Instructions For Using This Template - APNIC

3y ago
44 Views
2 Downloads
2.18 MB
54 Pages
Last View : 17d ago
Last Download : 3m ago
Upload by : Lucca Devoe
Transcription

1v1.2

Packet Analysis forNetwork Security2v1.2

Using Zoom for this webinar Keep chat settings to “All Panelists and Attendees” Use chat to share text, information, URLs amongst all attendees If you wish to ask a question to the presenters:–––––Click the Q&A buttonType your questionThe presenters will then answer your questions at an appropriate timeNote: Only the presenters will see your question, not other attendeesPlease don’t use chat to ask questions of the presenters, we might not see it3v1.2

Using Zoom for this webinar4v1.2

5APNIC Academy – Free to the PublicONLINE COURSEShttps://academy.apnic.netLIVEW EBINARSVIRTUAL LABSSign up for training updates v1.2

6APNIC Academy – Free to the PublicM U LT I L I N G U A L S U P P O R T x 8 L A N G U A G E SN E W I P v 6 F U N D A M E N TA L S C O U R S E6v1.2

APNIC Policy Development v1.2

Networking from Home – NEW!Call for papers open now for first event on 2 Junehttps://nfh.apnic.net8v1.2

Agenda Why Network Security? Attack Frameworks Detection analysis techniques List of Free Open Source Software (F.O.S.S) Overview of Security Onion Demo Time9v1.2

Amount of attacks – SSH attack APNIC 46 Network security workshop, deployed 7 honeypotsto a cloud service 21,077 attacks in 24 hours Top 5 sensors–––––training06 (8,431 attacks)training01 (5,268 attacks)training04 (2,208 attacks)training07 (2,025 attacks)training03 (1,850 attacks)10v1.2

Time of attack – RDP attackThe 10 RDP honeypots logged acombined 4,298,513 failed login attemptsover a 30-day -thats-already-at-your-doorwp.pdf last accessed 24/07/201911v1.2

Legislative requirements Government intervention and regulation–––––Europe, GDPR (General Data Protection Regulation)Australia, Notifiable Data Breaches (NDB) schemeUnited States, various State data breach notification StatutesIndia, Personal Data Protection Bill (Early 2020)China, Cybersecurity Law & draft Data Security AdministrativeMeasures Data protection laws of the world– https://www.dlapiperdataprotection.com12v1.2

Legislative /index.html13v1.2

Attack Life 2

Mitigate Cyber Security entVery goodVery goodVery goodLimitedLimitedMitigation strategyPotential Upfront costuser(staff,resistance equipment,technicalcomplexity)Mitigation strategies to detect cyber security incidents and respondContinuous incident detection and response withautomated immediate analysis of centralised timesynchronised logs of permitted and denied: computer events,authentication, file access and network activity.Host-based intrusion detection/prevention system toidentify anomalous behaviour during program execution e.g.process injection, keystroke logging, driver loading andpersistence.Endpoint detection and response software on allcomputers to centrally log system behaviour and facilitateincident response. Microsoft’s free SysMon tool is an entrylevel option.Hunt to discover incidents based on knowledge ofadversary tradecraft. Leverage threat intelligence consistingof analysed threat data with context enabling mitigatingaction, not just indicators of compromise.Network-based intrusion detection/preventionsystem using signatures and heuristics to identify anomaloustraffic both internally and crossing network perimeterboundaries.Capture network traffic to and from corporate computersstoring important data or considered as critical assets, andnetwork traffic traversing the network perimeter, to performincident detection and analysis.Ongoingmaintenancecost (mainlystaff)LowVery highVery highLowMediumMediumLowMediumMediumLowVery highVery v.au/sites/default/files/2019-03/Mitigation Strategies 2017.pdf15v1.2

NIST Cybersecurity ST.CSWP.04162018.pdf16v1.2

NIST Cybersecurity Framework Anomalies and Events (AE) in the Detect (DE) functionalarea, there are five subcategories:– DE.AE-1: A baseline of network operations and expected data flows forusers and systems is established and managed– DE.AE-2: Detected events are analyzed to understand attack targetsand methods– DE.AE-3: Event data are aggregated and correlated from multiplesources and sensors– DE.AE-4: Impact of events is determined– DE.AE-5: Incident alert thresholds are NIST.CSWP.04162018.pdf17v1.2

