Home-Grown Cyber Security
Total Page:16
File Type:pdf, Size:1020Kb
Home-Grown Cyber Security John B. Folkerts, CISSP https://www.linkedin.com/in/john-b-folkerts About Me … 20 years doing Information Security, Architecture, and Risk Management in large enterprise environments Prior to that, a Communications Officer in the US Air Force Involved in many incident response efforts and technology deployments, including Identity Management, Data Loss Protection, Antivirus, Malware Sandbox technology, Log Management, and Intrusion Detection Classical music fan, developing jazz aficionado Disclaimers My comments reflect my own opinions, and not those of my employers, past, present, or future. The tools and services mentioned in this presentation are freely available on the internet. They may not be suitable for your specific environment. Think carefully about your support requirements before using free or open source software or services. Despite being free, most of the tools mentioned have software licensing that governs their use, distribution, etc.... Please read the licenses and check with an attorney as needed to determine whether they are suitable for your environment. Traditional Approach to Security (Controls-based: Patching, Antivirus, Firewalls, Complex Passwords … ) The Strengths Protective – stop what we know is bad The Weaknesses Zero Day Exploits Constantly changing malware signatures Encryption, Tunneling through and around firewall rules Passwords attacked at the weakest point – the user … or worse the password hash database Enter the Cyber Security Framework … Cyber Security Framework Many/most of the traditional Info Security capabilities are included Threat-centric model which “connects the dots” between security capabilities Greater focus on detection and actionable response Basis for Home-grown Cyber Security Internet Firewall Not Optimal for Finding the Source of the Problem Wireless Router Workstation Printer Laptop Laptop What’s Going On in My Network? “If you really want to protect your network, you have to know your network” Rob Joyce, Chief, Tailored Access Operations National Security Agency Check out: https://www.youtube.com/watch?v=bDJb8WOJYdA Monitoring and detection inside your network is just as important as your network boundary. Modifications for Monitoring Internet Parts List: Extra PC with (2) NIC cards and 16Gb RAM Re-use Wireless Router Wireless Router Firewall Inexpensive 8-port switch with span port capability WiFi Access Point Monitor Span Port Switch w/ Span Port Network Monitor WiFi Access Point Workstation Printer Laptop Laptop “To Know Thyself …” What’s on my Network? Systems: DHCP assignments, IP addresses, MAC addresses “Things” – Xbox, Ecobee, Raspberry Pi What’s running on my Network? User Agents: Common (Chrome, IE) and uncommon (powershell, …) Executables: capture and hash OBSERVED assets, executables, etc… are usually good enough! “… is the Beginning of Intelligence” (apologies to Socrates) Threat Intelligence Types IP, Domain BlackLists MD5, SHA256 Hashes Tactics, tools, shared analysis Sources intel.criticalstack.com otx.alienware.com threatconnect.com us-cert.gov abuse.ch Many more at