DAVIX Visualization Bootcamp 25C3



Similar documents
DAVIX Visualization Workshop

DAVIX Visualization. Workshop

IT Data Visualization

Wireshark Deep packet inspection with Wireshark

Network visualization

Cloud-based Log Analysis and Visualization

Safe network analysis

Exercise 7 Network Forensics

Networks and Security Lab. Network Forensics

Network Forensics Network Traffic Analysis

6. INTRODUCTION TO THE LABORATORY: SOFTWARE TOOLS

Network Intrusion Analysis (Hands-on)

Security visualisation

EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL

NetFlow Analytics for Splunk

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

Web Application Vulnerability Testing with Nessus

Monitoring System Status

Traffic visualization with Arista sflow and Splunk

Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm,

Introduction to Network Security Lab 1 - Wireshark

Introduction to Passive Network Traffic Monitoring

Lab Configuring Access Policies and DMZ Settings

USE HONEYPOTS TO KNOW YOUR ENEMIES

DAVIX. The Data Analysis and Visualization Linux. Version Authors: Jan P. Monsch, jan döt monsch ät iplosion döt com

SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013

During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) /24

Lab Configuring Access Policies and DMZ Settings

1 Log visualization at CNES (Part II)

Security Correlation Server Quick Installation Guide

Edge Configuration Series Reporting Overview

Network Security Monitoring

Network Probe User Guide

Detecting Threats in Network Security by Analyzing Network Packets using Wireshark

Open Source Security Tool Overview

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Intrusion Detection in AlienVault

Network Monitoring. By: Delbert Thompson Network & Network Security Supervisor Basin Electric Power Cooperative

Networks & Security Course. Web of Trust and Network Forensics


By Jascha Wanger

Transformation of honeypot raw data into structured data

Features Overview Guide About new features in WhatsUp Gold v14

10. Exercise: Automation in Incident Handling

Lab 2: Secure Network Administration Principles - Log Analysis

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.

NVisionIP: An Interactive Network Flow Visualization Tool for Security

SCADA Security Example

Network Traffic Analysis

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

Chapter 14 Analyzing Network Traffic. Ed Crowley

HoneyBOT User Guide A Windows based honeypot solution

Network Monitoring Tool with LAMP Architecture

SAIP 2012 Performance Engineering

The Bro Network Intrusion Detection System

Linux Network Security

Intrusion Detection Systems (IDS)

Linux: 20 Iptables Examples For New SysAdmins

Vulnerability Assessment and Penetration Testing

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

EFFECTIVE IMPLEMENTATION OF DYNAMIC CLASSIFICATION FOR NETWORK FORENSIC AND TRAFFIC ANALYSIS

Network Security Platform 7.5

Volume SYSLOG JUNCTION. User s Guide. User s Guide

Practical Network Forensics

Powering Monitoring Analytics with ELK stack

Wireshark Hands-On Exercises

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

19. Exercise: CERT participation in incident handling related to the Article 13a obligations

PANDORA FMS NETWORK DEVICES MONITORING

Telematics. 14th Tutorial - Proxies, Firewalls, P2P

IBM. Vulnerability scanning and best practices

CS197U: A Hands on Introduction to Unix

Network Security. Network Packet Analysis

Some Tools for Computer Security Incident Response Team (CSIRT)

Nmap: Scanning the Internet

ITTC Communication Networks Laboratory The University of Kansas EECS 780 Introduction to Protocol Analysis with Wireshark

Packet Sniffing and Spoofing Lab

Visualizing Network Security

Penetration Testing with Kali Linux

PRI (T1/E1) Call Recorder User Manual Rev 1.0 (December 2013)

Network forensics 101 Network monitoring with Netflow, nfsen + nfdump

USING WIRESHARK TO CAPTURE AND ANALYZE NETWORK DATA

PANDORA FMS NETWORK DEVICE MONITORING

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

Intrusion Detection System Visualization of Network Alerts

VMware vcenter Log Insight Security Guide

Introduction to Network Security Lab 2 - NMap

EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

Websense Web Security Gateway: What to do when a Web site does not load as expected

DNS FLOODER V1.1. akamai s [state of the internet] / Threat Advisory

Minimal network traffic is the result of SiteAudit s design. The information below explains why network traffic is minimized.

