Copyright 2015 Splunk Inc. Affordable Security: Making the most of free tools and data. Craig Merchant. Senior Security Architect, Oracle



Similar documents
How To Use A Policy Auditor (Macafee) To Check For Security Issues

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Continuous security audit automation with Spacewalk, Puppet, Mcollective and SCAP

Security compliance automation with Red Hat Satellite

IBM Security QRadar SIEM Version MR1. Vulnerability Assessment Configuration Guide

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

IBM Security QRadar Version Vulnerability Assessment Configuration Guide IBM

BMC Client Management - SCAP Implementation Statement. Version 12.0

Qualys PC/SCAP Auditor

How to Grow and Transform your Security Program into the Cloud

Shellshock. Oz Elisyan & Maxim Zavodchik

Concierge SIEM Reporting Overview

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

Web Application Vulnerability Testing with Nessus

Extreme Networks Security Vulnerability Assessment Configuration Guide

ClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014

Software Vulnerability Assessment

IBM. Vulnerability scanning and best practices

Network/Internet Forensic and Intrusion Log Analysis

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

Speed Up Incident Response with Actionable Forensic Analytics

Threat Advisory: Accellion File Transfer Appliance Vulnerability

WordPress Security Scan Configuration

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

McAfee Web Gateway 7.4.1

Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM

SANS Top 20 Critical Controls for Effective Cyber Defense

Penetration Testing with Kali Linux

April 11, (Revision 2)

SCAP for VoIP Automating Configuration Compliance. 6 th Annual IT Security Automation Conference

NetFlow Analytics for Splunk

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

IBM Security QRadar Vulnerability Manager Version User Guide

SourceFireNext-Generation IPS

Nessus Agents. October 2015

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn

More Comprehensive Digital Intelligence - CorrelaFng Client and Server- side Data

mbits Network Operations Centrec


The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

1 Scope of Assessment

Network Security Monitoring: Looking Beyond the Network

CloudPassage Halo Technical Overview

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

GETTING STARTED WITH THE ISCAN ONLINE DATA BREACH PREVENTION LIFECYCLE

Managing Vulnerability Assessment

Federated Threat Data Sharing with the Collective Intelligence Framework (CIF)

Chapter 1 The Principles of Auditing 1

COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H.

5 Steps to Advanced Threat Protection

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE

Whitepaper. Business Service monitoring approach

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

OnCommand Performance Manager 1.1

INFORMATION SECURITY TRAINING CATALOG (2015)

GFI Product Manual. Administration and Configuration Manual

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Eight Essential Elements for Effective Threat Intelligence Management May 2015

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser

Running custom scripts which allow you to remotely and securely run a script you wrote on Windows, Mac, Linux, and Unix devices.

Cyber Essentials. Test Specification

Using Nessus to Detect Wireless Access Points. March 6, 2015 (Revision 4)

Course Title: Penetration Testing: Security Analysis

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III

Application for Splunk Enterprise

TECHNICAL NOTE. Technical Note P/N REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.

Securing and Monitoring BYOD Networks using NetFlow

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Sisense. Product Highlights.

Introduction to Network Discovery and Identity

CloudPassage Halo Technical Overview

Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9)

Attacks from the Inside

Penetration Testing Report Client: Business Solutions June 15 th 2015

Shellshock Security Patch for X86

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

NMS300 Network Management System

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide

How To Set Up Foglight Nms For A Proof Of Concept

PANDORA FMS NETWORK DEVICE MONITORING

Managing Qualys Scanners

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Transcription:

Copyright 2015 Splunk Inc. Affordable Security: Making the most of free tools and data Craig Merchant Senior Security Architect, Oracle