https://github.com/hslatman/awe Ref: Threat Intel Pyramid of Pain courtesy of David Bianco http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html some-threat-intelligence Basic Protections On The Network: Firewall – enable IP blocking DNS “Firewall” – enable Domain blocking BIND9: http://www.zytrax.com/books/dns/ch7/rpz.html DNSMASQ: https://wiki.archlinux.org/index.php/dnsmasq On The Host: Current Patches Current Antivirus Backup and Recovery Need Visibility!! On The Network: Security Onion – https://securityonion.net/ Bro - https://www.bro.org/ Snort – https://www.snort.org/ Sguil – https://www.sguil.net/ Wireshark – https://www.wireshark.org/ NetworkMiner – http://www.netresec.com/?page=NetworkMiner ELSA – Enterprise Log Search & Archive - https://github.com/mcholste/elsa On The Host: OSSEC – https://ossec.github.io/ Sysmon - https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon Detection Principals Keep History Continuous Monitoring of IOCs Look for Anomalies Match up Host Monitoring and Network Monitoring Host Monitoring Sysmon 6.10 Brought to you by Microsoft Sysinternals – Windows system monitoring Install: sysmon.exe –accepteula -i sysmon-config.xml Update: sysmon.exe -c sysmon-config.xml Remove: sysmon.exe –u Features: Windows Log Process creation, File hashes, network connections, remote threads, registry mods, alternate data streams OSSEC HIDS Monitoring and Alerting of Unix and Windows systems Use OSSEC to forward Sysmon logs to a safe place (like SecurityOnion/ELSA) Resources Swiftonsecurity Config - https://github.com/SwiftOnSecurity/sysmon-config ION Storm Threat Intel Config - https://github.com/ion-storm/sysmon-config Game Show Time! “Does it Belong?” (on my network) Does it Belong? – Long DNS request Snort Alert: MALWARE-OTHER dns request with long host name segment – possible data exfiltration attempt DNS query Request: tnncuaacaakn433maecaaagsaqaaa2lpfo3ve5lzd7ldo33maeaaaac3aaaabug.scjsaaaata aiaaa3n4zozkkr23mbxemjxewjevkw5s5zrcfqsbc5njwaqwstwnx.7tyud5d4yh3zsqcdiz6icp mlqyzfpubuw5ervi3so4q4mdhhxf64ctgre4zxyaa.aaaaaaaaaaa4x3qkm2ettg7a.a.j.e5.sk Response TXT 176 ANX8KgACABQAAAAAAAAA0gQAAAAAAAAAAAAAAAAAAAIAAABXAAAAJaPE4QAAEAAAAA AAAAAAAAAAAACnSdJrgTMO0oGe+2yVIa5YnbWRYq4kTMA6646ejwBHvY4yVgmIg2DMJKMfn AS1GH5nFGbv3/MjUUxO5U0QDFEPbeZdlQoKAA== Data Enrichment with domaintools.com Does it Belong? – TOR Exit Node Snort Alert: ET TOR Known Tor Relay/ Router (Not Exit) Node UDP Traffic group 87 Research using Wireshark Does it Belong? – Malware IOC Data Enrichment with Threat Research Tools Game: “Does it Belong?” ssl001.insnw.net, *.ewatches.com, *.honestqa.com, *.inscname.net, *.insnw.net, *.instart.co, *.instartlabs.com, *.instartlogic.com, *.onekingslane.com, *.pionline.com, *.smartbargains.com, *.stelladotstg.co.uk, *.thewatchery.com, *.uniqlo.com, *.v1host.com,adage.com, *.adage.com,airgundepot.com, *.airgundepot.com,airgundepot.net, *.airgundepot.net,allcdn.net, *.allcdn.net,api.m.reebonz.com, *.api.m.reebonz.com,ashleymadison.com, *.ashleymadison.com,assets.pixlee.com, *.assets.pixlee.com,atlanticmedia.com, *.atlanticmedia.com,auto-insurance-experts.com, *.auto-insurance-experts.com, barenecessities.com, *.barenecessities.com,bareweb.com, *.bareweb.com,bdcstatic.com, *.bdcstatic.com,bedroomworld.co.uk, *.bedroomworld.co.uk,blair.com, *.blair.com,bookit.com, *.bookit.com,bookitimages.com, *.bookitimages.com,bookitspeedtest.com, *.bookitspeedtest.com,boutique24.com, *.boutique24.com,business.com, *.business.com,canpages.ca, *.canpages.ca,cdn-api.arcpublishing.com,cdn.cb.pj.ca,cdn.cb.yp.ca, *.cdn.cb.yp.ca,cdn.circusbysamedelman.com,cdn.mediative.ca,cdn.submissionplatform.com,chess.com, *.chess.com,chesscomfiles.com, *.chesscomfiles.com,ci.pj.ca, *.ci.pj.ca,ci.yp.ca, *.ci.yp.ca,ci1.pj.ca, *.ci1.pj.ca,ci1.yp.ca, *.ci1.yp.ca,ci2.pj.ca, *.ci2.pj.ca,ci2.yp.ca, *.ci2.yp.ca,ci3.pj.ca, *.ci3.pj.ca,ci3.yp.ca, *.ci3.yp.ca,ci4.pj.ca, *.ci4.pj.ca,ci4.yp.ca, *.ci4.yp.ca,ci5.pj.ca, *.ci5.pj.ca,ci5.yp.ca, *.ci5.yp.ca,ci6.pj.ca, *.ci6.pj.ca,ci6.yp.ca, *.ci6.yp.ca,ci7.pj.ca, *.ci7.pj.ca,ci7.yp.ca, *.ci7.yp.ca,ci8.pj.ca, *.ci8.pj.ca,ci8.yp.ca, *.ci8.yp.ca,ci9.pj.ca, *.ci9.pj.ca,ci9.yp.ca, *.ci9.yp.ca,citylab.com, *.citylab.com,classesusa.com, *.classesusa.com,cms.yp.ca, *.cms.yp.ca,columbiaspectator.com, *.columbiaspectator.com,commun.it, *.commun.it,defenseone.com, *.defenseone.com,digital.firstchoice.co.uk,digital.thomson.co.uk,distillery.pixlee.com, *.distillery.pixlee.com,duolingo.com, *.duolingo.com,ehealthinsurance.com, *.ehealthinsurance.com,ever-skincare.com, *.ever-skincare.com,everskin.com, *.everskin.com,evite.com, *.evite.com,evitecdn.com, *.evitecdn.com,fasttrack360.com.au, *.fasttrack360.com.au,findfinancialsavings.com, *.findfinancialsavings.com,fivefourclothing.com, *.fivefourclothing.com,flights.thomsonprjuat.co.uk,frankandoak.com, *.frankandoak.com,g00.ranker.com, *.g00.ranker.com,g00.slickdeals.net, *.g00.slickdeals.net,gbot.me, *.gbot.me,gogobot.com, *.gogobot.com,govexec.com, *.govexec.com,hayneedle.com, *.hayneedle.com,honest.com, *.honest.com,honeywell.jp, *.honeywell.jp,html5.kongalong.com, *.html5.kongalong.com,html5.kongboat.com, *.html5.kongboat.com,html5.kongbus.com, *.html5.kongbus.com,html5.kongcab.com, *.html5.kongcab.com,html5.kongdiddy.com, *.html5.kongdiddy.com,html5.konghaul.com, *.html5.konghaul.com,html5.kongice.com, *.html5.kongice.com,html5.kongluge.com, *.html5.kongluge.com,html5.kongregate.com, *.html5.kongregate.com,html5.kongregatestage.com, *.html5.kongregatestage.com,html5.kongregatetrunk.com, *.html5.kongregatetrunk.com, html5.kongshred.com, *.html5.kongshred.com,html5.kongwater.com, *.html5.kongwater.com,html5.kongyak.com, *.html5.kongyak.com,html5.kongzep.com, *.html5.kongzep.com,iassets.anki.com,ifttt.com, *.ifttt.com,iggcdn.com, *.iggcdn.com,indiegogo.com, *.indiegogo.com,ins.cm.ehealthinsurance.com, *.ins.cm.ehealthinsurance.com,insight.com, *.insight.com,instart.co,instartlabs.com,instartlogic.com,int10.newokl.com,integration.modaoperandi.com, *.integration.modaoperandi.com,internal.instartlogic.com, *.internal.instartlogic.com,jayjays.com.au, *.jayjays.com.au,jdvhotels.com, *.jdvhotels.com,julep.com, *.julep.com,keek.com, *.keek.com,keep-collective.com, *.keep-collective.com,keepcollective.com, *.keepcollective.com,kongalong.com, *.kongalong.com,kongboat.com, *.kongboat.com,kongbus.com, *.kongbus.com,kongcab.com, *.kongcab.com,kongcdn.com,