Passive SSL. Passive Detection and Reconnaissance Techniques, to Find, Track, and Attribute Vulnerable Devices



Similar documents
A perspective to incident response or another set of recommendations for malware authors

Description: Objective: Attending students will learn:

Internet Privacy Options

Integrated SSL Scanning

Internet Mail Client Control Library SSL Supplement

User Identification and Authentication

Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address :

Project X Mass interception of encrypted connections

SSL BEST PRACTICES OVERVIEW

The Benefits of SSL Content Inspection ABSTRACT

Passive Vulnerability Detection

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Darknet and Black Hole Monitoring a Journey into Typographic Errors

Instructions Android Smartphone & Tablet Page 1

Proxies. Chapter 4. Network & Security Gildas Avoine

Network Configuration Settings

QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Network Flow Analysis. egambit, your defensive cyber-weapon system. You have the players. We have the game.

BlackRidge Technology Transport Access Control: Overview

Integrated SSL Scanning

Digital certificates and SSL

Cyber Essentials. Test Specification

Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.

Deploying Layered Security. What is Layered Security?

CS5008: Internet Computing

IPv4 Shortage Multiple SSL Certificates on a single IP address

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

DMH remote access. Table of Contents. Project : remote_access_dmh Date: 29/05/12 pg. 1

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Gateway

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Configuring Global Protect SSL VPN with a user-defined port

Effective Methods to Detect Current Security Threats

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Logs and Tactical Defence. Allan Stojanovic David Auclair University of Toronto #include <disclaimer.h>

Reducing the Impact of Amplification DDoS Attack

Network Fundamentals Carnegie Mellon University

Divide and Conquer Real World Distributed Port Scanning

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Effective Methods to Detect Current Security Threats

[SMO-SFO-ICO-PE-046-GU-

F-SECURE MESSAGING SECURITY GATEWAY

Initial Setup of Mozilla Thunderbird with IMAP for Windows 7

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

SSL Report: ebfl.srpskabanka.rs ( )

Stopping secure Web traffic from bypassing your content filter. BLACK BOX

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Useful Tips for Reducing the Risk of Unauthorized Access for Network Cameras Important

Network Security Monitoring

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng.

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Deployment Guide Jan-2016 rev. a. Deploying Array Networks APV Series Application Delivery Controllers with Oracle WebLogic 12c

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v ONWARDS)

Configuring Security for FTP Traffic

Security Policy JUNE 1, SalesNOW. Security Policy v v

Administrator's Guide

HOB WebSecureProxy as an SSL Terminal for Clients

Instructions Microsoft Outlook Express Page 1

SSL Inspection Step-by-Step Guide. June 6, 2016

7.1. Remote Access Connection

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA

Automated Vulnerability Scan Results

CMPT 471 Networking II

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Configuration Guide BES12. Version 12.2

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Malicious Network Traffic Analysis

Use Domain Name System and IP Version 6

IP Phone Presence Setup

Step-by-Step Configuration

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2

Using a VPN with CentraLine AX Systems

Systematization of Knowledge Lessons Learned From SSL/TLS Attacks

How to configure SSL proxying in Zorp 3 F5

Network Security Topologies. Chapter 11

CTS2134 Introduction to Networking. Module Network Security

The Savage Curtain: Mobile SSL Failures

Owner of the content within this article is Written by Marc Grote

Concierge SIEM Reporting Overview

Chapter 3 LAN Configuration

Transport and Network Layer

UBIQUITI BRIDGE CONFIGURATION PROCEDURE (PowerStation & NanoStation Units ONLY)

Advanced Mail Server Settings Options for Shared Hosting Clients

TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1

Six Days in the Network Security Trenches at SC14. A Cray Graph Analytics Case Study

True False questions (25 points + 5 points extra credit)

Transcription:

Passive SSL Passive Detection and Reconnaissance Techniques, to Find, Track, and Attribute Vulnerable Devices Alexandre Dulaunoy @adulau Eireann Leverett @blackswanburst TLP:WHITE June 17, 2015

Datasets used Eireann used Shodan stream of certificates (350k certificates in counting Bloomfilter). Thanks to John (Shodan) Matherly. Alex used the CIRCL Passive SSL datasets (around 100 millions certificates). Thanks to GCHQ (for the idea). 2 of 20

Problem statement CSIRT or LIRT or security analysts have recurring issues to: Find owners of IP addresses. Detect usage of CIDR blocks. Find vulnerable systems passively (and avoid intrusive scanning). Scale of potential impact. Detect compromised services. 3 of 20

