debugging & monitoring c2 traffic with haka · 3. on-the-fly packet modification (hijack botnet...

Post on 27-Jul-2020

2 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

DEBUGGING & MONITORING C2 TRAFFIC WITH HAKA

BENOIT ANCEL & MEHDI TALBI STORMSHIELD

• Motivations

• Haka

• Malware monitoring - Demo – China-Z – Athena

• Conclusions

!2

OUTLINE

• Long-term malware monitoring – Threat Intelligence – Tracking malware campaign

• Lack of means to monitor, debug and monitor malware network activities

!3

MOTIVATIONS

!4

HAKA

AN OPEN SOURCE SECURITY-ORIENTED LANGUAGE

1. Malware protocol dissection 2. Advanced API for packet and stream manipulations 3. On-the-fly packet modification (hijack botnet commands) 4. Interactive packet filtering mode (break into packets and

inspect their content) 5. Instruction disassembler (disas. packet content at

network level) 6. Dedicated tool to monitor traffic : Hakabana

!5

HAKA MOTIVATIONS

!6

HAKA ARCHITECTURE

• Protocol Specification : Message format + State machine

• Support of text-based protocols (http) and binary-based protocols (dns)

• Support of packet-based protocols (icmp) and stream-based protocols (http)

• All parsed fields are available in read/write access to security rules

!7

HAKA PROTOCOL DISSECTION

!8

HAKA GRAMMAR BUILDING BLOCKS

basic blocks compound blocks

!9

HAKA PROTOCOL DISSECTION EXAMPLE

• Inspecting packet content

• Matching a malicious pattern across multiple packets

!10

HAKA SECURITY RULES (1)

!11

HAKA SECURITY RULES (2)

drop packets

inject packets

alter packets

!12

HAKA SECURITY RULE EXAMPLE

!13

MONITORING C2 TRAFFIC

USE CASES

• Well known Chinese botnet

• 5 known variants: China-Z/{A, B, C, O, S}

• Includes binary and configuration update features

• DDoS campaigns targeting Asia

!14

CHINA-Z OVERVIEW

!15

CHINA-Z C2 COMMUNICATIONS

Request

Response

!16

CHINA-Z - SECURITY RULES BLOCKING DDOS ATTACKS

!17

CHINA-Z DEMO

https://www.youtube.com/watch?v=-XeyMMcZ-TI

• Several features : click fraud, ddos, bot killer, etc. • Communicates over http • Encoded requests and responses (hex + base64

encodings)

!18

ATHENA OVERVIEW

!19

ATHENA COMMANDS

!20

ATHENA - SECURITY RULES HIJACKING BOTNET COMMANDS

!21

ATHENA DEMO

https://www.youtube.com/watch?v=5hMKN0k_zCQ

• Haka provides several features to monitor and debug C2 traffic.

• Future works : provide a repository of malware protocol dissectors

!22

CONCLUSIONS

!23

THANK YOU

github.com/haka-security @hakasecurity haka-security.org

top related