visualizing ids output: title of presentation tools and

31
Title of Presentation Visualizing IDS Output: Tools and Methodology Russ McRee Microsoft Corporation Session ID: NMS-402 Session ID: NMS 402 Session Classification: Advanced

Upload: others

Post on 20-Apr-2022

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Visualizing IDS Output: Title of Presentation Tools and

Title of PresentationVisualizing IDS Output: Tools and Methodology

Russ McReeMicrosoft Corporation

Session ID: NMS-402Session ID: NMS 402Session Classification: Advanced

Page 2: Visualizing IDS Output: Title of Presentation Tools and

Bio

• Team Leader for Microsoft Online Services Security Incident ManagementSecurity Incident Management

• Holisticinfosec.org – all files discussed today will be available herebe available here

• Toolsmith, other publications– ISSA Journal

2

Page 3: Visualizing IDS Output: Title of Presentation Tools and

Agenda

Stem the tide…

Analysis overview

Tools & DemosTools & Demos

3

Page 4: Visualizing IDS Output: Title of Presentation Tools and

Stem the tideStem the tide

4

Page 5: Visualizing IDS Output: Title of Presentation Tools and

Stem the tide…

• Parsing logs, oh joy!B SEM SIEM t i ht?• Buy SEM, SIEM…money grows on trees right?

• How do you watch your network?C i i ?– Coming or going?

– If one assumes compromise by default, which matters more…ingress or egress?

5

Page 6: Visualizing IDS Output: Title of Presentation Tools and

Stem the tide…

• We can’t even begin to pay attention to noise bouncing off the front doorbouncing off the front door

• What matters is what’s leaving your network bound for the Axis of Evilbound for the Axis of Evil

• Whitelist anyone?– What should be leaving versus what is leaving your network?g g y– What if you had a baseline of expected norms from your

network, and everything else was considered suspicious?

• Visualizing egress traffic helps optimizeVisualizing egress traffic helps optimize baselines & conduct thorough investigations

6

Page 7: Visualizing IDS Output: Title of Presentation Tools and

Analysis overviewAnalysis overview

7

Page 8: Visualizing IDS Output: Title of Presentation Tools and

Analysis overview

• Captures and real time monitoring are great, but if you manage large networks you need helpif you manage large networks you need help

• Snort analysis of static PCAPs has always been useful, but visualization can enhance greatlyuseful, but visualization can enhance greatly

• We’ll look at a set of PCAPs, how they look to Snort versus how they look to visualization toolsy

8

Page 9: Visualizing IDS Output: Title of Presentation Tools and

Recommened books

• Raffael Marty • Greg Conti

• Applied Security Visualization • Security Data Visualization: Graphical Techniques for Network Analysis

9

Page 10: Visualizing IDS Output: Title of Presentation Tools and

Tools & DemosTools & Demos

10

Page 11: Visualizing IDS Output: Title of Presentation Tools and

Tools - DAVIX

• Data Analysis & Visualization Linux (DAVIX) The DAVIX Live CD: for data analysis & visualization providing– The DAVIX Live CD: for data analysis & visualization providing free tools for data processing and visualization

– Slackware-based distribution that includes:• well known SecViz toolse o Sec oo s• a comprehensive manual• extensive bookmark collection for online resources on visualization tools,

libraries and applications

11

Page 12: Visualizing IDS Output: Title of Presentation Tools and

Tools – Snort & Emerging Threats

• Everyone knows what Snort is, right?• Matt Jonkman’s project drives open source• Matt Jonkman s project drives open source,

community driven rules for use with Snort• Very bleeding edgey g g• Funding by Army Research Office & National

Science Foundation to continue project & research• Detect new threats in your environment and write

new rules for public release to the community • Rulesets are updated as new information surfaces

(many times daily), update at least 2x a week

12

Page 13: Visualizing IDS Output: Title of Presentation Tools and

Tools

• AfterGlow– collection of scripts which facilitate the process of generating

hgraphs

• Rumint– network and security visualization tool that can load pcap– network and security visualization tool that can load pcap

datasets and capture live traffic, including VCR/PVR interface

• NetGrok– visualizes in real-time via group-based graph layout & treemap.

Read PCAPs & captures from live interface

• Maltegog– intelligence & forensics app with data mining and intelligence

gathering capabilities. Identifies relationships.