NIST Cybersecurity Framework DE.AE-2: Detected events are analyzed to understand attacktargets and methods––––CIS CSC 3, 6, 13, 15COBIT 5 DSS05.07ISA 62443-2-1:2009 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8ISA 62443-3-3:2013 SR 2.8, SR 2.9, SR 2.10, SR 2.11, SR 2.12, SR 3.9,SR 6.1, SR 6.2– ISO/IEC 27001:2013 A.12.4.1, A.16.1.1, A.16.1.4– NIST SP 800-53 Rev. 4 AU-6, CA-7, IR-4, SI-4 AU-6 - Audit Review, Analysis, and Reporting;CA-7 – Continious Monitoring;IR-4 – Incident Hadling;SI-4 – Information System monitoring eg IDS, Automated tools, .CSWP.04162018.pdf18v1.2

ATT&CK Matrix for Enterprisehttps://attack.mitre.org – accessed 12th Nov 201819v1.2

ATT&CK Matrix for Enterprisehttps://attack.mitre.org – accessed 12th Nov 201820v1.2

Packet analysis21v1.2

Signature analysis Distinctive marks of known bad traffic used to generatealerts.– virus detection,– malicious website or– malware files. Distinctive marks include:––––––IP addressesHostnamesOffsets – for example, memory related exploitDebug information“Ego” strings (strings left in the code)Header information22v1.2

Signature analysis An example could be detecting a nmap scan of anetwork by looking at the User-Agent string.alert tcp EXTERNAL NET any - any any (msg:"Nmap User-AgentObserved"; flow:to server,established; content:"User-Agent 3a ";http header; content:" 20 Nmap"; sid:1000001; rev:3;)23v1.2

Session analysis Utilises the session metadata to determine what ishappening during a session.– which devices causing the traffic– the type of traffic or– what data is being transferred. Looks at the behaviour of the sessions and looks forbehaviour that is not normal.24v1.2

Session analysis An example is once a network has beencompromised, Domain Name Services (DNS) may beused to exfiltrate data.Wireshark filter: “dns.qry.name.len 1.2

Which technique? Signature analysis– can be used to create the alert; then Session analysis– can help investigate the alert further.26v1.2

FOSS Tools Open source network monitoring and logmanagement tashKibanaSnortSuricataZeek (formerly Bro)SguilSquertTcpdump* FOSS - Free Open Source Software27v1.2

Log Management Logstash– used to gather data from multiple sources and transform it forstorage. Elasticsearch– distributed, RESTful search and analytics engine. Kibana– Visualisation tool for Elasticsearch and other data setshttps://www.elastic.co/products/28v1.2

Intrusion Detection tools Snort– Intrusion detection system (IDS). Suricata– Intrusion detection system (IDS).29v1.2

Network Monitoring Zeek (formerly Bro)– Network traffic analysis tool Sguil– collection of free software components for Network SecurityMonitoring (NSM) and event driven analysis of IDS alerts Squert– web application that is used to query and view event datastored in a Sguil database.30v1.2

Packet capture TCPdump– command line utility used to capture and analyse packets onnetwork interfaces. Wireshark– utility used to capture and analyse packets on networkinterfaces. Cloudshark– web-based utility used to analyse packet captures.31v1.2

Packet Analysis for Network SecurityLab exercise: TCP .2

TCPdump command example# cd /opt/samples# tcpdump -nn -r fake av.pcap wc -l# tcpdump -nn -r fake av.pcap head# tcpdump -nn -r fake av.pcap cut -f 3 -d " " head# tcpdump -nn -r fake av.pcap 'tcp or udp' cut -f 3 -d " " cut -f 1-4 -d "." headDisplay top 10 destinations# tcpdump -nn -r fake av.pcap 'tcp or udp' cut -f 5 -d " " cut -f 1-4 -d "." sort uniq-c sort -nr head-nn don’t use DNS to resolve IPs and display port no-r replay pcap file-f field to select-d delimiter to use33v1.2