Acknowlegement Thanks to GCHQ and the FLYING PIG program and Edward Snowden for releasing the document. Double edge techniques that can be used for good or bad reasons. Another opportunity to improve your threat modeling and your weak TLS knowledge. 4 of 20

Passive SSL Replicating Passive DNS concepts into SSL/TLS. Keeping a history of X.509 certificates seen per IP address. Usage over time of the X.509 certificates. Providing a search ReST interface per IP address, CIDR block. Tracing the use of CA and CRL/OCSP. 5 of 20

Collecting X.509 Certificates - Internet Scanning Scan the Internet yourself (e.g. In a single scan of the IPv4 space, close to 50 millions certificates). Which port to scan? protocol or service? pps? How often? (e.g. weekly scan helps to determine the stability of an IP,Certificate tuple) Cannot scan, you can reuse existing scanning data (e.g. scans.io). 6 of 20

Collecting X.509 Certificates - Passive DNS - SNI On a single IPv4 address, you can have more than one certificate. Alternate SSL ports, multihomed systems Other services: SSL-VPN, ESMTP, DTLS, IMAP,... How to scan IPv6 address space for X.509 Certificates. Passive DNS used as a source for SNI (Server Name Indication) value or IPv6 addresses. Passive DNS record fetcher TLS scanner IPv4 - A records IPv6 - AAAA records 7 of 20 SMTP - MX records STARTTLS scanner

Collecting X.509 Certificates - Network Interception Tapping a network interface where SSL/TLS handshakes are performed. TCP reassembly is still hard and finding SSL/TLS handshakes is a complementary problem. ssldump 1, Suricata, Moloch,... If you collect SSL/TLS handshakes in your internal network, don t forget the impact of intercepting proxies. 1 http://www.github.com/adulau/ssldump 8 of 20

Collecting X.509 Certificates from Tor exit nodes Tor exit nodes traffic is an interesting source of alternative X.509 certificates (e.g. Tor circuits, XMPP sessions, TLS on non-standard ports). A huge proportion of flows uses TLS which provides a good overview of the most active X.509 certificates (e.g. Google,.vk.com...). Don t forget, not all the security researchers have good intention (e.g. FLYING PIG). 9 of 20

Security Perspective of X.509 Certificates Subject Name and Issuer Name can provide a lot of details about the devices, issuers or the overall security practices. A lot of X.509 certificates are automatically generated without the users knowledge. Detailed or sensitive information can leak in the X.509 certificate fields. 1 4 fd64e325ec7a14ac2e34bb5cfed28fef24c3ffb, C=DE, ST=Bavaria, L=Ingolstadt, O= Kaspersky Lab GmbH, OU=Pre Sales, CN=rdg. klab. i t. cx / emailaddress= consulting@ kaspersky. de 2 dc4a127eae8a47a8041a4ce7f1a214c3e6957cd6, C=RU, ST=Moscow, L=Moscow, O=Kaspersky Lab 3 ZAO, OU=IT, CN=n o r d n e t s y n c. a n t i t h e f t. k a s p e r s k y. com 8 a9c839f2ff275c79a985ea84b89bc9fa404d010, C=RU, ST=Moscow, L=Moscow, O=Kaspersky Lab, OU=IT, CN=owa. kaspersky. com 10 of 20

Key-size distribution 11 of 20 Occurences Key-size 181899 1024 143532 2048 4997 512 2845 4096 1467 3072 36 1023 33 256 30 2432 26 768 13 8192 11 2047 10 1536

Key-size and Revocation 12 of 20

An Overview of Most Common Self-signed Certificates 13 of 20

Most Common Subject and Org Names in X.509 14 of 20

Dyre malware and SSL fingerprint Dyre malware contains a list of static IP addresses to reach as C&C. What kind of C&C? 1 {"5.44.15.70": ["C=US, ST=CA, L= San Jose, O= Ubiquiti Networks Inc., OU = Technical Support, CN = UBNT / emailaddress = support@ubnt. com "]} 2 {"93.184.71.88": ["C=US, ST=CA, L= San Jose, O= Ubiquiti Networks Inc., OU = Technical Support, CN = UBNT / emailaddress = support@ubnt. com "]} The compromised Ubiquiti routers (with default password) were compromised to proxy SSL connections. 15 of 20