Wireshark. Fakrul (Pappu) Alam

Security Correlation Server Quick Installation Guide

FREQUENTLY ASKED QUESTIONS

IDS and Penetration Testing Lab ISA656 (Attacker)

Transcription:

DAVIX Visualization Bootcamp 25C3 Visualize Your Network! Jan P. Monsch Marius Ciepluch About Your Hosts Jan P. Monsch DAVIX Project Initiator & Lead Engineer Marius Ciepluch DAVIX User & Workshop Assistant Senior Security Analyst Student in Security and Forensic Computing @ Dublin City University Student in Computer Science @ University Lübeck

Workshop Preparation Get DAVIX Visit http://82.197.185.121/davix/release/ Download davix-1.0.1-defcon16.iso.gz davix-manual-1.0.1.pdf 25c3-workshop.lzm Recommended setup VMware Player or VMware Fusion Bridged or NAT networking Configure host to access 25C3 network See chapter 6.1.1 & 6.1.2 in manual for assistance Agenda Introduction DAVIX Visualization Walk-Through DAVIX Hands-on Lab Visualization Contest

Introduction DAVIX Initial Situation Security visualization is quite new Currently two books available [1, 2]

Initial Situation Many free visualization tools But installation is often cumbersome Compiler version and library issues Code difficult to build or broken Diverse runtime environments: Java, Perl, Ruby, Python, Windows Applications Huge hurdle for people to get start with security visualization Mission Statement DAVIX shall provide the audience with a workable and integrated tools set, enable them to immediately start with security visualization and motivate them to contribute to the security visualization community.

Inside the DAVIX Live CD Live Linux CD system based on SLAX 6 [3] Software packages are modularized Easy customizable Runs from CD/DVD, USB stick or hard drive Collection of free tools for processing & visualization Tools work out of the box No compilation or installation of tools required Comes with documentation [4] Quick start description for the most important tools Links to manuals and tutorials DAVIX 1.0.1 Tools Capture Network Tools Argus Snort Wireshark Logging syslog-ng Fetching Data wget ftp scp Processing Shell Tools awk, grep, sed Visualization Preprocessing AfterGlow LGL Extraction Chaosreader Data Enrichment geoiplookup whois, gwhois Visualization Network Traffic EtherApe InetVis tnv Generic AfterGlow Graphviz LGL Viewer Mondrian R Project Treemap

Highlights Upcoming 1.0.5α Capture Network Tools Bro IDS Processing Integration Splunk NSM Console PCAP manipulation/ extraction ngrep tcpxtract tcpslice tcpflow Visualization Network Traffic FlowTag INAV NetGrok Zenmap Generic NAZAR Octave Visualization

Visualization Raffael Marty A picture is worth a thousand log records. [2] Ben Shneiderman The purpose of viz is insight, not pictures. [5] Information Seeking Mantra [6] Details on Demand Overview Zoom and Filter

Information Viz Process [2] Interface Issue Each visualization tool has its own file format interfaces Data must be converted to match the import interfaces These adapters are mostly self-written snippets of code Viz Tool 1 PCAP CSV? TM3 Viz Tool 2 Viz Tool 3?? Viz Tool 4

Walk-Through User Interface Menu organized around Info Viz Process Capture Process Visualize Tools often cover more than one category Afterglow Process, Visualize Additional tools/services Apache, MySQL, NTP

PDF User Manual Content Quick start guide Network setup information Tool usage examples Links to online resource Customizing DAVIX User Manual in the Menu The manual is browsable by chapter or individual tool chapters

Hands-on Lab Overview Lab built around Info Viz Process DAVIX Tools Processing Wireshark / tshark [7] p0f [8] awk [9], sed, uniq Snort [10] Visualization AfterGlow [11] Graphviz [12] Treemap [13] Problem Definition Details on Demand Visualize Overview Filter

Problem Definition Type of Traffic? Network Topology? Gateway? Team Server? Other Team Systems? Activities? Communication Pattern? Attacks? Type of Traffic

