40
How Visualization Makes IT Possible? Sebastien Tricaud Picviz Labs CTO Honeynet Project

Hacklu2011 tricaud

Embed Size (px)

DESCRIPTION

Slides of my hack.lu talk

Citation preview

Page 1: Hacklu2011 tricaud

How Visualization Makes IT Possible?

Sebastien Tricaud

Picviz Labs CTO

Honeynet Project

Page 2: Hacklu2011 tricaud

About Me

• Founder & CTO of Picviz Labs (www.picviz.com)

• Honeynet Project CTO

• Twitter @tricaud

• 15 years of various IDS implementations

• Contributor of Prelude IDS, OSSEC, Sancp, Linux PAM, …

Page 3: Hacklu2011 tricaud

CURRENT SITUATION

Page 4: Hacklu2011 tricaud

Securing a classical infrastructure

• Anti-virus

• Web Application Firewall (blocking of course non-trivial JS tricks)

• Intrusion Detection (& Prevention) Systems

• Firewall

• Security Information Event Manager (SIEM)

Page 5: Hacklu2011 tricaud

Results from this security

• Known stuff are (maybe) blocked

Page 6: Hacklu2011 tricaud

Conclusion

• Securing this infrastructure has not laid off security teams

• Worse, some media entertainment companies had to hire a CSO

Page 7: Hacklu2011 tricaud

Practical Security of hundred Machines

• Is your NTP really synchronized?

• Logs are sent to a centralized database

Log eater

Page 8: Hacklu2011 tricaud

Log eater

Amazing Database !

Page 9: Hacklu2011 tricaud

Amazing Database !

Page 10: Hacklu2011 tricaud

Amazing Database !

Page 11: Hacklu2011 tricaud

Amazing Database !

EASY FIX:

START YOUR

CERT !

Page 12: Hacklu2011 tricaud

Facebook amazing infrastructure!

2010: > 60 000 web servers About 10% of Internet traffic is for them

Page 13: Hacklu2011 tricaud

Our Current Problem

• (buzzword) APT: Advanced Persistent Threats

• Unknown attacks remain unknown until they are known

• Slow Response Time

• Limited Metrics (is a top 10 enough to handle thousand machine?)

• We have found only one way to handle the signal/noise ratio (signatures)

Page 14: Hacklu2011 tricaud

FIND ATTACKS

Page 15: Hacklu2011 tricaud

(some of the) Tools Used

• Bandwidth trigger

• OSSEC

• Netflow

• Wireshark

• Honeypot

• Grep (ahah)

• …

Page 16: Hacklu2011 tricaud

Google Summer of Code: Wireviz

Page 17: Hacklu2011 tricaud

Google Summer of Code: WireBrowse

Page 18: Hacklu2011 tricaud

Google Summer of Code: WireShnork

Page 19: Hacklu2011 tricaud

Google Summer of Code

• The wireshark improvements was amazing.

• Thank you Jakub Zawadzki & Guillaume Arcas!

• It is one among 12 other great projects (http://honeynet.org/gsoc/slots)

• Thank you Google!

Page 20: Hacklu2011 tricaud

Tools issues

• They hardly interact with each other

• They are often limited

• At least they work well, so they are used

• No one does better

Page 21: Hacklu2011 tricaud

Scenario: we want the .ru TLD from our proxy logs

• Easy:

$ grep "\.ru" squid.log

Page 22: Hacklu2011 tricaud

Scenario: we want the .ru TLD from our proxy logs

[...] "[28/Feb/2011:00:13:02 +0100]" XXXX GET

http://pixel.quantserve.com/pixel;r=1869975797;fpan=0;fpa=P0-

1991180462-1298650127845;ns=1;url=http%3A%2F%2Foptimized-

by.rubiconproject.com%2Fa%2F3346%2F3 [...]

[...] "[28/Feb/2011:00:14:32 +0100]" xgbj352 GET

http://eco.rue89.com/2011/02/25/oui-les-militaires-meritent-

leur-reduction-de-75-a-la-sncf-192164?page=0 HTTP/1.1 500

1120 500 505 TCP_NC_MISS 567 12 1103 10.33.37. […]

• Easy:

$ grep "\.ru" squid.log

Page 23: Hacklu2011 tricaud

Scenario: we want the .ru TLD from our proxy logs

• Solution:

grep –e with regex:

'http(s)?\://[a-zA-Z0-9\-\:\.]+\.(ru)/'

[...] "[28/Aug/2011:02:13:50 +0100]" XXXX GET

http://www.ritb.ru/XXXX [...]

[...] "[28/Aug/2011:02:13:50 +0100]" XXXX GET

http://nx.ritb.ru/XXXX [...]

[...] "[28/Aug/2011:02:13:49 +0100]" XXXX GET

http://tas.mb.ran.ru/XXXX [...]

Page 24: Hacklu2011 tricaud

Scenario: we want the .ru TLD from our proxy logs

• Solution? NO

• It will still mess up

[...] "[28/Feb/2011:02:02:08 +0100]" XXXX GET

http://www.facebook.com/plugins/like.php?href=http:/

/slon.ru/articles/XXXX […]

Page 25: Hacklu2011 tricaud

Scenario: we want the .ru TLD from our proxy logs

Page 26: Hacklu2011 tricaud

Pie Charts

Page 27: Hacklu2011 tricaud

Histograms

Page 28: Hacklu2011 tricaud

Treemaps

Page 29: Hacklu2011 tricaud

SIEM

Page 30: Hacklu2011 tricaud

Log Management

Page 31: Hacklu2011 tricaud

SERIOUS VISUALIZATION

Page 32: Hacklu2011 tricaud

Serious Visualization

• Handling large scale incidents

• Make you close to your data

• As many events as logs may have

• As many dimensions as logs may have

Page 33: Hacklu2011 tricaud

There is only Parallel Coordinates

Page 34: Hacklu2011 tricaud

From a log to a picture

Page 35: Hacklu2011 tricaud

Adding a new input

• Demo time: input SQUID logs

Page 36: Hacklu2011 tricaud

Find attacks on your Apache logs

• Demo time (again!)

Page 37: Hacklu2011 tricaud

Find behaviors

• Demo time

Page 38: Hacklu2011 tricaud

Find OpenVPN tunnels

• Demo time! yeah!

Page 39: Hacklu2011 tricaud

Conclusion

• Usual Visualization is often a failure when it comes to practice

• There is still hard work to do

• Parallel Coordinates enables you large scale analysis

• Finding the unknown goal is reached

• The better you know your logs, the easiest it will be

Page 40: Hacklu2011 tricaud

Questions?