Host-based Intrusion Prevention on Windows and UNIX. Dr. Rich Murphey White Oak Labs



Similar documents
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Network Security Market in India CY 2014

ReactOS is (not) Windows. Windows internals and why ReactOS couldn t just use a Linux kernel

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

How To Write A Windows Operating System (Windows) (For Linux) (Windows 2) (Programming) (Operating System) (Permanent) (Powerbook) (Unix) (Amd64) (Win2) (X

NETWORK SECURITY (W/LAB) Course Syllabus

Computer Security: Principles and Practice

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser

Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures

An overwhelming majority of IaaS clouds leverage virtualization for their foundation.

Deep Discovery. Technical details

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

Red Hat Linux Internals

Devising a Server Protection Strategy with Trend Micro

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

Intrusion Detection Systems

CSCE 465 Computer & Network Security

Devising a Server Protection Strategy with Trend Micro

Next-Generation Firewalls: Critical to SMB Network Security

Networking for Caribbean Development

Windows NT. Chapter 11 Case Study 2: Windows Windows 2000 (2) Windows 2000 (1) Different versions of Windows 2000

NetDefend Firewall UTM Services

TABLE OF CONTENTS NETWORK SECURITY 2...1

Computer Security DD2395

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

HONE: Correlating Host activities to Network communications to produce insight

Network Access Security. Lesson 10

Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks

Chapter 11 Cloud Application Development

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

ELEN 689: Topics in Network Security: Firewalls. Ellen Mitchell Computing and Information Services 20 April 2006

NETWORK SECURITY HACKS *

Operating System Components and Services

Firewall Testing Methodology W H I T E P A P E R

NetDefend Firewall UTM Services

Goals. Understanding security testing

Is the Scanning of Computer Networks Dangerous?

NETWORK SECURITY HACKS

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

BM482E Introduction to Computer Security

OPERATING SYSTEMS STRUCTURES

CrossOver Compared to Competing Emulation Solutions

CS222: Systems Programming

Linux Kernel Architecture

Eugene Tsyrklevich. Ozone HIPS: Unbreakable Windows

Introduction to Endpoint Security

Secure Cloud-Ready Data Centers Juniper Networks

SonicWALL PCI 1.1 Implementation Guide

Security. TestOut Modules

Apple Share IP and the Mac OS X Model

Attackers are reusing attacks (because they work)

Operating System Structure

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

VIEWABILL. Cloud Security and Operational Architecture. featuring RUBY ON RAILS

Host/Platform Security. Module 11

OPERATING SYSTEM SERVICES

Intrusion Defense Firewall

ELEC 377. Operating Systems. Week 1 Class 3

Host-based Intrusion Prevention System (HIPS)

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

How to scan/exploit a ssl based webserver. by xxradar. mailto:xxradar@radarhack.com. Version 1.

INTRUSION DETECTION SYSTEMS and Network Security

Chapter 9 Firewalls and Intrusion Prevention Systems

What to Look for When Evaluating Next-Generation Firewalls

Tuning U2 Databases on Windows. Nik Kesic, Lead Technical Support

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Storm Worm & Botnet Analysis

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Detecting Malware With Memory Forensics. Hal Pomeranz SANS Institute

Emerging Trends in the Network Security Market in India, CY 2013

CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study

Virtualization for Security

The SIEM Evaluator s Guide

Kernel Types System Calls. Operating Systems. Autumn 2013 CS4023

LSKA 2010 Survey Report I Device Drivers & Cloud Computing

Computer Security DD2395

Introduction to the NI Real-Time Hypervisor

Chapter 10 Case Study 1: LINUX

Windows Filtering Platform, engine for local security

Disclaimer: The contents in this document are only my personal opinions, do not reflect the opinions of my employer or anyone else.