Disclaimer During the course of this presentafon, we may make forward looking statements regarding future events or the expected performance of the company. We caufon you that such statements reflect our current expectafons and esfmates based on factors currently known to us and that actual events or results could differ materially. For important factors that may cause actual results to differ from those contained in our forward- looking statements, please review our filings with the SEC. The forward- looking statements made in the this presentafon are being made as of the Fme and date of its live presentafon. If reviewed aqer its live presentafon, this presentafon may not contain current or accurate informafon. We do not assume any obligafon to update any forward looking statements we may make. In addifon, any informafon about our roadmap outlines our general product direcfon and is subject to change at any Fme without nofce. It is for informafonal purposes only and shall not, be incorporated into any contract or other commitment. Splunk undertakes no obligafon either to develop the features or funcfonality described or to include any such feature or funcfonality in a future release. 2

AddiFonal Disclaimer I am here as a member of the Splunk community. I am not here as a representafve of Oracle or the Oracle Cloud. Due to the sensifve nature of some of our customers, I am only authorized to disclose a limited amount of specific informafon about our environment. 3

Personal IntroducFon Craig Merchant, Senior Security Architect, Oracle Cloud Over 20 years of experience in security, networking, and systems management Joined Oracle through the Responsys acquisifon in 2014 Oracle Cloud was announced on June 7, 2012 Offerings include SaaS, PaaS, IaaS Growth has been driven by over a dozen acquisifons My role: To Build the Be^er Mouse Trap 4

Agenda AugmenFng Nessus vulnerability data with vfeed project Dynamic vulnerability scanning using SNMP and ARP tables IntegraFng the CollecFve Intelligence Framework into Splunk Running SCAP security checklists using Splunk and joval Gain total visibility into network flows using Argus and Sysdig All content available at: h^ps://github.com/splunksec/.conf2015 5

Vulnerability Data Enrichment

The Incomplete Picture Vulnerability Management is the foundafon of a mature security pracfce A successful remediafon strategy depends on knowing: Is the vulnerability a local or remote exploit? Can an unauthenfcated user perform the exploit? How easy is it to perform the exploit? Is there a known exploit for the vulnerability in the wild? Which patches or updates will reduce the most amount of risk? The data contained in the plugins from most vulnerability scanners cannot answer all of those quesfons 7

What is vfeed? h^ps://github.com/toolswatch/vfeed vfeed integrates a wealth of vulnerability data: CVE Common VulnerabiliFes and Exposures CWE Common Weakness EnumeraFon CPE Common Plaform EnumeraFon OVAL Open Vulnerability and Assessment Language CAPEC Common A^ack Pa^ern EnumeraFon and ClassificaFon CVSS Common Vulnerability Scoring System MulFple exploit databases: Exploit- DB, Metasploit, Saint MulFple vulnerability databases: OSVDB, Bugtraq, NVD Vendor Security Advisories: MSFT, Red Hat, Cisco 8

Filling in the Gaps vfeed provides mappings between Nessus and CVE IDs Mapping the CVSS metrics to CVE IDs answers: Is the vulnerability a local or remote exploit? Can an unauthenfcated user perform the exploit? How easy is it to perform the exploit? Mapping CVE IDs to public exploit databases answers: Is there a known exploit for the vulnerability in the wild? Mapping CVE IDs to CPE entries answers: Which patches or updates will reduce the most amount of risk? 9

How to Build It Install vfeed and create a cron job for daily updates Connect to the vfeed SQLite database using the DB Connect 1 app Create a lookup in Splunk for each table in vfeed Dump each table, sanifze the data, and augment with URL info Download Common InformaFon Model (CIM) app and augment the Vulnerability data model with vfeed fields Modify the CIM Vulnerability data model to perform required lookups Populate the kvstore with vulnerability data Build dashboards driven off data model searches 10

Bonus Value vfeed has mappings for Snort IDs to CVE IDs Create a search that will find IDS events and: Lookup the CVE IDs associated with each Snort ID Use mvexpand to create a single event per CVE ID Lookup the CVE ID in the Snort event against any CVEs for the dest/ dest_port/protocol in the Vulnerability kvstore Alarm on a match 11