TCPdump command example# tcpdump -nn -r fake av.pcap 'port 53' head -5# tcpdump -nn -r fake av.pcap 'port 53' grep -Ev '(com net org gov mil arpa)' cut -f 9 -d " " head# tcpdump -nn -r fake av.pcap 'port 53' grep -Ev '(com net org gov mil arpa)' cut -f 8 -d " " grep -E '[a-z]’If a suspicious domain name is found, usehttps://www.virustotal.com/gui/home/urlTo check if malicious34v1.2

TCPdump command example# cd /opt/samples/mta# for capfile in (ls *.pcap); do tcpdump -nn -r capfile 'port 53' grep -Ev'(com net org gov mil arpa)' cut -f 8 -d " " grep -E '[a-z]'; done;Check for plain text passwords in pcap files# for capfile in (ls *.pcap); do tcpdump -nn -r capfile port http or port ftp orport smtp or port imap or port pop3 or port telnet -lA egrep -i -B5'pass pwd log login user username pw passw passwd password pass: user: username: password: login: pass user '; done;-l force line buffered mode-A include ascii strings from the capture35v1.2

Security Onion Linux-based open source network monitoring and logmanagement toolkit. Can be installed as a Virtual Machine (VM) or on aphysical machine. Best practice is to use two network interfaces:1. Management Network2. Monitored Networkhttps://securityonion.net36v1.2

Security t/architecture.html37v1.2

How to Install Straight forward, if experience installing Ubuntu16.04– Download tyonion/blob/master/Verify ISO.md– Base install is similar to Ubuntu installation– Once Ubuntu is installed double-click on the setup icon on thedesktop.– Select the evaluation mode, as this will install all the tools onthe one machine (standalone).38v1.2

Security Onion - commandsCommandDescriptionsudo soupUpdate Security Onion (and Ubuntu)sudo so-statusCheck service statussudo sostatGenerate Security Onion statisticssudo so-startsudo so-stopsudo so-restartStart all servicesStop all servicesRestart all servicessudo so-user-addAdd user for Sguil/Squert/Kibanasudo rule-updateUpdate rules after modifying filesudo so-allowsudo so-allow-viewOpen ports for ufwView current firewall t/cheat-sheet.html39v1.2

Security Onion - filesFolder / FilesDescription/etc/nsm/Location of configuration files/etc/nsm/securityonion.confSecurity Onion general settings/opt/bro/nsm/bro/logsLocation of Bro filesLocation of Bro log files/etc/elasticsearchLocation of ElasticSearch files/etc/logstashLocation of LogStash files/etc/kibanaLocation of Kibana files/var/logLocation of log files/opt/samplesExample packet capture t/cheat-sheet.html40v1.2

Security Onion - rulesFolder / nloaded IDS rules/etc/nsm/rules/local.rulesCustom IDS rules/etc/nsm/rules/threshold.confRule bled rules by SID/etc/nsm/pulledpork/modifysid.confModified rules/etc/nsm/pulledpork/pulledpork.confPulled Pork Configuration/etc/elastalert/rulesElastalert t/cheat-sheet.html41v1.2

Import packet capturesCommandDescriptionsudo tcpreplay -i ens34 -M10fake av.pcapImport the packet capture as newtraffic with the current date andtime, using interface ens34,limiting to 10MB throughputsudo so-replayImport all the sample packetcaptures as new traffic with thecurrent date and time.sudo so-import-pcap fake av.pcapImport the traffic, whilst keepingthe timestamp the same as theoriginal packet capture date io/en/latest/so-import-pcap.html42v1.2

Import packet capturesCommandDescriptioncapinfos {pcap file}Display statistics about the packetcapture filetshark -F pcap -r {pcapng file} -w {pcapfile}Convert packet capture Next Genfile to earlier packet en/latest/so-import-pcap.html43v1.2

