ITDays Security issues



Similar documents
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Critical Controls for Cyber Security.

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Top 20 Critical Security Controls

SANS Top 20 Critical Controls for Effective Cyber Defense

Pervade Software. Use Case PCI Technical Controls. PCI- DSS Requirements

Critical Security Controls

Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars

One-Man Shop. How to build a functional security program with limited resources DEF CON 22

No Cloud Allowed. Denying Service to DDOS Protection Services

5 Steps to Advanced Threat Protection

Concierge SIEM Reporting Overview

GFI White Paper PCI-DSS compliance and GFI Software products

Defending Against Data Beaches: Internal Controls for Cybersecurity

Chapter 9 Firewalls and Intrusion Prevention Systems

THE TOP 4 CONTROLS.

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

74% 96 Action Items. Compliance

End-user Security Analytics Strengthens Protection with ArcSight

Security Management. Keeping the IT Security Administrator Busy

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Network and Security Controls

RSA Security Anatomy of an Attack Lessons learned

How To Protect A Network From Attack From A Hacker (Hbss)

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

NETWORK DEVICE SECURITY AUDITING

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Check Point and Security Best Practices. December 2013 Presented by David Rawle

The Protection Mission a constant endeavor

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Speed Up Incident Response with Actionable Forensic Analytics

The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole

Windows Operating Systems. Basic Security

High End Information Security Services

Enterprise Cybersecurity: Building an Effective Defense

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Locking down a Hitachi ID Suite server

Jumpstarting Your Security Awareness Program

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Looking at the SANS 20 Critical Security Controls

Stephen Coty Director, Threat Research

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

INFORMATION SECURITY TRAINING CATALOG (2015)

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

How To Protect Your Network From Attack From Outside From Inside And Outside

The Role of Security Monitoring & SIEM in Risk Management

Automate PCI Compliance Monitoring, Investigation & Reporting

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

How To Protect Virtualized Data From Security Threats

Software that provides secure access to technology, everywhere.

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Protecting Your Organisation from Targeted Cyber Intrusion

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

Industrial Security for Process Automation

ISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps

CMPT 471 Networking II

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

Centre for the Protection of National Infrastructure Effective Log Management

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

RSA Security Analytics

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

How to Grow and Transform your Security Program into the Cloud

Breach Found. Did It Hurt?

Defending Against Web App A0acks Using ModSecurity. Jason Wood Principal Security Consultant Secure Ideas

Cyber Essentials KAMI VANIEA 2

Evolving Threat Landscape

How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Network Security Policy

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

SANS Institute First Five Quick Wins

Securing Web Applications...at the Network Layer

Detecting Threats Via Network Anomalies. Paul Martini Cofounder and CEO iboss Cybersecurity

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Nessus Agents. October 2015

INCIDENT RESPONSE CHECKLIST

Defence Cyber Protection Partnership Cyber Risks Profile Requirements

Using TS-ACCESS for Remote Desktop Access

The Cloud App Visibility Blindspot

All Information is derived from Mandiant consulting in a non-classified environment.

Global Partner Management Notice

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov

Transcription:

ITDays Security issues Malicious Intrusion, are we concerned in our Organiza;on? 7 steps to evaluate your situa;on! Christophe Bianco - Christophe Rosenkranz Paul Jung November 2014 1

Agenda Are you concerned? Anatomy of an asack But how i can evaluate if i m concerned? How to implemented that in my organiza;on? Q&A 2

Who are we? Paul" Jung!! Security Consultant" Christophe" Rosenkranz! SOC Technical leader" christophe" Bianco!! Managing Partner" Excellium Services Founded in Dec 2012 Focus on Applica;on Security and Intrusion Management 22 Security consultants and analysts An opera;onal Security Opera;on Center and a official Cert Your speakers Christophe B. In charge of the service offering Christophe R. Monitoring and Incident management Specialist Paul J. Intrusion & Forensic Specialist 3

Let s start with a ques;on! Who has suffered an intrusion over the last 6 months? How do you discovered it? 4

Our recent engagements Penetra;on Tes;ng Mission (100% in over the last 3) Passwords Web App vuln Network segmenta;on Forensic Engagement (3 in 2 weeks) Patchs Passwords AV not up to date And we are not considering 0- day a2acks! 9

