+ All Categories
Transcript
Page 1: Hunting Attackers with Network Audit Trails

HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS

Tom [email protected]

1

Page 2: Hunting Attackers with Network Audit Trails

WHAT IS DIGITAL FORENSICS?WHAT IS INCIDENT RESPONSE?

2

Page 3: Hunting Attackers with Network Audit Trails

WHAT IS FORENSICS?

3

Page 4: Hunting Attackers with Network Audit Trails

Visibility through out the Kill Chain

4

Recon

Exploitation (Social Engineering?)

Initial Infection

Internal Pivot

Data Preparation

& Exfiltration

Command and

Control

4© 2013 Lancope, Inc. All rights reserved.

Page 5: Hunting Attackers with Network Audit Trails

Intrusion Audit Trails

1:06:15 PM: Internal Host

Visits Malicious Web Site

1:06:30 PM: Malware Infection

Complete, Accesses Internet Command and

Control

1:06:35 PM:Malware begins

scanning internal network

1:13:59 PM:Multiple internal

infected hosts

1:07:00 PM: Gateway malware analysis identifies the transaction

as malicious

1:14:00 PM: Administrators

manually disconnect the initial infected host

Do you know what went on while you were mitigating?

5© 2013 Lancope, Inc. All rights reserved.

Page 6: Hunting Attackers with Network Audit Trails

Audit Trail Sources

• Firewall logs – Are you logging everything or just denies?

• Internal & Host IPS systems– HIPS potentially has a lot of breadth– Can be expensive to deploy– Signature based

• Log Management Solutions/SIEM– Are you collecting everything?– You can only see what gets logged

• Netflow– Lots of breadth, less depth– Lower disk space requirements

• Full Packet Capture– Deep but not broad– Expensive– High disk space requirements

6

Tradeoffs:• Record everything vs

only bad things• Breadth vs Depth• Time vs Depth• Privacy

6© 2013 Lancope, Inc. All rights reserved.

Page 7: Hunting Attackers with Network Audit Trails

DMZ

VPN

Internal Network

Internet

3GInternet

3G Internet

Tradeoffs

Page 8: Hunting Attackers with Network Audit Trails

Tradeoffs

8

NetFlow

RICHNESS

Disk Space Required

Full Packet Capture

8© 2013 Lancope, Inc. All rights reserved.

Page 9: Hunting Attackers with Network Audit Trails

NETWORK AUDIT LOG DETECTION

9

Page 10: Hunting Attackers with Network Audit Trails

10©2011 Lancope , Inc. All Rights Reserved. Company Confidential (not for distribution)

Realtime Netflow Monitoring

Page 11: Hunting Attackers with Network Audit Trails

Loss of Protected Data

What Can Behavioral NetFlow Analysis Do?

Page 12: Hunting Attackers with Network Audit Trails

Reveal Recon

What Can Behavioral NetFlow Analysis Do?

Page 13: Hunting Attackers with Network Audit Trails

What can you detect with the audit log?

Reveal BotNet Hosts

Layer 3 Layer 4 and URL

Page 14: Hunting Attackers with Network Audit Trails

FORENSIC INVESTIGATIONS USING THE NETWORK AUDIT TRAIL

14

Page 15: Hunting Attackers with Network Audit Trails

APT1

15

Page 16: Hunting Attackers with Network Audit Trails

Best Practice – Running Reports in StealthWatch

• Always run Flow Traffic or Top reports before the Flow Table for flow queries beyond 1 day to summarize the results and the most efficient processing

The Flow Traffic and Top reports are a summary of the flow data and much quicker to process

It’s like going fishing in the ocean, you know there are fish in there but if you use a fishing radar you know where to drop your line and pull the fish (data) back from.

16

Page 17: Hunting Attackers with Network Audit Trails

17

Following IOC

Waterhole campaign targeting your industryhas been publicly disclosed.

A quick search of yournetwork audit trailreveals an internal hostthat accessed the disclosed site.

Page 18: Hunting Attackers with Network Audit Trails

18

Following IOC

Check host details around that time

Suspicious HTTP connections right after contact- good candidate for a drive-by download

Suspicious download followed by a reverse SSH shell. Most SSH bytes sent by “client”

Page 19: Hunting Attackers with Network Audit Trails

19

Following IOC

Attacker recons your network. Investigate any hosts contacted by the compromised host.Additionally- look for any other hosts scanning for 445 and 135.

Page 20: Hunting Attackers with Network Audit Trails

20

Following IOC

Since we have uncovered a new IOC (IP address controlling the reverse SSH shell), weShould check to see if that host has touched the network anywhere else.

Another host showing a reverse shell

Page 21: Hunting Attackers with Network Audit Trails

21

SQL Injection

Large data transfer from your web server to an outside host was detected

Page 22: Hunting Attackers with Network Audit Trails

22

SQL Injection

Where did the data go?

Page 23: Hunting Attackers with Network Audit Trails

23

SQL Injection

Look for suspicious activity targeting the web server and your DMZ

Page 24: Hunting Attackers with Network Audit Trails

• IT cannot address insider threat by itself– People have a tendency to think that IT is solely responsible for all computer security issues.

• Legal: Are policies in place? Are they realistic? Does legal support IT practices? • HR: Who is coming and going? Who has workplace issues? Are there soft solutions?• IT: Is the privacy of end users adequately protected? • What impact on workplace harmony are policies, monitoring, and enforcement having?• Are you applying policies consistently?

Combating Insider Threat is a multidisciplinary challenge

2424© 2013 Lancope, Inc. All rights reserved.

IT

HR Legal

Page 25: Hunting Attackers with Network Audit Trails

25

Following the User

Sometimes investigations start with user intelligence

Page 26: Hunting Attackers with Network Audit Trails

26

Following the User

Page 27: Hunting Attackers with Network Audit Trails

27

Beron’s abnormal disclosure

One of your users has uploaded a large amount of data to the internet.

Data Theft

Page 28: Hunting Attackers with Network Audit Trails

28

What did Beron send? Who received it?

Data Theft

Page 29: Hunting Attackers with Network Audit Trails

29

Where could have Beron gotten the data?

Data Theft

Page 30: Hunting Attackers with Network Audit Trails

30

Data Theft

Page 31: Hunting Attackers with Network Audit Trails

31

Why did Beron do it?

Data Theft

Page 32: Hunting Attackers with Network Audit Trails

The Five W’s

• Who did this?

– Usernames, IP Addresses

• What did they do?

– What behavior did they engage in?

• Where did they go?

– What hosts on my network were accessed?

• When?

– Have we investigated the full intrusion timeline?

• Why? What is their objective?

32

Page 33: Hunting Attackers with Network Audit Trails

Tom CrossDirector of Research, [email protected]

www.lancope.com

@Lancope (company)@netflowninjas (company blog)

https://www.facebook.com/Lancope

http://www.linkedin.com/groups/NetFlow-Ninjas-2261596/about

https://plus.google.com/u/0/103996520487697388791/posts

http://feeds.feedburner.com/NetflowNinjas


Top Related