13

Page 14: Visualizing IDS Output: Title of Presentation Tools and

DemosDemos

14

Page 15: Visualizing IDS Output: Title of Presentation Tools and

AfterGlow

“I am often faced with the problem of looking at a complex dataset and understanding the relationships of various. g pInstead of reading through the file, line by line, I like to look at graphs that visualize the data. One powerful type of graphs useful to visualize relationships among entities, are g p p g ,so-called linked graphs or network graphs.” – RaffaelMarty

15

Page 16: Visualizing IDS Output: Title of Presentation Tools and

Demo: AfterGlow & IRC.Flood

IRC.Flood – classic IRC bot, noisy and obvious, a Trojan that connects to tcp 5553Trojan that connects to tcp 5553

Outbound (egress)

16

Page 17: Visualizing IDS Output: Title of Presentation Tools and

Demo: AfterGlow & IRC.Flood

LIVE DEMO (AfterGlow)

17

Page 18: Visualizing IDS Output: Title of Presentation Tools and

Demo Summary: AfterGlow & IRC.Flood

• Source file: camda.pcap

sudo snort –c /etc/snort/snort.conf –r d l t t/ dcamda.pcap –l output/camda

SnortAfterGlow

18

Page 19: Visualizing IDS Output: Title of Presentation Tools and

Rumint

“I caution you not to fall into the trap of just creating pictures Instead seek to addresscreating pictures. Instead, seek to address problems only where it makes sense.” - Greg Conti

19

Page 20: Visualizing IDS Output: Title of Presentation Tools and

Korgo & Rumint

Korgo (aka Padobot) is a network worm written by the Russian Hangup Team virus group It spreadsthe Russian Hangup Team virus group. It spreads using a vulnerability in Windows LSASS

20

Page 21: Visualizing IDS Output: Title of Presentation Tools and

Summary: Korgo & Rumint

• Source file: korgo.pcap

Snort

File Open korgo.pcap

sudo snort –c /etc/snort/snort.conf –r korgo.pcap –l output/korgo

Snort

RumintRumint

21

Page 22: Visualizing IDS Output: Title of Presentation Tools and

NetGrok

“A picture is worth a thousand words. An interface is worth a thousand pictures.” - Ben Shneidermanp“Leonardo Da Vinci combined art and science and aesthetics and engineering, that kind of unity is needed once again ” Ben Shneidermanonce again. - Ben Shneiderman

22

Page 23: Visualizing IDS Output: Title of Presentation Tools and

Demo: Kraken & NetGrok

Kraken – big 2008 botnet, also known as Bobax or Hacktool Targeted Fortune 500 evades AVHacktool. Targeted Fortune 500, evades AV

O tb d ( g )Outbound (egress)

23

Page 24: Visualizing IDS Output: Title of Presentation Tools and

Demo: Kraken & NetGrok

LIVE DEMO (NetGrok)

24

Page 25: Visualizing IDS Output: Title of Presentation Tools and

Demo Summary: Kraken & NetGrok

• Source file: kraken.pcap

SnortFile Open kraken.pcap

sudo snort –c /etc/snort/snort.conf –r kraken.pcap –l output/kraken

Snort

NetGrokNetGrok

25

Page 26: Visualizing IDS Output: Title of Presentation Tools and

Maltego

“Maltego can be used for the information gathering phase of all security related work aiding you in your thinking y g y y gprocess by visually demonstrating interconnected links between searched items with more powerful search, giving you smarter results and access to "hidden" information” -yPaterva

26

Page 27: Visualizing IDS Output: Title of Presentation Tools and

Demo: Zeus & Maltego

Zeus Trojan (the original APT): malware that organized criminals use to steal information from countless businesses and government organizations use the stolen credentials toand government organizations…use the stolen credentials to siphon victim organization’s bank accounts, funnel the money through accomplices, who then wire the cash overseas to Ukraine and other Eastern European nationsUkraine and other Eastern European nations.

27

Page 28: Visualizing IDS Output: Title of Presentation Tools and

Demo: Zeus & Maltego

LIVE DEMO (Maltego)

28

Page 29: Visualizing IDS Output: Title of Presentation Tools and

Demo Summary: Zeus & Maltego

• Source file: zeus.pcap

Snorttcpdump -vttttnnelr zeus.pcap | /usr/local/bin/tcpdump2csv.pl "sip dip dport" > zeus.csv

sudo snort –c /etc/snort/snort.conf –r zeus.pcap –l output/zeus2020 Maltego

1) getSourceClients from zeus.csv via local Phrase transformlocal Phrase transform2) getDestinationClients from all IP addresses acquired from first step

29

Page 30: Visualizing IDS Output: Title of Presentation Tools and

In closing

• Jump in. Play with these tools and others not discusseddiscussed

• DAVIX is a great way to get started without having to build a dedicated systemhaving to build a dedicated system

• Read the books!• I’ll share all my PCAPs transforms and• I ll share all my PCAPs, transforms, and

visualizations with anyone who would like them• russ@holisticinfosec [email protected]

30

Page 31: Visualizing IDS Output: Title of Presentation Tools and

Q & AQ & A

“© 2010 Microsoft Corporation. All rights reserved. Microsoft, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market 

31

conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.”