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

R3: Windows Server 2008 Administration. Course Overview. Course Outline. Course Length: 4 Day

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Attacking Host Intrusion Prevention Systems. Eugene Tsyrklevich

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Table of Contents. Page 1 of 6 (Last updated 30 July 2015)

Secure Your Mobile Workplace

Firewall and UTM Solutions Guide

CS420: Operating Systems OS Services & System Calls

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Analysis of advanced issues in mobile security in android operating system

Corporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer

Applications erode the secure network How can malware be stopped?

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

Topic 5a Operating System Fundamentals

Transcription:

Host-based Intrusion Prevention on Windows and UNIX Dr. Rich Murphey White Oak Labs

Acknowledgements Niels Provos OpenBSD s systrace DT suggested this thread last year Greg Hoglund insights md5 at da ghettohackers reviews 2 DEFCON XI 8/3/2003

What is Intrusion Prevention? To a netsec person it looks like a firewall. Messages Rules Messages (Packets) 3 DEFCON XI 8/3/2003

What is Intrusion Prevention? To a AV person it looks like an AV. Messages Signatures Messages (File IO) 4 DEFCON XI 8/3/2003

What is Intrusion Prevention? Network-based Packets Signatures Host-based API() Signatures 5 DEFCON XI 8/3/2003

What is Intrusion Prevention? Packets Signatures Consider personal firewalls that combine host and network based filtering. Socket() Signatures 6 DEFCON XI 8/3/2003

How is IP different? Rather than rules, it uses signatures. But these aren t the same signatures you might run in an Intrusion Detection Systems (IDS) Signatures as access controls. API() Signatures 7 DEFCON XI 8/3/2003

How is it different? Consider SNORT/Hogwash.. Signature-based Firewall Packets Signatures IDS vendors call this Gateway IDS 8 DEFCON XI 8/3/2003

What is Intrusion Prevention? It's complementary to AV & Firewall API() Signatures Filters messages between applications and the kernel. Uses signatures to recognize payload behavior or injection mechanisms. 9 DEFCON XI 8/3/2003

Why the heck should we care? Encryption, fragmentation and reencoding, can prevent application layer filtering on the wire. Data resides in the clear in the application layer. So do exploits. 10 DEFCON XI 8/3/2003

Why the heck should we care? Visibility into the application layer provides capability for better contextual discrimination. = Stops certain kinds of exploits. 11 DEFCON XI 8/3/2003

So, why do we need another tool? Network security App level Firewalls Attack through services/daemons. crunchy on the outside? Application state is complex. State of memory, disk, clients 12 DEFCON XI 8/3/2003

IP Signatures For signatures that: Are application state specific Are system state specific Use contextual clues Block from the inside 13 DEFCON XI 8/3/2003

Well, OK, so how does it work? Consider architectural layers in the OS. Let s take a look at: Layers in Windows architecture Layers in UNIX 14 DEFCON XI 8/3/2003

Win2K System Architecture Win32 App Win32 Subsystem OS/2 App OS/2 Subsystem Ntdll.dll Posix App Posix Subsystem IO File Systems Security Reference Monitor Device Drivers Executive Services Interface IPC Virtual Object Hardware Process Micro Kernel GDI Window Hardware Abstraction Layer (HAL) Window Graphics Device Drivers 15 DEFCON XI 8/3/2003

Win2K System Architecture Win32 App Win32 Subsystem IO Mgr. File Sys. Security Ref. Monitor Device Drivers OS/2 App OS/2 Subsystem Executive Services Interface IPC Mgr. Ntdll.dll Virtual Process Mgr. Mgr. Object Hardware Micro Kernel GDI Window Mgr. Hardware Abstraction Layer Posix App Posix Subsystem Window Mgr. Graphics Device Drivers Two distinct user-land layers: Binary compatible app layer OS specific, native layer Three distinct kernel layers: Executive services Object Hardware Abstration Layer 16 DEFCON XI 8/3/2003

Linux System Architecture Win32 App Mac App Games Linux App Wine or Win4Lin Basilisk MAME Libc.so System call interface Scheduler Process Virtual Allocator VFS Interface Character Devices File Systems Block Devices Socket Network Protocols Network Drivers Hardware 17 DEFCON XI 8/3/2003