Statements According to mul;ple sources (Verizon DBIR report, M- Trends, Circl,...) Things do not look so good for organiza;on Company are breached with impact repeatedly Intrusion is discovered because someone else told the organisa;on... Many many months ajer the compromise AND issue is that most organiza;ons are more than 80% preven;ve (with no reac;ve capability). 10

Anatomy of an asack Advanced post- exploita;on (Encrypted C2 & outbound 443) Lateral Movement/Pivo;ng (Av bypass)? Client- side Exploita;on Detec;on ;meline: - DBIR: 62% take months or more - M- Trends: on average 243 days 11

But can t be just a keyword to look for! 12

Step 0 - Preven;on Password Strength Regular assessment Plugin Patches 13

Ok let s look in detail! 14

First look in 7 steps! A first stage of the Con6nuous Security Monitoring Concept! 15

Step 1 Profiling (assets, outbound traffic)!!!! New form of asacks are less and less stupid You need to understand normal behavior and look for oddi;es and anomalies What is your network? (network mapping Host, port and service discovery or DHCP logs or CAM table) How much data is sent? Who sends the data (at proxy and firewall levels) Where are you sending the data (ip geolocated and port numbers)? When is the data sent? Reco: Perform this analysis over a 3 month volume of data and the scans at different 8me periods (nighly, week- end,...) 16

17

Long Tail Principle 18

Step 2 Do we have illegal Registry Startup Keys? Long Tail Analysis 1 Query all startup registry keys on all systems 2 Save to a file 3 Sort in order of duplicates, least to most 4 Then inspect the least frequently seen registry keys (works for windows event logs, installed sojware, startup registry keys & DNS logs) The first pass may be somewhat ;me consuming Once that process is complete re- run the script nightly report any new entries 19

Step 2 Do we have illegal autorun? Long Tail Analysis Use Group Policy to audit registry keys or WMI by scrip;ng to extract and monitor changes on: Run, RunOnce, Start HKLM\SOFTWARE\Microsoj\Windows\CurrentVersion\Run HKLM\SOFTWARE\Microsoj\Windows\CurrentVersion\RunOnce HKCU\SOFTWARE\Microsoj\Windows\CurrentVersion\Run HKCU\SOFTWARE\Microsoj\Windows\CurrentVersion\RunOnce SOFTWARE\Microsoj\Windows\CurrentVersion\Explorer\Shared Task %userprofile%\appdata\roaming\microsoj\windows\start Menu\Programs \Startup C:\ProgramData\Microsoj\Windows\Start Menu\Programs\Startup And HKCU\SOFTWARE\Wow6432node\Microsoj\Windows\CurrentVersion\Run HKCU\SOFTWARE\Wow6432node\Microsoj\Windows\CurrentVersion\RunOnce 20

Or Powershell is your friend (or beser a logon script!!!) $user="starbuck $password="cyl0n $array = @("192.168.1.1", "192.168.1.2") foreach ($ip in $array) { net use \\$ip $password /u:$user out- null $ip reg query \\$ip\hklm\software\microso`\windows\currentversion\run reg query \\$ip\hklm\so`ware\microso`\windows\currentversion\runonce reg query \\$ip\hku\.default\so`ware\microso`\windows\currentversion\run reg query \\$ip\hklm\software\wow6432node\microso`\windows\currentversion\run 2> $null reg query \\$ip\hklm\software\wow6432node\microso`\windows\currentversion \RunOnce 2> $null } 21

Step 3 Persistent / abnormal outbound connexions? Detect recurrent / regular illegal connexions (10 minutes or so is a good threshold) Start by a snapshot of night traffics Hackers make mistakes so look also filtered traffic on the proxy or inner firewall 22

Step 4 Proxy logs? Setup correct logging Source / Des;na;on URL Category User Agent Bytes & header Size Referrer Look for: Abnormal volume logs Check 403 denied and 407 Proxy Authrequest Abnormal User Agents Headers size (to catch the malicious ones) 23

Step 5 Password & Rights Gain visibility of your privileged account environment Discover all privileged and non- privileged accounts Locate all privileged creden;als including: Passwords SSH keys Password hashes On a regular basis check the resistance of your key password Control usage of the Maleficent Seven Debug Programs - Load drivers Impersonate a client - Take Ownership Act as Part of the OS - Restore files Create a token 24