Packet Analysis for Network SecurityLab 44v1.2

Exercise Import the sample captured (pcap) t/samples/markofu/outbound.pcapsudo tcpreplay -i ens33 -M10 /opt/samples/markofu/jackcr-challenge.pcapsudo tcpreplay -i ens33 -M10 /opt/samples/markofu/outbound.pcap45v1.2

Exercise 1: Squert Q1– What type of malicious traffic is suspected? Q2: What is the top source IP and destination IP– Source , Destination . Q3: What is the other IP address communicating withthe top source IP?46v1.2

Exercise 1: Squert47v1.2

Exercise 1: Squert48v1.2

Exercise 2: Sguil Question: What was the rule that generated theoriginal alert?49v1.2

Exercise 3: Sguil Question: What is the filename of the downloadedsuspicious file?51v1.2

Exercise 4: Wireshark/Netminer Question: Can the downloaded suspicious file beextracted?53v1.2

Exercise 5: Malicious file Q1: What is the md5 hash value of the downloadedfile? Q2: When the hash value is submitted to Virus Total,is it found to be malicious?55v1.2

57v1.2

Thank You!58v1.2

APNIC 46 Network security workshop, deployed 7 honeypots to a cloud service 21,077 attacks in 24 hours Top 5 sensors –training06 (8,431 attacks) –training01 (5,268 attacks) –training04 (2,208 attacks) –training07 (2,025 attacks) –training03 (1,850 attacks)

Related Documents:

Bruksanvisning för bilstereo . Bruksanvisning for bilstereo . Instrukcja obsługi samochodowego odtwarzacza stereo . Operating Instructions for Car Stereo . 610-104 . SV . Bruksanvisning i original

10 tips och tricks för att lyckas med ert sap-projekt 20 SAPSANYTT 2/2015 De flesta projektledare känner säkert till Cobb’s paradox. Martin Cobb verkade som CIO för sekretariatet för Treasury Board of Canada 1995 då han ställde frågan

service i Norge och Finland drivs inom ramen för ett enskilt företag (NRK. 1 och Yleisradio), fin ns det i Sverige tre: Ett för tv (Sveriges Television , SVT ), ett för radio (Sveriges Radio , SR ) och ett för utbildnings program (Sveriges Utbildningsradio, UR, vilket till följd av sin begränsade storlek inte återfinns bland de 25 största

Hotell För hotell anges de tre klasserna A/B, C och D. Det betyder att den "normala" standarden C är acceptabel men att motiven för en högre standard är starka. Ljudklass C motsvarar de tidigare normkraven för hotell, ljudklass A/B motsvarar kraven för moderna hotell med hög standard och ljudklass D kan användas vid

LÄS NOGGRANT FÖLJANDE VILLKOR FÖR APPLE DEVELOPER PROGRAM LICENCE . Apple Developer Program License Agreement Syfte Du vill använda Apple-mjukvara (enligt definitionen nedan) för att utveckla en eller flera Applikationer (enligt definitionen nedan) för Apple-märkta produkter. . Applikationer som utvecklas för iOS-produkter, Apple .

och krav. Maskinerna skriver ut upp till fyra tum breda etiketter med direkt termoteknik och termotransferteknik och är lämpliga för en lång rad användningsområden på vertikala marknader. TD-seriens professionella etikettskrivare för . skrivbordet. Brothers nya avancerade 4-tums etikettskrivare för skrivbordet är effektiva och enkla att

Den kanadensiska språkvetaren Jim Cummins har visat i sin forskning från år 1979 att det kan ta 1 till 3 år för att lära sig ett vardagsspråk och mellan 5 till 7 år för att behärska ett akademiskt språk.4 Han införde två begrepp för att beskriva elevernas språkliga kompetens: BI

**Godkänd av MAN för upp till 120 000 km och Mercedes Benz, Volvo och Renault för upp till 100 000 km i enlighet med deras specifikationer. Faktiskt oljebyte beror på motortyp, körförhållanden, servicehistorik, OBD och bränslekvalitet. Se alltid tillverkarens instruktionsbok. Art.Nr. 159CAC Art.Nr. 159CAA Art.Nr. 159CAB Art.Nr. 217B1B