22
Introduction to Network Security Monitoring with Security Onion

Intro to NSM with Security Onion - AusCERT

  • Upload
    ashdaus

  • View
    4.049

  • Download
    1

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Intro to NSM with Security Onion - AusCERT

Introduction to Network Security Monitoring with Security Onion

Page 2: Intro to NSM with Security Onion - AusCERT

Whoami

Ashley Deuble (call me Ash, we’re friends now right?)

Work for Sophos (Come say hi to me at our stand)

SANS GSE #47 Twitter: Ashd_AU

Page 3: Intro to NSM with Security Onion - AusCERT

A Couple of Things

This may be a little technical in parts There will be a demo!! If the demo doesn’t work I will do

some interpretive dance I really hope the demo works I may have to be fast .. I hope you

can keep up

Page 4: Intro to NSM with Security Onion - AusCERT

What is Security Onion?

Security Onion is a network security monitoring (NSM) system that provides full context and forensic visibility into the traffic it monitors

Designed to make deploying complex open source tools simple via a single package (Snort, Suricata, Sguil, Snorby etc.)

Page 5: Intro to NSM with Security Onion - AusCERT

What else is Security Onion? Contains a truckload of security tools Easy setup wizard … even a Windows

Admin can do this! Has the ability to pivot from one tool to

the next to seamlessly .. one of the most effective collection of network security tools available in a single package

Page 6: Intro to NSM with Security Onion - AusCERT

So who made Security Onion? Created by Doug Burks (cool dude ..

Could be a vampire .. he doesn’t sleep)

Grew out of a SANS Gold Paper He really wanted to make Sguil &

NSM “easier” to deploy (mission accomplished!)

He works for Mandiant

Page 7: Intro to NSM with Security Onion - AusCERT

What is NSM

"Network security monitoring is the collection, analysis, and escalation of indications and warnings to detect and respond to intrusions.“

– Richard Bejtlich

Page 8: Intro to NSM with Security Onion - AusCERT

Previously In Network Security .. Get an alert (firewall, user etc.) Look for the alert in SIEM tool Try to correlate with other events in SIEM Oh yeah .. We haven’t added that server

to the SIEM yet – oopsies I think I can hear my Parents calling me –

I have to go now

Page 9: Intro to NSM with Security Onion - AusCERT

So Why Do We Need NSM?!? We can take an IDS alert

alert ip $EXTERNAL_NET $SHELLCODE_PORTS -> $HOME_NET any (msg:"GPL SHELLCODE x86 inc ebx NOOP"; content:"CCCCCCCCCCCCCCCCCCCCCCCC"; fast_pattern:only; classtype:shellcode-detect; sid:2101390; rev:7;)

And turn it into something useful!

• Full traffic packet captures

• Ascii transcripts of traffic

• Ability to carve files (or malware) for later analysis

Page 10: Intro to NSM with Security Onion - AusCERT

Installation – It’s Quick and EasyRun as a LiveCD Great way to test out Able to do the following installations

Quick Setup Automatically configures most of the applications Uses Snort and Bro to monitor all network interfaces by default Also configures and enables Sguil, Squert and Snorby

Advanced Setup More control over the setup of Security Onion Install either a Sguil server, Sguil sensor, or both Select either Snort or Suricata IDS engine Selecting an IDS ruleset, Emerging Threats, Snort VRT, or both Configure network interfaces monitored by the IDS Engine and Bro

Page 11: Intro to NSM with Security Onion - AusCERT

Automated IDS Rule Updates Pulled Pork keeps all the IDS rules up to date

Updates rules from multiple sources (Sourcefire/Snort VRT, Emerging Threats etc.)

Ability to disable rules with Pulled Pork (prevent certain events from triggering an alert)

Fully automated!

Page 12: Intro to NSM with Security Onion - AusCERT

Can I Write My Own Rules?OF COURSE!

Rules are written using the Snort format

Rules can be added to a local rules configuration file to ensure they are never deleted or overwritten by the automated IDS rules updates

Rules can be set to either alert or drop the traffic

Page 13: Intro to NSM with Security Onion - AusCERT

NSM – The Money Shot

Page 14: Intro to NSM with Security Onion - AusCERT

Oooh Pretty Reports

Page 15: Intro to NSM with Security Onion - AusCERT

Squert Can Really See All That?

Page 16: Intro to NSM with Security Onion - AusCERT

Alaska is Attacking Us! (I kid)

Page 17: Intro to NSM with Security Onion - AusCERT

Mmmm … Donuts

Page 18: Intro to NSM with Security Onion - AusCERT

Demo

Page 19: Intro to NSM with Security Onion - AusCERT

Tools

Over 60 custom toolsSnort – Signature based IDSSguil – Security analyst consoleSquert - View HIDS/NIDS alerts and HTTP logsSnorby - View and annotate IDS alertsELSA - Search logs (IDS, Bro and syslog)Bro - Powerful network analysis framework with highly detailed logsOSSEC - Monitors local logs, file integrity & rootkits

Page 20: Intro to NSM with Security Onion - AusCERT

If you want to find out more come see me at the Sophos stand - #58

I’ll also make this presentation available on the internet for you to share with your colleagues

More Information

Page 21: Intro to NSM with Security Onion - AusCERT

Additional Reading Project Home - http://code.google.com/p/security-onion /

Blog – http://securityonion.blogspot.com

Mailing Lists - http://code.google.com/p/security-onion/wiki/MailingLists

Google Group - https://groups.google.com/forum/?fromgroups#!forum/security-onion

Wiki - http://code.google.com/p/security-onion/w/list

Page 22: Intro to NSM with Security Onion - AusCERT

Any Questions?