Overview - Background l CTF DEFCON 12 l l 6 teams l l l PCAP File 1 server per team with vulnerable services Many team member systems Symmetrical setup for all teams. Overview - Wireshark l Basic statistics l l l l 54 MB PCAP file Date 31.07.2004 41 min of traffic 100 000 packets

Overview - Wireshark Packets Protocols Mostly IP Mostly TCP Some UDP Traffic Volume Mostly TCP Overview - Wireshark TCP Mostly HTTP Some DCE RPC Windows

Overview - Wireshark Traffic Shape Constant at begin Massive increase at the end. tcp.port==80 Network Topology

Visualize: AfterGlow / Graphviz Possible Gateways Not a Gateway Zoom & Filter - tshark 001_network_topology_gateway.sh CSV of source/destination IP to source/destination MAC addresses 0.0.0.0,00:00:86:5b:e9:6a 0.0.0.0,00:04:5a:a2:d4:08 192.168.1.2,00:c0:95:e0:0e:af 192.168.3.2,00:c0:95:e0:0e:af 192.168.4.1,00:c0:95:e0:0e:af 192.168.4.152,00:09:6b:53:8a:81 192.168.4.153,00:c0:95:e0:0e:af...

Zoom & Filter - tshark 001_network_topology_gateway.sh Extract IP addresses and their MAC addresses tshark -r davix_workshop_captures.pcap -e ip.src -e eth.src -Tfields -E separator=, -R ip > ip_mac.csv tshark -r davix_workshop_captures.pcap -e ip.dst -e eth.dst -Tfields -E separator=, -R ip >> ip_mac.csv cat ip_mac.csv sort uniq > ip_mac_distinct.csv 001_network_topology_gateway.sh Visualize: AfterGlow / Graphviz Visualize CSV file using AfterGlow cat ip_mac_distinct.csv afterglow.pl -t neato -Tpng -o ip_mac_distinct.png View resulting image gqview

001_network_topology_gateway.sh Visualize: AfterGlow / Graphviz Possible Gateways Not a Gateway Overview p0f 002_network_topology_operating_system.sh Other teams come through NAT Results 192.168.4.1,FreeBSD 4.7-5.2 (or MacOS X 10.2-10.4) 192.168.4.1,FreeBSD 4.8-5.1 (or MacOS X 10.2-10.3) 192.168.4.1,Linux 2.4-2.6 192.168.4.1,OpenBSD 3.0-3.9 192.168.4.1,Windows 2000 SP4, XP SP1+ 192.168.4.1,Windows XP SP1+, 2000 SP3 192.168.4.152,Linux 2.4-2.6 192.168.4.153,Linux 2.4-2.6 192.168.4.154,Linux 2.4-2.6 192.168.4.157,Linux 2.4-2.6 192.168.4.159,Linux 2.4-2.6 192.168.4.160,Linux 2.4-2.6 192.168.4.45,Linux 2.4-2.6

Overview p0f 002_network_topology_operating_system.sh Identify Involved Operating Systems p0f -f /etc/p0f/p0f.fp -s davix_workshop_captures.pcap -N sed "s/ (up.*$//" sed "s/:[0-9]* - /,/" sort uniq Visualize Visio ;-) Topology Opponents 192.168.1.2 192.168.3.2 192.168.5.2 192.168.6.2 192.168.7.2 00:C0:95:E0:0E:AF 192.168.4.1 NAT IP 192.168.4.153 Linux 00:0B:5F:69:B2:01 CISCO 00:E0:98:08:F7:E2

Visualize Visio ;-) Our Team 00:0B:5F:69:B2:01 CISCO 00:E0:98:08:F7:E2 192.168.4.2 WIN 192.168.4.3 WIN 192.168.4.33 Linux 192.168.4.35?Unix? 192.168.4.36 192.168.4.45 Linux 192.168.4.152 Linux 192.168.4.154 Linux 192.168.4.157 Linux 192.168.4.159 Linux 192.168.4.160 Linux Activities Linked Graphs

Visualize: AfterGlow / Graphviz Green Our team Red Other teams Yellow NAT IP Blue Neutral 003_activity_connections.sh Zoom & Filter - tshark 003_activity_connections.sh Extract source & destination IP addresses tshark -r davix_workshop_captures.pcap -e ip.src -e ip.dst -Tfields -E separator=, -R ip > ipsrc_ipdst.csv