Linux System Architecture One common abstraction layer for kernel. One common abstraction layer for user-land. Is fewer layers bad? Linux App Scheduler Process Win32 App Wine or Win4Lin Virtual Allocator Libc.so Mac App Basilisk System call interface VFS Interface Character Devices Hardware File Systems Block Devices Games MAME Socket Network Protocols Network Drivers 18 DEFCON XI 8/3/2003

Linux System Architecture Each layer provides context info. Linux App Win32 App Wine or Win4Lin Libc.so Mac App Basilisk Games MAME What can that information provide? Given this information, what can we distinguish? How is this different than other forms of filtering? Scheduler Process Virtual Allocator System call interface VFS Interface Character Devices Hardware File Systems Block Devices Socket Network Protocols Network Drivers 19 DEFCON XI 8/3/2003

Architecture Comparison Win32 App Win32 Subsystem OS/2 App OS/2 Subsystem Posix App Posix Subsystem Linux App Win32 App Wine or Win4Lin Mac App Basilisk Games MAME Ntdll.dll Libc.so Executive Services Interface System call interface IO Mgr. File Sys. Security Ref. Monitor Device Drivers IPC Mgr. Virtual Process Mgr. Mgr. Object Micro Kernel GDI Window Mgr. Hardware Abstraction Layer Window Mgr. Graphics Device Drivers Scheduler Process Virtual Allocator VFS Interface Character Devices File Systems Block Devices Socket Network Protocols Network Drivers Hardware Hardware 20 DEFCON XI 8/3/2003

Linux System Architecture Even considering the app. as a black box we can observe at multiple layers: Linux App Win32 App Wine or Win4Lin Libc.so Mac App Basilisk System call interface Games MAME API calls System calls Instruction level Scheduler Process Virtual Allocator VFS Interface Character Devices Hardware File Systems Block Devices Socket Network Protocols Network Drivers 21 DEFCON XI 8/3/2003

Linux System Architecture Win32 App Mac App Games Exploits: focus on escaping IDS often cause exceptional behavior. Rather than fix IDS, let s take an entirely different approach. Linux App Scheduler Process Wine or Win4Lin Virtual Allocator Libc.so Basilisk System call interface VFS Interface Character Devices Hardware File Systems Block Devices MAME Socket Network Protocols Network Drivers 22 DEFCON XI 8/3/2003

Linux System Architecture Win32 App Mac App Games Because it acts at these layers it is independent of: Method of transport Method of injection. It is specific to: App state or behavior Payload behavior Linux App Scheduler Process Wine or Win4Lin Virtual Allocator Libc.so Basilisk System call interface VFS Interface Character Devices Hardware File Systems Block Devices MAME Socket Network Protocols Network Drivers 23 DEFCON XI 8/3/2003

Examples Yes, let's consider a specific payload (and exploit for that matter) on FreeBSD. How does it get in and how do we distinguish it's behavior. Why is this important... 24 DEFCON XI 8/3/2003

Demo of IP on FreeBSD Background of exploit: release date, authors, impact, subsequent variations. firewall coverage anti-virus coverage IDS and AV coverage 25 DEFCON XI 8/3/2003

Demo of successful exploit 26 DEFCON XI 8/3/2003

Review of injection and payload Code excerpts: Vulnerability Injection Payload 27 DEFCON XI 8/3/2003

How can we prevent it? Unique aspects of payload? How we can recognize it.. Unique aspects of injection? How we can recognize it.. 28 DEFCON XI 8/3/2003

Demo of blocked exploit 29 DEFCON XI 8/3/2003

Review of contextual information network identity user identity application state authentication workflow orthogonally to other methods 30 DEFCON XI 8/3/2003

What s the state of the industry? Leading products in the market? What differentiates them? How do the integrate with others? Success stories? 31 DEFCON XI 8/3/2003

The End Updated slides and tools will be available at: www.defcon.org www.murphey.org/dc-11/ I can be contacted at: Rich@Murphey.org 32 DEFCON XI 8/3/2003