Dynamic Vulnerability Scanning

Scheduled Scanning is Risky Missed assets Laptops and tablets may not be connected to the corporate network during the scheduled scanning window Fragile infrastructure Running large scans can exhaust resources on switches, routers, and firewalls Huge address spaces IPv6 networks can be massive and virtually impossible to scan within a typical scanning window Easy evasion Predictable scanning windows create opportunifes for a^ackers to hide evidence of their intrusion 13

Splunk Powers Dynamic Scanning Use scripted inputs or SNMP apps to poll network switches for the IP- to- MAC address relafonships Track the scanning history for each MAC address in a lookup table Use that history to launch scans via the Nessus API Index the status of each scan with a scripted input Generate a CSV report via the API when scans complete 14

Map IPs to Physical Address For IPv4, SNMP atphysaddress (.1.3.6.1.2.1.3.1.1.2) to enumerate the ARP cache: snmpwalk c public v 2c 10.10.10.10 atphysaddress mib- 2.3.1.1.2.76.1.192.168.1.93 "3C 38 A6 D9 AA 4C " mib- 2.3.1.1.2.76.1.192.168.1.95 "A8 9D 21 DA 86 B3 " For both, SNMP ipnettophysicalphysaddress (.1.3.6.1.2.1.4.35.1.4): snmpwalk c public v 2c 10.10.10.10 ipnettophysicaltable ê IP- MIB::ipNetToPhysicalPhysAddress.2.ipv4."10.0.0.1" = STRING: 0:26:5a:f4:1a:28 ê IP- MIB::ipNetToPhysicalPhysAddress.2.ipv6."fe:80:00:00:00:00:00:00:ca:60:00:ff:fe:e9:1a:e9 = STRING: c8:60:0:e9:1a:e9 15

Build Scripted SNMP Input Create a search that will find all network switches, dedup the hostname or IP, and write the hostnames/ips to a lookup table Create a simple for loop in a bash script: for switch in `cat../lookups/switches.csv sed 1d ` do echo Switch: $switch snmpwalk c public v 2c $switch ipnettophysicalphysaddress done Schedule the scripted input to run every 5 minutes 16

Interact with Nessus 6 API Login and save authenfcafon token: curl - k - X POST - H 'Content- Type: applicafon/json' - d '{"username": nessus","password": ne55us"}' h^ps:// 10.10.10.10:8834/session 2>&1 grep - Po '(?<=\"token\":\")[^\"]+' List the configured scans on the scanner: curl - k - H 'X- Cookie: token=f99a30c7d590f07880f27aa913ee705955bcaa7b7d51e041' h^ps://10.10.10.10:8834/scans Launch a scan with a list of dynamic IPs: curl - k - X POST - H 'X- Cookie: token=f8f0b0821d0ef193d346a2951dbc9e28314bcf232d40e4e7' - H 'Content- Type: applicafon/json' - d '{"alt_targets": [ 10.10.10.1,10.10.10.2,10.10.10.3,10.10.10.4"]}' h^ps://10.10.10.10:8834/scans/6/ launch Export a scan to CSV format: curl - k - X POST - H 'X- Cookie: token=f8f0b0821d0ef193d346a2951dbc9e28314bcf232d40e4e7' - H 'Content- Type: applicafon/json' - d '{"format": "csv"} ' h^ps://10.10.10.10:8834/scans/6/export e the scripted input to run every 5 minutes 17

