Advanced Honeypot System for Analysing Network Security

Forensic analysis of a Linux web server

Vulnerability Assessment and Penetration Testing

Honeypots / honeynets

The Open Cyber Challenge Platform *

Second-generation (GenII) honeypots

WHY ATTACKER TOOLSETS DO WHAT THEY DO

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

HONE: Correlating Host activities to Network communications to produce insight

EC-Council Ethical Hacking and Countermeasures

Certified Cyber Security Expert V Web Application Development

13.1 Backup virtual machines running on VMware ESXi / ESX Server

M2M Series Routers. Port Forwarding / DMZ Setup

How To Classify A Dnet Attack

Post Exploitation. n00bpentesting.com

Threat Modelling for Web Application Deployment. Ivan Ristic (Thinking Stone)

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Security Configuration Guide P/N Rev A05

Securing Linux Servers Best Practice Document

19. Exercise: CERT participation in incident handling related to the Article 13a obligations

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Linux VPS with cpanel. Getting Started Guide

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Network Security. Network Packet Analysis

Computer Forensics and Incident Response in the Cloud. Stephen Coty AlertLogic, AlertLogic_ACID

Ethical Hacking Course Layout

CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.

SUREedge Software Appliance (vmware) Installation Guide

AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts

Threat Events: Software Attacks (cont.)

Stephen Coty Director, Threat Research

RSA Security Anatomy of an Attack Lessons learned

Five Steps to Improve Internal Network Security. Chattanooga ISSA

IDS and Penetration Testing Lab ISA 674

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

Oracle Security Auditing

Oracle Security Auditing

Security Event Management. February 7, 2007 (Revision 5)

1. LAB SNIFFING LAB ID: 10

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

How to connect to the University of Exeter VPN service

Network Security, ISA 656, Angelos Stavrou. Snort Lab

IP Application Security Manager and. VMware vcloud Air

McAfee Network Security Platform Administration Course

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Penetration Testing with Kali Linux

Network Forensics Network Traffic Analysis

Network Forensics: Log Analysis

Exercise 7 Network Forensics

Distributed Denial of Service Attack Tools

Honeypots & Honeynets Overview. Adli Wahid Security Specialist, APNIC.net adli@apnic.net

Network Intrusion Analysis (Hands-on)

VCL Access. VCL provides access to Linux and Windows 7 Virtual Machines. Users will only see those images that they are authorized to access.

Challenge 10 - Attack Visualization The Honeynet Project / Forensic Challenge 2011 /

FortiWeb 5.0, Web Application Firewall Course #251

Honeypot as the Intruder Detection System

Tutorial: Using HortonWorks Sandbox 2.3 on Amazon Web Services

NTT Web Hosting Service [User Manual]

DDoS Attacks & Mitigation

First Steps after Installation Guide

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

Your Archiving Service

Passing PCI Compliance How to Address the Application Security Mandates

Setting Up Specify to use a Shared Workstation as a Database Server

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Chapter 9 PUBLIC CLOUD LABORATORY. Sucha Smanchat, PhD. Faculty of Information Technology. King Mongkut s University of Technology North Bangkok

Description: Objective: Attending students will learn:

Transcription:

Recent development of tools to monitor attackers Daniel Kouril, Jan Vykopal lastname @ics.muni.cz 43 rd TF-CSIRT meeting 18 September, 2014, Rome, Italy

About C4e project Single point of contact in Czech Rep. for expert advices and know-how in the investigation of cyber crime. Consortium Masaryk University: CSIRT-MU and Faculty of Law Risk Analysis Consultants Czech Police, Czech National Security Authority and others Core activities: education and training of LEA, research and development: forensic and analytic tools and best practices, legal aspects.

Monitoring successful attackers Motivation Based on our operational experience small number serious attacks vs. large volume of noise Distinguishing between serious and almost harmless activities most attacks come from script-kiddies detection of serious and/or targeted attacks Better understanding of incentives and character of attackers Much less interested in actual attack vectors, etc. Approach Longer-term monitoring, gathering information from breached nodes Allow attackers to do their work and collect evidence

Honeypot-based monitoring Requirements Several places to monitor Host-based monitoring to reveal actions on the node Network level monitoring to access communication with the outside Systematic handling of gathered data (Semi)-automated operations Realistic sandbox but sufficiently contained Utilization of honeypots Farm of high-interaction honeypots and their monitoring Largely based on Honeypot project tools

Schema of the solution

Components Honeypots Acting as unmaintained desktops (Linux) Sebek kernel module to intercept user s behavior Custom PAM modules to accept SSH attempts Management system Management of multiple honeypots Network containment Handling of monitoring data (Sebek, pcap, filesystem) Network level monitoring Full packet dumps (pcap format) Analysis tools

Analysis of Sebek data Intercepted important system calls read(2), open(2), fork(2),... implemented support for execve(2) stored for later evaluation read() calls Keystrokes sent via SSH (passed via pipes) open() calls Files opened by the attacker execve() calls Reconstruction of script runs, non-interactive SSH sessions,...

Network-level monitoring host-based monitoring does not address everything network monitoring eases access to communication Traffic reconstruction Input: PCAP trace uploaded via web Output: list of reconstructed files ready to download Tools: Souslik (based on Bro NSM), Xplico NFAT Advantage: developed and maintained by the community Limitation: cannot cope with encrypted protocols

Network-level monitoring Connection graph Input: PCAP trace loaded in Wireshark Output: connection list presented as graph Tool: Wireviz a plugin for Wireshark Advantage: useful view of traffic Limitation: no longer maintained

Experiment Continuous run for 110 days Cca 27000 attempt detected from 350 IP addresses Mostly focused on root Username No of attempts root 24845 admin 117 postgres 93 oracle 92 test 62...... 42 successful attacks captured and recorded successful login during SSH password attack

Interesting figures Only half of attackers returned after initial breach (21 of 42) The rest never actually utilized access to the machine Out of 21 attacks: 11 manual, 7 automated, 3 unclear Credential changes: 3x passwd, 2x injected SSH public key Only 2 privilege escalations (via public exploits) Only 2 attempts to hide traces (deleting logs and/or history)

Monitoring of IRC bot Perl bot installed by a user monitored over couple of days Estimate of the botnet based on passive monitoring :RAYDENNN! xx@xx.org PRIVMSG #rdn :!u uptime :koopal! ambra@85.x.x.252 PRIVMSG #rdn : 23:04:45 up 89 days, 20:46, 0 users, load average: 55.91, 55.84, 55.91 cca 10 nodes (unique IP addresses) no significant activity after breach, just keep alive msgs, cca 22 hours after the deplyoment, commands to launch DDoS attacks :RAYDENNN! xx@xx.org PRIVMSG #rdn :!u @udp3 69.x.x.132 Only very small fraction reached the target from the honeypot

Summary Tools and best practices to monitor attackers and recover artifacts We try to build upon existing solutions and extend them if needed Souslik, Sebek Results are available to the community

Recent development of tools to monitor attackers Q&A Daniel Kouril, Jan Vykopal lastname @ics.muni.cz www.c4e.cz @csirtmu 43 rd TF-CSIRT meeting 18 September, 2014, Rome, Italy