46
Solving Network Mysteries Slide - 1 Dan VanBelleghem Senior Information Assurance Engineer - SRA Penetration Testing Security Training Security Readiness Reviews Incident Response Security Assessments Director of Security Programs - Network Forensics Security Assistance Teams for US DoD - BAH Security Audits and Assessments for Fortune 500 - D&T

Network Security Forensics

Embed Size (px)

DESCRIPTION

Network Security Forensics

Citation preview

Page 1: Network Security Forensics

Solving Network Mysteries Slide - 1

Dan VanBelleghemDan VanBelleghem

Senior Information Assurance Engineer - SRA Penetration Testing Security Training Security Readiness Reviews Incident Response Security Assessments

Director of Security Programs - Network Forensics Security Assistance Teams for US DoD - BAH Security Audits and Assessments for Fortune 500 - D&T

Page 2: Network Security Forensics

Solving Network Mysteries Slide - 2

Network Mystery QuizNetwork Mystery Quiz

Do you know: What is happening on your network? What users are doing? If users are compliant with policy? If users’ internal and external network

communications affect the enterprise security posture?

If anomalous behavior is detectable on the network?

Why network diagrams are not enough?

Page 3: Network Security Forensics

Solving Network Mysteries Slide - 3

ObjectivesObjectives

The objectives of this session are to provide an overview of the following:

Examples of network activities that are often overlooked

Techniques used in solving mysteries Benefits from audit & monitoring Recommendations for performing audit &

monitoring

Page 4: Network Security Forensics

Solving Network Mysteries Slide - 4

ObservationsObservations

• The following observations will provide examples of network security issues that could have been discovered with good audit and monitoring practices in place

• Discovery, analysis and lessons learned will be discussed for each of the following examples:• Uncovering DDOS agents• Harassing e-mails• Rogue servers and applications• System administrator misuse

Page 5: Network Security Forensics

Solving Network Mysteries Slide - 5

DDOS Agent DiscoveryDDOS Agent Discovery

Background• Enterprise network solution company• Firewall policy allowed DNS traffic• Firewalls managed in Colorado• DNS servers managed locally at other

national offices

Page 6: Network Security Forensics

Solving Network Mysteries Slide - 6

DDOSDDOS

F

INTERNET

victim.comHQ

Local DNS

Secondary DNS

victim.comLocal Offices

Primary DNS

Managed by network operations

Permit DNS

Managed by local office staff

Page 7: Network Security Forensics

Solving Network Mysteries Slide - 7

DDOS DDOS

F

INTERNET

victim.comHQ

Local DNS

Secondary DNS

victim.comLocal Offices

Primary DNS

Attacker

• DNS service exploited

• Root access gained

• Trust relationships exploited

• DDOS agent planted

Page 8: Network Security Forensics

Solving Network Mysteries Slide - 8

DDOS Agent DiscoveryDDOS Agent Discovery

Techniques used for discovery• Network traffic analysis

• “unusual traffic”• Firewall logs reviewed• DNS server and OS logs reviewed

Page 9: Network Security Forensics

Solving Network Mysteries Slide - 9

DDOS Agent DiscoveryDDOS Agent Discovery

Lessons learned• Firewall logs not reviewed• DNS server (OS and application) logs not

reviewed• IP spoofing not monitored internally• Integrity checking not performed

Page 10: Network Security Forensics

Solving Network Mysteries Slide - 10

DDOS Agent DiscoveryDDOS Agent Discovery

Recommendations• Perform regular log review of network service

systems (DNS, Firewall, Mail, etc)• Automate• Outsource

• Monitor and review network traffic patterns and trends

• Network monitors• Network device logs

• Perform host integrity checking for critical assets • Tripwire• System profile checkers

Page 11: Network Security Forensics

Solving Network Mysteries Slide - 11

Harassing E-mailsHarassing E-mails

Background• Employee was receiving harassing e-mails

from an anonymous external source (e.g., hotmail)

• An internal employee was suspected but could not be confirmed

Page 12: Network Security Forensics

Solving Network Mysteries Slide - 12

Harassing E-mailsHarassing E-mails

Techniques used for discovery Collected network traffic using a packet sniffer Searched traffic for hosts going to and from hotmail.com Once an originating IP address was found, then searched

for user name that sent anonymous e-mail Specifically looked for CGI postings of the message - this

was the proof to determine the person who sent it

Page 13: Network Security Forensics

Solving Network Mysteries Slide - 13

Page 14: Network Security Forensics

Solving Network Mysteries Slide - 14

Page 15: Network Security Forensics

Solving Network Mysteries Slide - 15

Page 16: Network Security Forensics

Solving Network Mysteries Slide - 16

Harassing E-mails (cont.)Harassing E-mails (cont.)

Page 17: Network Security Forensics

Solving Network Mysteries Slide - 17

Page 18: Network Security Forensics

Solving Network Mysteries Slide - 18

Page 19: Network Security Forensics

Solving Network Mysteries Slide - 19

Page 20: Network Security Forensics

Solving Network Mysteries Slide - 20

Page 21: Network Security Forensics

Solving Network Mysteries Slide - 21

Page 22: Network Security Forensics

Solving Network Mysteries Slide - 22

Harassing E-mailsHarassing E-mails

Recommendations Implement e-mail policy Monitor for non-production e-mail traffic Develop monitoring scripts or procure

commercial tools

Page 23: Network Security Forensics

Solving Network Mysteries Slide - 23

Rogue Servers/ApplicationsRogue Servers/Applications

Background• Users install unauthorized devices, “stowaways,” on

the production network• Enabling write access on anonymous ftp services for

convenience• Users installing unauthorized services (e.g., web

servers) to the production network

Page 24: Network Security Forensics

Solving Network Mysteries Slide - 24

Rogue Servers/ApplicationsRogue Servers/Applications

Techniques used for discovery• Monitoring procedures implemented • Leveraged automation