How to Build It On each scanner, define the necessary policies and scan configs Use the Nessus API to find the ID of configured scans Create a CIDR match lookup table to assign Nessus IPs and scan IDs to hosts or subnets: dest, nessus_ip, scan_id 10.10.10.0/24, 10.10.10.10,6 10.10.11.0/24, 10.10.10.10,5 Create a lookup to track the last scan Fme for a MAC address and seed it with data that adds random padding to the last_scan Fme: (sourcetype="nessus" AND signature="12053" OR signature="19506") OR sourcetype=snmp_arp rex field=_raw "(? i)resolves as (?P<hostname>[^$]+)(?=\.)" rex mode=sed field=dest_mac "s/\s/:/g" transacfon maxspan=1h dest eval padding=random()/2147483648*86400 eval last_scan=now()+padding table last_scan,hostname,dest,dest_mac outputlookup nessus_last_scan_lookup 18

How to Build It Create a lookup table to queue IPs that need to be scanned Create a search that will check incoming ARP events against the last scan lookup, lookup the scanner IP and scan ID, and save those events to the queue Create a scripted input to iterate through the Nessus scanners, list the status of scan jobs and index the results Create a lookup table to track completed scan jobs and export status Create a script that can iterate through the scan job lookup table and use the Nessus API to export the scan in CSV format Create a file monitor input on the Nessus scanner that will index all CSV files found in each user s files directory 19

IntegraFng Threat Intelligence

Why Threat Intel? Today s a^ackers are incredibly sophisfcated and agile Threat Intel providers take the offensive against hackers Data is updated more frequently than tradifonal AV vendors Indicators of Compromise (IOCs) can be found in a wide range of security data types 21

What is CIF? h^ps://code.google.com/p/collecfve- intelligence- framework/ CIF collects, normalizes, qualifies, and categorizes free and commercial threat intelligence feeds Supported data types: File Hashes (MD5s) IPv4 Addresses Host Names Domain Names URLs (MD5s) v1 stores each category of threat in a separate Postgres database table 22

What Data can it Enrich? Network Intrusion DetecFon events (IPv4, Host/Domain names) Network Flow events (IPv4, Host/Domain Names, URL) Proxy Logs (IPv4 Host/Domain names, URL) Firewall Logs (IPv4, URL) Endpoint ProtecFon SoluFons (File Hash, IPv4, Host/Domain names) AnF- Malware solufons (File Hash, IPv4, Host/Domain names, URL) 23

How to Build It Install CIF v1 and configure threat intel feeds Connect to the Postgres database using DB Connect App Create Splunk lookup tables for each classificafon type botnet, phishing, spam, etc. Create searches to periodically dump the database tables into lookup tables Create automafc lookups to enhance log data OpFonal: Add a menu context item to check fields against the HTTP API: h^p://eyeis.net/2012/04/querying- cif- data- from- splunk/ 24

Automated Security ConfiguraFon Monitoring with SCAP

Value and Challenges Security configurafon monitoring can measure the compliance of systems and applicafons against a set of enterprise security standards The human checklist approach is slow, expensive, and prone to error CreaFng customized scripts to perform configurafon checks is expensive to develop and maintain and difficult to instrument and report on 26

What is SCAP? SCAP: Security Content AutomaFon Protocol XCCDF: Extensible ConfiguraFon Checklist DefiniFon Format OVAL: Open Vulnerability and Assessment Language Public repositories of SCAP content: h^ps://web.nvd.nist.gov/view/ncp/repository h^p://usgcb.nist.gov/ h^p://iase.disa.mil/sfgs/scap/pages/index.aspx h^ps://benchmarks.cisecurity.org/downloads/ SCAP scanners: Free: h^p://www.open- scap.org/ Commercial: h^p://jovalcm.com/ 27

What Does the Data Look Like? XCCDF scan using OpenSCAP: Title Uninstall squid Package Rule uninstall_squid Ident CCE- 26977-9 Result pass Title Disable snmpd Service Rule disable_snmpd Ident CCE- 26906-8 Result pass OVAL scan using OpenSCAP: DefiniFon oval:ssg:def:959: false DefiniFon oval:ssg:def:957: true DefiniFon oval:ssg:def:955: true 28