Step 6 Specific Monitoring On Systems (Windows) Registry Key crea;on Service crea;on User crea;on Admin right changes Clearing the Event Log Parsing the psexec, consider specific alerts like AV catching mimikatz, wce,.. On the Network DNS log local DNS requests and resolu;on look for long requests and responses (fail) 25

Step 7 Windows Logs Analyses of the following events Type Event IDs Log Create service 7030, 7045 System Create user 4720, 4722, 4724, 4738 Security Add user to group 4732 Security Clear Event log 1102 Security Create RDP cer;ficate 1056 System Insert USB 10000,100001,10100,20001,20002, 20003,24576,24577,24579 System Disable firewall 2003 Firewall www.nsa.gov/ia/_files/app/spowng_the_adversary_with_windows_event_log_monitoring.pdf 26

Step 7 Windows Logs By script Get- WinEvent - FilterHashtable @{LogName="Security"; ID=4720,4722,4724,4738,4732,1102} Get- WinEvent - FilterHashtable @{LogName="System"; ID=7030,7045,1056,7045,10000,100001,10100,20001,20002,20003,24576, 24577,24579} Get- WinEvent - FilterHashTable @{LogName="Microsoj- Windows- Windows Firewall With Advanced Security/Firewall"; ID=2003} Control User Rights Allow/deny Log On Locally Allow Log On Through Remote Desktop Services Deny Access via the Network Logon as a service 27

How to implement that? Script and do it yourself Or Call us!!!! Mission our EyeGuard Infec;on Assessment Implement log / siem consolida;on tool Subscribe to our Eyeguard Services 28

Conclusion While exploits and 0- days are seriously cool and fun to talk about... Who cares? The focus of modern cyber defense is to detect the post- exploita;on ac;vity (what is the end goal)! 1er goal: detec;ng adversary ac;vity toward their goal 2 nd goal: responding to the detec;on (responding to the detec;on before they own the domain) Tools for this new security paradigm Defensible Security Architecture Security opera;on Network Security Monitoring Con;nuous Security Monitoring And do not wait to be breach to start to think about your detec;on capability you can not inves;gate with no info "The only way a domain compromise can be remediated with a high level of certainty is a complete rebuild of it. h'p://blogs.technet.com/b/srd/archive/2014/11/18/addi<onal- informa<on- about- cve- 2014-6324.aspx 29

Spend some ;mes on the SANS Cri;cal Security Controls 1: Inventory of Authorized and Unauthorized Devices 2: Inventory of Authorized and Unauthorized So`ware 3: Secure Configura8ons for Hardware and So`ware on Mobile Devices, Laptops, Worksta8ons, and Servers 4: Con8nuous Vulnerability Assessment and Remedia8on 5: Malware Defenses 6: Applica8on So`ware Security 7: Wireless Access Control 8: Data Recovery Capability 9: Security Skills Assessment and Appropriate Training to Fill Gaps 10: Secure Configura8ons for Network Devices such as Firewalls, Routers, and Switches 11: Limita8on and Control of Network Ports, Protocols, and Services 12: Controlled Use of Administra8ve Privileges 13: Boundary Defense 14: Maintenance, Monitoring, and Analysis of Audit Logs 15: Controlled Access Based on the Need to Know 16: Account Monitoring and Control 17: Data Protec8on 18: Incident Response and Management 19: Secure Network Engineering 20: Penetra8on Tests and Red Team Exercises 30

La Code hackademy... (codehackademy.lu) Ini;a;ve Excellium & Cases.lu Première session en janvier 2015 Forma;on à des;na;on des professionnels du développement applica;f En;èrement gratuite, sur 10 semaines, un soir par semaine Théma;ques abordées Principes de sécurité des applica;ons Web introduc;on De l architecture logicielle à la mise en oeuvre Test sécurité des applica;ons Techniques de hacking Infrastructures sécurisées pour héberger les applica;ons Illustra;on de la sécurité d un code Java Security Sécurité des bases de données L exemple d Oracle Approche d un Sojware Developement Life Cycle Malwares et leur analyse U;lisa;on du Cloud Paiement en ligne 31

Thanks! Thanks! Excellium Services contact@excellium- services.com 32