Visualize: AfterGlow / Graphviz Visualize CSV file using AfterGlow cat ipsrc_ipdst.csv afterglow.pl -c color1.properties -t neato -Tpng -o ipsrc_ipdst.png View resulting image gqview 003_activity_connections.sh Visualize: AfterGlow / Graphviz AfterGlow color1.properties 003_activity_connections.sh color.source="khaki1" if ($fields[0]=~/^192\.168\.4\.1$/); color.source="palegreen" if ($fields[0]=~/^192\.168\.4\..*/); color.source="lightblue" if ($fields[0]=~/^0\.0\.0\.0$/); color.source="lightblue" if ($fields[0]=~/^255\.255\.255\.255$/); color.source="lightblue" if ($fields[0]=~/^198\.123\.30\.132$/); color.source="lightsalmon" color.target="khaki1" if ($fields[1]=~/^192\.168\.4\.1$/); color.target="palegreen" if ($fields[1]=~/^192\.168\.4\..*/); color.target="lightblue" if ($fields[1]=~/^0\.0\.0\.0$/); color.target="lightblue" if ($fields[1]=~/^255\.255\.255\.255$/); color.target="lightblue" if ($fields[1]=~/^198\.123\.30\.132$/); color.target="lightsalmon"

Visualize: AfterGlow / Graphviz Green Our team Red Other teams Yellow NAT IP Blue Neutral 003_activity_connections.sh Visualize: AfterGlow / Graphviz Zoom Image 003_activity_connections.sh 192.168.4.0/24 attacking other teams But who is the most active IP?

Visualize: AfterGlow / Graphviz Size of nodes dependent on volume of activity 004_activity_connections_volume.sh Visualize: AfterGlow / Graphviz AfterGlow color2.properties 004_activity_connections_volume.sh color.source="khaki1" if ($fields[0]=~/^192\.168\.4\.1$/); color.source="palegreen" if ($fields[0]=~/^192\.168\.4\..*/); color.source="lightblue" if ($fields[0]=~/^0\.0\.0\.0$/); color.source="lightblue" if ($fields[0]=~/^255\.255\.255\.255$/); color.source="lightblue" if ($fields[0]=~/^198\.123\.30\.132$/); color.source="lightsalmon" size.source=$sourcecount{$sourcename}; maxnodesize=1; color.target="khaki1" if ($fields[1]=~/^192\.168\.4\.1$/); color.target="palegreen" if ($fields[1]=~/^192\.168\.4\..*/); color.target="lightblue" if ($fields[1]=~/^0\.0\.0\.0$/); color.target="lightblue" if ($fields[1]=~/^255\.255\.255\.255$/); color.target="lightblue" if ($fields[1]=~/^198\.123\.30\.132$/); color.target="lightsalmon" size.target=$targetcount{$targetname};

Visualize: AfterGlow / Graphviz Visualize CSV file using AfterGlow cat ipsrc_ipdst.csv afterglow.pl -c color2.properties -t neato -Tpng -o ipsrc_ipdst_2.png View resulting image gqview 004_activity_connections_volume.sh Visualize: AfterGlow / Graphviz Most active talker is 192.168.4.160 004_activity_connections_volume.sh

Activities Communication Patterns Visualize: Treemap 005_activity_connections_treemap.sh

Visualize: Treemap 005_activity_connections_treemap.sh TM3 formatted file IP Src IP Dest Count STRING STRING INTEGER 0.0.0.0 255.255.255.255 4 192.168.1.2 192.168.4.160 2833 192.168.3.2 192.168.4.153 2052 192.168.3.2 192.168.4.160 2 192.168.4.1 192.168.4.152 246 192.168.4.1 192.168.4.153 115 192.168.4.1 192.168.4.154 45 192.168.4.1 192.168.4.157 15 192.168.4.1 192.168.4.159 480 192.168.4.1 192.168.4.160 174 192.168.4.1 192.168.4.2 7022 192.168.4.1 192.168.4.3 39 192.168.4.152 192.168.4.1 273 Zoom & Filter: tshark 005_activity_connections_treemap.sh Extract source/destination IP & packet count tshark -r davix_workshop_captures.pcap -e ip.src -e ip.dst -Tfields E separator=/t -R "ip" sort uniq -c awk '{print $2 "," $3 "," $1}' > ipsrc_ipdst_pktcount.csv