How to find user of a specific software? Who use MobileIron Mobile Device Management? More than 11000 certificates on a two-year period. 1 c2ef4df6c7be287f78ae9178d65e8078f253cfb1, C=US, ST=C a l i f o r n i a, L=Sunnyvale, O= MobileIron, OU=Support, CN=ActiveSyncProxyCA / emailaddress=support@ mobileiron. com 2 5 c10590f0e977c15805124ddc00f470383768b10, C=US, ST=C a l i f o r n i a, L=Sunnyvale, O= MobileIron, OU=Support, CN=usslmmdmsecapp004. net. plm. eds. com/ emailaddress= support@ mobileiron. com 3 9 ce9edf68ecbf59c746e0d3bbe6d98d72b65fed3, C=US, ST=C a l i f o r n i a, L=Sunnyvale, O= MobileIron, OU=Support, CN=mbx desat otn. defdh. astrium. eads. net / emailaddress= support@ mobileiron. com 4 b47ec8382624035448eebcf15a1cd402425ca661, C=US, ST=C a l i f o r n i a, L=Sunnyvale, O= MobileIron, OU=Support, CN=ActiveSyncProxyCA / emailaddress=support@ mobileiron. com 5 5190314 e4590420e75a2e7b21c74b34255da0806, C=US, ST=C a l i f o r n i a, L=Sunnyvale, O= M o b i l e I r o n, OU=Support, CN=a t s. p a t r i z i a. ag / e m a i l A d d r e s s=s u p p o r t @ m o b i l e i r o n. com 16 of 20

Detecting dynamic IP ranges? SSL/TLS services are often running on dynamic IP ranges. Users use dynamic DNS. Dynamic ranges managed by ISP can be detected and associated users too. 1 d53cc7380ed06c8b8ef0163952c9c534afad7ab8,cn=pino007. ath. cx 2 92 bfef7362de7b381c723a2a352d54d82d49712a,cn=profinance. ath. cx 3 2 cd0f2033c756222c976b631dba1a95a87aeadf9,cn=kschaub. ath. cx 4 c0de4fe83452046c0529b74f6081a39f82907746,cn=f f e r e m o t e. ath. cx 5 b0d04a23ff6da2191d7b78f72352f1196802f61f,cn=hm01 s e r v e r. Filmhotel. local, CN= l o c a l h o s t, CN=hm01 s e r v e r, CN=companyweb, CN=f i l m h o t e l. ath. cx 6 a4b54adb780a5c9ea737399f9492f9f4dafc721d,cn=praxis d r c i f t c i. ath. cx 7 77 b89a57304256562ebfa42024fa9adeb304ad5a,cn=remote. mandk. ath. cx 17 of 20

Popcorn time 1 e4bd71c2e365b61b39d775ba43ef936a4fe9175c, C=Unknown, ST=Unknown, L=Unknown, O= Unknown, OU=Unknown, CN=. 2 1 fc3a857a14ca15d3c37fdb2c8b7e0de01e4f0fd, C=IL, ST=Tel Aviv, O=Visonic Ltd., CN=. 3 397 b25c864131bc78aff25622296171d60843318, C=IE, ST=Dublin, O=Fuck SSL Cartels, CN=. nosmo. me/ emailaddress=nosmo@nosmo. me We can laugh at everything? Especially with this certificate proposed by 94.242.58.131 1 06892001 be0854570546b1e609d33a5510290e3b, C=US, ST=C a l i f o r n i a, L=Mountain View, O= GeoTrust Inc., OU=GeoTrust Global CA, CN=. 2 3 I s s u e r : C=US, ST=C a l i f o r n i a, L=Mountain View, O=GeoTrust I n c., OU=GeoTrust G l o b a l CA, CN=. 4 V a l i d i t y 5 Not Before : May 19 09: 54: 04 2015 GMT 6 Not A f t e r : May 16 0 9 : 5 4 : 0 4 2025 GMT 7 Subject : C=US, ST=C a l i f o r n i a, L=Mountain View, O=GeoTrust Inc., OU=GeoTrust Global CA, CN=. 18 of 20

Conclusion Passive SSL helped us to get in contact with owners of vulnerable or abused systems. Passive SSL is an ongoing project and you can request access if do incident handling or security research 2. Weird occurences in dataset lead to additional insights. Analysing the same dataset with different eyes improved analysis. Comparing different datasets can be independant verification of facts or proportion. Information visualisation can be used as a navigation strategy before deep diving. 2 https://www.circl.lu/services/passive-ssl/ 19 of 20

Q&A @blackswanburst - eireann.leverett@cantab.net @adulau - alexandre.dulaunoy@circl.lu 20 of 20