Top Banner
Title of Presentation Visualizing IDS Output: Tools and Methodology Russ McRee Microsoft Corporation Session ID: NMS-402 Session ID: NMS 402 Session Classification: Advanced
31

Visualizing IDS Output: Title of Presentation Tools and ...

Apr 20, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Visualizing IDS Output: Title of Presentation Tools and ...

Title of PresentationVisualizing IDS Output: Tools and Methodology

Russ McReeMicrosoft Corporation

Session ID: NMS-402Session ID: NMS 402Session Classification: Advanced

Page 2: Visualizing IDS Output: Title of Presentation Tools and ...

Bio

• Team Leader for Microsoft Online Services Security Incident ManagementSecurity Incident Management

• Holisticinfosec.org – all files discussed today will be available herebe available here

• Toolsmith, other publications– ISSA Journal

2

Page 3: Visualizing IDS Output: Title of Presentation Tools and ...

Agenda

Stem the tide…

Analysis overview

Tools & DemosTools & Demos

3

Page 4: Visualizing IDS Output: Title of Presentation Tools and ...

Stem the tideStem the tide

4

Page 5: Visualizing IDS Output: Title of Presentation Tools and ...

Stem the tide…

• Parsing logs, oh joy!B SEM SIEM t i ht?• Buy SEM, SIEM…money grows on trees right?

• How do you watch your network?C i i ?– Coming or going?

– If one assumes compromise by default, which matters more…ingress or egress?

5

Page 6: Visualizing IDS Output: Title of Presentation Tools and ...

Stem the tide…

• We can’t even begin to pay attention to noise bouncing off the front doorbouncing off the front door

• What matters is what’s leaving your network bound for the Axis of Evilbound for the Axis of Evil

• Whitelist anyone?– What should be leaving versus what is leaving your network?g g y– What if you had a baseline of expected norms from your

network, and everything else was considered suspicious?

• Visualizing egress traffic helps optimizeVisualizing egress traffic helps optimize baselines & conduct thorough investigations

6

Page 7: Visualizing IDS Output: Title of Presentation Tools and ...

Analysis overviewAnalysis overview

7

Page 8: Visualizing IDS Output: Title of Presentation Tools and ...

Analysis overview

• Captures and real time monitoring are great, but if you manage large networks you need helpif you manage large networks you need help

• Snort analysis of static PCAPs has always been useful, but visualization can enhance greatlyuseful, but visualization can enhance greatly

• We’ll look at a set of PCAPs, how they look to Snort versus how they look to visualization toolsy

8

Page 9: Visualizing IDS Output: Title of Presentation Tools and ...

Recommened books

• Raffael Marty • Greg Conti

• Applied Security Visualization • Security Data Visualization: Graphical Techniques for Network Analysis

9

Page 10: Visualizing IDS Output: Title of Presentation Tools and ...

Tools & DemosTools & Demos

10

Page 11: Visualizing IDS Output: Title of Presentation Tools and ...

Tools - DAVIX

• Data Analysis & Visualization Linux (DAVIX) The DAVIX Live CD: for data analysis & visualization providing– The DAVIX Live CD: for data analysis & visualization providing free tools for data processing and visualization

– Slackware-based distribution that includes:• well known SecViz toolse o Sec oo s• a comprehensive manual• extensive bookmark collection for online resources on visualization tools,

libraries and applications

11

Page 12: Visualizing IDS Output: Title of Presentation Tools and ...

Tools – Snort & Emerging Threats

• Everyone knows what Snort is, right?• Matt Jonkman’s project drives open source• Matt Jonkman s project drives open source,

community driven rules for use with Snort• Very bleeding edgey g g• Funding by Army Research Office & National

Science Foundation to continue project & research• Detect new threats in your environment and write

new rules for public release to the community • Rulesets are updated as new information surfaces

(many times daily), update at least 2x a week

12

Page 13: Visualizing IDS Output: Title of Presentation Tools and ...

Tools

• AfterGlow– collection of scripts which facilitate the process of generating

hgraphs

• Rumint– network and security visualization tool that can load pcap– network and security visualization tool that can load pcap

datasets and capture live traffic, including VCR/PVR interface

• NetGrok– visualizes in real-time via group-based graph layout & treemap.

Read PCAPs & captures from live interface

• Maltegog– intelligence & forensics app with data mining and intelligence

gathering capabilities. Identifies relationships.

13

Page 14: Visualizing IDS Output: Title of Presentation Tools and ...

DemosDemos

14

Page 15: Visualizing IDS Output: Title of Presentation Tools and ...

AfterGlow

“I am often faced with the problem of looking at a complex dataset and understanding the relationships of various. g pInstead of reading through the file, line by line, I like to look at graphs that visualize the data. One powerful type of graphs useful to visualize relationships among entities, are g p p g ,so-called linked graphs or network graphs.” – RaffaelMarty

15

Page 16: Visualizing IDS Output: Title of Presentation Tools and ...