How to Build It joval Install on central scanning host OpenSCAP yum install openscap openscap- ufls openscap- content Index the XCCDF or OVAL XML files Extract important fields from the rule objects id, Ftle, descripfon, severity, weight, and fixtext Create a lookup table or kvstore containing the policy name and the rule objects above Create automafc lookup to enrich scanner logs with rule data Create an app for the policy files and scripted inputs!!! You must change the file extension from XML or you will break Splunk!!! 29

Improving Visibility With Network Flows

Ge ng Flow Security Right is Hard What collecfon method to use Neflow protocols or taps/span ports? Where to collect the data Internet connecfons, internal switches, or individual hosts? What flow metrics need to be collected for security or ops? What flow aggregafon and filtering method to use? What events are worth sending to Splunk? How can flows be used to complement other security data? 31

What is Argus? h^p://qosient.com/argus/ Free, open source tool capable of generafng flow records from both flow protocols (Neflow, IPFIX) and raw network streams Capable of capturing all, some, or none of the packet payload Supports a rich set of flow metrics Allows tagging of flows based on CIDR match Key architecture components: argusd: Argus flow collector daemon radium: Collects and dedups flows from mulfple Argus daemons Argus clients: Individual client applicafons to search and manage Argus data 32

What Can Argus Do? ralabel: Uses CIDR network and host matches to apply labels to flows radark: Looks for high numbers of ICMP unreachable messages to detect scanning behavior rapolicy: Monitors network traffic for violafons of Cisco ACL rules Using advanced ji^er analysis, Argus can detect keystrokes in encrypted tunnels excellent for detecfng back doors Regex pa^ern matching on payload can idenffy SSH on unusual ports 33

How to Build It Compile argusd for collecfon servers Compile argus- clients Convert Splunk IPv4 threat intel lookup table to Argus label file format Configure Argus client searches Create Splunk searches to index output of Argus clients Advanced: Use radium to save X minutes/hours/days of all flow records and selecfvely index the data in Splunk 34

But Wait Who Dunnit? Argus has no user or process a^ribufon capabilifes all its sees is the network Enter Sysdig Think of sysdig as strace + tcpdump + htop + iqop + lsof + awesome sauce h^p://www.sysdig.org Sysdig is a Linux kernel module that can gather data about: User acfvity such as shell commands and network connecfons Process acfvity System performance I/O, CPU, network, and memory Limited Windows/OS X support 35

Compile and install sysdig How to Build It Create a scripted input to capture user, UID, PID, PPID, process names and arguments, and IP/port/protocol data for each network connecfon: sysdig evt.type=connect and fd.lip!=127.0.0.1 p %evt.rawfme.s,%evt.type,%fd.cip,%fd.cport,%fd.sip,%fd.sport, %fd.l4proto,%proc.name,%proc.args,%proc.pid,%proc.ppid,%proc.pname,%user.uid,%user.name Create Create searches for flow/ids/firewall and sysdig events and bind them together with the transacfon command Build alarms and reports that take advantage of the a^ribufon metadata 36

Final Thoughts

Making the Most of Free All of the ideas presented require basic Splunking skill lookups, transacfons, data models, and database connecfons The vfeed and CIF projects provide excellent metadata enhancement capabilifes without consuming your Splunk license Dynamic vulnerability scanning and SCAP scanning can dramafcally improve vulnerability management with a trivial license cost Argus offers a number of security client tools that offer great visibility with minimal license consumpfon Sysdig allows security to link network events with the users and programs responsible for them 38

Future InvesFgaFons Project ArFllery: h^ps://www.trustedsec.com/arfllery/ A python- based low- interacfon honeypot that can be deployed and managed with Splunk Google Rapid Response (GRR) h^ps://github.com/google/grr A comprehensive incident response framework that could be automated using data stored in Splunk, such as Notable Events in the Enterprise Security app 39

Get It at Github h^ps://github.com/splunksec/.conf2015 40

QuesFons? 41

THANK YOU