Visualize: Treemap Convert CSV to TM3 format 005_activity_connections_treemap.sh cat ipsrc_ipdst_pktcount.csv awk -F, 'BEGIN { print "IP Src\tIP Dest\tCount"; print "STRING\tSTRING\tINTEGER" } { print $1 "\t" $2 "\t" $3 }' > ipsrc_ipdst_pktcount.tm3 Visualize: Treemap Open TM3 file in Treemap In Legend tab Set Label to count Set Size to count Set Color to IP Dest In Hierarchy tab Add IP Src to Hierarchy Add IP Dest to Hierarchy 005_activity_connections_treemap.sh

Visualize: Treemap 005_activity_connections_treemap.sh Contest Attacks

Zoom & Filter - Snort Extract Snort alerts 006_activity_attacks.sh snort -c /etc/snort/snort.bleeding.conf -r davix_workshop_captures.pcap Convert Snort alerts to CSV file cat /var/log/snort/alert snortalert2csv.pl "sip dip name" sort uniq Zoom & Filter - Snort Snort CSV file 006_activity_attacks.sh 192.168.4.1,192.168.4.2,(http_inspect) BARE BYTE UNICODE ENCODING 192.168.4.1,192.168.4.2,BLEEDING-EDGE PHPNuke general SQL injection attempt 192.168.4.1,192.168.4.2,BLEEDING-EDGE WEB-MISC Poison Null Byte 192.168.4.1,192.168.4.3,(http_inspect) OVERSIZE CHUNK ENCODING 192.168.4.1,192.168.4.3,BLEEDING-EDGE SCAN NMAP -sa (1) 192.168.4.152,192.168.7.2,(http_inspect) OVERSIZE CHUNK ENCODING 192.168.4.152,192.168.7.2,(http_inspect) WEBROOT DIRECTORY TRAVERSAL 192.168.4.152,192.168.7.2,BLEEDING-EDGE PHPNuke general SQL injection attempt 192.168.4.152,192.168.7.2,BLEEDING-EDGE SCAN NMAP -sa (1) 192.168.4.152,192.168.7.2,BLEEDING-EDGE WEB-MISC Poison Null Byte

006_activity_attacks.sh Visualize: Contest Modify existing workshop script 004_activity_connections_volume.sh and AfterGlow configuration color2.properties such that the shape of the nodes represent attacking nodes. the type of attack is visible in the linked graph. Visualize: Contest Terms and Conditions The best submission, which has solved exercise 1 AND 2, wins a copy of Raffael Marty's "Applied Security Visualization" book Result submissions must include a shell script that generates the graph be handed in until January 6, 2009 23:59 UTC be sent to jan dot monsch ät iplosion dot com Legal recourse is excluded 006_activity_attacks.sh

Q & A www.secviz.org davix.secviz.org References I [1] Conti G. Security Data Visualization. No Starch Press, 2007. [2] Marty R. Applied Security Visualization. Pearson Education, 2008. [3] Matějíček T. SLAX 6. http://www.slax.org [4] Monsch J. P., Marty R. DAVIX Manual 1.0.1. 2008. http://82.197.185.121/davix/release/davix-manual- 1.0.1.pdf [5] Shneiderman B. Keynote VizSec. Boston: 2008 [6] Shneiderman B. The Eyes Have It: A Task by Data Type Taxonomy for Information Visualization. IEEE Visual Languages. pp. 336 343. 1996.

References II [7] Wireshark / tshark Manual http://www.wireshark.org/docs/wsug_html/ [8] p0f http://lcamtuf.coredump.cx/p0f.shtml [9] awk Tutorial http://www.grymoire.com/unix/awk.html [10] Snort Manual http://www.snort.org/docs/snort_htmanuals/htmanual_282/ [11] AfterGlow Manual http://afterglow.sourceforge.net/manual.html [12] Graphviz Documentation http://www.graphviz.org/documentation.php [13] Treemap Manual http://www.cs.umd.edu/hcil/treemap/doc4.1/toc.html