Demo: AfterGlow & IRC.Flood

IRC.Flood – classic IRC bot, noisy and obvious, a Trojan that connects to tcp 5553Trojan that connects to tcp 5553

Outbound (egress)

16

Page 17: Visualizing IDS Output: Title of Presentation Tools and ...

Demo: AfterGlow & IRC.Flood

LIVE DEMO (AfterGlow)

17

Page 18: Visualizing IDS Output: Title of Presentation Tools and ...

Demo Summary: AfterGlow & IRC.Flood

• Source file: camda.pcap

sudo snort –c /etc/snort/snort.conf –r d l t t/ dcamda.pcap –l output/camda

SnortAfterGlow

18

Page 19: Visualizing IDS Output: Title of Presentation Tools and ...

Rumint

“I caution you not to fall into the trap of just creating pictures Instead seek to addresscreating pictures. Instead, seek to address problems only where it makes sense.” - Greg Conti

19

Page 20: Visualizing IDS Output: Title of Presentation Tools and ...

Korgo & Rumint

Korgo (aka Padobot) is a network worm written by the Russian Hangup Team virus group It spreadsthe Russian Hangup Team virus group. It spreads using a vulnerability in Windows LSASS

20

Page 21: Visualizing IDS Output: Title of Presentation Tools and ...

Summary: Korgo & Rumint

• Source file: korgo.pcap

Snort

File Open korgo.pcap

sudo snort –c /etc/snort/snort.conf –r korgo.pcap –l output/korgo

Snort

RumintRumint

21

Page 22: Visualizing IDS Output: Title of Presentation Tools and ...

NetGrok

“A picture is worth a thousand words. An interface is worth a thousand pictures.” - Ben Shneidermanp“Leonardo Da Vinci combined art and science and aesthetics and engineering, that kind of unity is needed once again ” Ben Shneidermanonce again. - Ben Shneiderman

22

Page 23: Visualizing IDS Output: Title of Presentation Tools and ...

Demo: Kraken & NetGrok

Kraken – big 2008 botnet, also known as Bobax or Hacktool Targeted Fortune 500 evades AVHacktool. Targeted Fortune 500, evades AV

O tb d ( g )Outbound (egress)

23

Page 24: Visualizing IDS Output: Title of Presentation Tools and ...

Demo: Kraken & NetGrok

LIVE DEMO (NetGrok)

24

Page 25: Visualizing IDS Output: Title of Presentation Tools and ...

Demo Summary: Kraken & NetGrok

• Source file: kraken.pcap

SnortFile Open kraken.pcap

sudo snort –c /etc/snort/snort.conf –r kraken.pcap –l output/kraken

Snort

NetGrokNetGrok

25

Page 26: Visualizing IDS Output: Title of Presentation Tools and ...

Maltego

“Maltego can be used for the information gathering phase of all security related work aiding you in your thinking y g y y gprocess by visually demonstrating interconnected links between searched items with more powerful search, giving you smarter results and access to "hidden" information” -yPaterva

26

Page 27: Visualizing IDS Output: Title of Presentation Tools and ...

Demo: Zeus & Maltego

Zeus Trojan (the original APT): malware that organized criminals use to steal information from countless businesses and government organizations use the stolen credentials toand government organizations…use the stolen credentials to siphon victim organization’s bank accounts, funnel the money through accomplices, who then wire the cash overseas to Ukraine and other Eastern European nationsUkraine and other Eastern European nations.

27

Page 28: Visualizing IDS Output: Title of Presentation Tools and ...

Demo: Zeus & Maltego

LIVE DEMO (Maltego)

28

Page 29: Visualizing IDS Output: Title of Presentation Tools and ...

Demo Summary: Zeus & Maltego

• Source file: zeus.pcap

Snorttcpdump -vttttnnelr zeus.pcap | /usr/local/bin/tcpdump2csv.pl "sip dip dport" > zeus.csv

sudo snort –c /etc/snort/snort.conf –r zeus.pcap –l output/zeus2020 Maltego

1) getSourceClients from zeus.csv via local Phrase transformlocal Phrase transform2) getDestinationClients from all IP addresses acquired from first step

29

Page 30: Visualizing IDS Output: Title of Presentation Tools and ...

In closing

• Jump in. Play with these tools and others not discusseddiscussed

• DAVIX is a great way to get started without having to build a dedicated systemhaving to build a dedicated system

• Read the books!• I’ll share all my PCAPs transforms and• I ll share all my PCAPs, transforms, and

visualizations with anyone who would like them• russ@holisticinfosec [email protected]

30

Page 31: Visualizing IDS Output: Title of Presentation Tools and ...

Q & AQ & A

“© 2010 Microsoft Corporation. All rights reserved. Microsoft, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market 

31

conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.”