• Network sweep: fping• TCP/UDP port scanning: nmap

• Consider appliance solution: NetFox

Page 25: Network Security Forensics

Solving Network Mysteries Slide - 25

Rogue Servers/ApplicationsRogue Servers/Applications

Page 26: Network Security Forensics

Solving Network Mysteries Slide - 26

Rogue Servers/ApplicationsRogue Servers/Applications

Page 27: Network Security Forensics

Solving Network Mysteries Slide - 27

Rogue Servers/ApplicationsRogue Servers/Applications

Recommendations• Create a robust network security policy• Educate the user knowledge base to the policies and

security fundamentals• Implement consistent procedures to achieve these

goals

Page 28: Network Security Forensics

Solving Network Mysteries Slide - 28

System AdministratorSystem Administrator

Background• Government agency• Outsourced system administration duties• Controlled application network with strict perimeter

security• Only database and e-mail traffic in and out of control

network• Firewall was monitored for all unsuccessful attempts

Page 29: Network Security Forensics

Solving Network Mysteries Slide - 29

System AdministratorSystem Administrator

• Monitor status of network remotely• Batch job to inspect health of systems• Sent results of process to home account - - in

clear text

Page 30: Network Security Forensics

Solving Network Mysteries Slide - 30

System AdministratorSystem Administrator

From: [email protected]: [email protected]: System Report

Hostname: database.victim.gov

System uptime: 2 days 14 hours

Active users:oracle system larry steve

interface status:hme0 10.10.150.12

Services Running:db http inetd

Page 31: Network Security Forensics

Solving Network Mysteries Slide - 31

System AdministratorSystem Administrator

Techniques used for discovery• Firewall logs reviewed• Network traffic analysis

Page 32: Network Security Forensics

Solving Network Mysteries Slide - 32

System AdministratorSystem Administrator

Lessons learned• Administrators needed security awareness

training• No official remote administration procedures

were in place• Adequate tools were not available to support

environment requirements

Page 33: Network Security Forensics

Solving Network Mysteries Slide - 33

System AdministratorSystem Administrator

Recommendations• Implement appropriate remote administration

solution• Conduct constant administrator training

Page 34: Network Security Forensics

Solving Network Mysteries Slide - 34

Audit & Monitoring GoalsAudit & Monitoring Goals

Protect Provides input to policy changes or mis-configurations Acts as a deterrent

Detect Analysis of all data Passive collection Active scanning

Analyze and Recover Forensic level analysis Rapid answers to the who, what, when, where, how questions Full damage control Network, system and application level audit logs Centralized information source

Page 35: Network Security Forensics

Solving Network Mysteries Slide - 35

Audit & Monitoring Enablers Audit & Monitoring Enablers

Logs Host Application System

Network Packet sniffers NIDS

Analysis Database Scripts

Page 36: Network Security Forensics

Solving Network Mysteries Slide - 36

LogsLogs

Logs are great source of information if: They have been enabled They are still there Their integrity is not questionable Someone reads them!

Provide Who and When Do not provide content (e.g.,What)

Page 37: Network Security Forensics

Solving Network Mysteries Slide - 37Testing sniffers means different things to different people!

Sniffers

Source: U.S. News

Page 38: Network Security Forensics

Solving Network Mysteries Slide - 38

NetworkNetwork

Sniffers are needed to “see” what is on your network

NIDS provide a means for pre-processing Switched environments can provide a challenge Since no two networking environments are the

same, methodologies will need to be tailored for each network

Page 39: Network Security Forensics

Solving Network Mysteries Slide - 39

Raw Output Raw Output

Page 40: Network Security Forensics

Solving Network Mysteries Slide - 40

NIDS Output (Dragon)NIDS Output (Dragon)

Page 41: Network Security Forensics

Solving Network Mysteries Slide - 41

AnalysisAnalysis

Collecting gigabytes of data… now what? A system or tools to assist with analysis is

vital Implementing a system with consistent

procedures is a challenge Filter and focus before drowning in data

Page 42: Network Security Forensics

Solving Network Mysteries Slide - 42

Audit & Monitoring Tool TrendsAudit & Monitoring Tool Trends

• Evidence preservation• Data warehousing• Data mining• Automatic correlation• Event interpretation• Passive monitoring• Data exchange• AI based attack prediction

Page 43: Network Security Forensics

Solving Network Mysteries Slide - 43

Audit & Monitoring Tool TrendsAudit & Monitoring Tool Trends

• Outsourced Managed Security• Counterpane – www.counterpane.com• SecurityTracker – www.securitytracker.net• ServerVault – www.servervault.com

• Network Appliances• NetFox – www.securityfox.net

• Interactive Analysis• SilentRunner – www.silentrunner.com

• Log Consolidators• Kane – www.intrusion.com• eSecurity – www.esecurityinc.com

Page 44: Network Security Forensics

Solving Network Mysteries Slide - 44

TipsTips

Do’s One step at a time Automation is your

friend Storage Data sensitivity Measure

Don’ts Underestimate Forget legal

responsibilities Be unprepared Believe in silver

bullets

Page 45: Network Security Forensics

Solving Network Mysteries Slide - 45

In Closing…In Closing…

• Potential Benefits:• Increased knowledge and awareness of

network usage practices• Enhance current detection and

protection process• Reduced time and resource cost when

responding to an incident• Reduced network misuse and abuse• Enforcement of policy

Page 46: Network Security Forensics

Solving Network Mysteries Slide - 46

QuestionsQuestions