SlideShare ist ein Scribd-Unternehmen logo
1 von 70
Downloaden Sie, um offline zu lesen
Peeling Your Network Layers With




    { _id: “Mark Hillick”, “company”:
    “Kybeire” }


Friday 23 November 12
> db.whoam.findOne()

          {
          "contact": {
                "email": "mark@kybeire.com",
                "web": "www.hackeire.net",
                "twitter": "markofu"
             },
            "work" : { "10gen" : "MongoDB" },
            "cert" : { "GIAC GSE" : true },
            "state" : { "Nervous" : true, "Relaxed" : false },
            "tags" : [ { "securityonion" : 1}, {"tcp" : 1} , {"ids" : 1},
          {"packet analysis" : 1}, {"defensive fun" : 1}, {"nsm" : 1} ],
             "try-to-help" : [ { "IrissCert" : "not very well"} , {"Security
          Onion" : "not well enough"} ]
          }
Friday 23 November 12
SO @ IrissCon



           Last Presentation - need
          humour!!!




          Or at least an attempt at it :)



Friday 23 November 12
Four Things

         This talk is NOT an IDS talk!



         This talk will be fairly
         technical :)



         And fast :)



         If you don’t like Lego or Star
         Wars, you might want to leave
Friday 23 November 12
Creator



          Doug Burks - the guy is
          incredible, he does not sleep :)



          Grew out of SANS Gold Paper



          Wanted to help make Sguil &
          NSM “easier” to deploy!


Friday 23 November 12
So, what is it?


                Security Onion is a Linux distro for IDS (Intrusion Detection) & NSM
                (Network Security Monitoring).

                New version => all Ubuntu-type 12.04 distros [LTS], 32 & 64 bit

                Old version => Xubuntu 10.04 [LTS], 32 bit only

                Contains many security tools.

                The easy-to-use Setup wizard allows you to build an army of distributed
                sensors for your enterprise in minutes!

                Open-Source : so it’s all there!!!!




Friday 23 November 12
Traditionally

         DEFENCE-IN-DEPTH

         Layers, layers & more layers:

               Firewalls; IDS/IPS; WAF

               Restrict inbound, allow all
               outbound

               Different FW tech

               ACLs on Routers

         But what is going on?

Friday 23 November 12
IDS Alert, what now?



          alert ip $EXTERNAL_NET
          $SHELLCODE_PORTS -> $HOME_NET any
          (msg:"GPL SHELLCODE x86 inc ebx NOOP";
          content:"CCCCCCCCCCCCCCCCCCCCCCCC";
          fast_pattern:only; classtype:shellcode-detect; sid:
          2101390; rev:7;)




Friday 23 November 12
NSM, Old-Style :(


          WTF???????



          Ah man, this sucks!



          grep this, awk that, sed this,
          pipe to cvs, scp & open excel :(

                Then make pretty for
                mgmt :)

Friday 23 November 12
State of IDS




              Source: http://img2.moonbuggy.org/imgstore/doorstop.jpg




Friday 23 November 12
State of IDS




              Source: http://img2.moonbuggy.org/imgstore/doorstop.jpg




Friday 23 November 12
NSM


          NSM != IDS

          Clarity!!!

          “the collection, analysis, and
          escalation of indications and
          warnings (I&W) to detect and
          respond to intrusions”

           Richard Bejtlich, TaoSecurity Blog
           http://taosecurity.blogspot.com/2007/04/networksecurity-
           monitoring-history.html



Friday 23 November 12
NSM, ONION-STYLE :)




Friday 23 November 12
NSM, ONION-STYLE :)




Friday 23 November 12
NSM, ONION-STYLE :)




Friday 23 November 12
NSM, ONION-STYLE :)




Friday 23 November 12
CHILDS-PLAY




Friday 23 November 12
CHILDS-PLAY




Friday 23 November 12
CHILDS-PLAY




Friday 23 November 12
CHILDS-PLAY




Friday 23 November 12
CHILDS-PLAY




Friday 23 November 12
CHILDS-PLAY




Friday 23 November 12
CHILDS-PLAY




Friday 23 November 12
Architecture



                Server, Sensors or Both




                Ultimate Analyst Workstation




Friday 23 November 12
Deploy, Build & Use


          Aggregate or Tap

          Use Cases:

                Production - traditional DCs
                on VM

                Cloud Infrastructure

                Personally: HackEire & @
                home ETC

          Admin - aptitude & upstart :)
Friday 23 November 12
Haz Tools 1




                 IDS: Snort or Suricata - your choice :)

Friday 23 November 12
Haz Tools 2


                             Bro: powerful
                             network analysis
                             framework with
                             amazingly detailed
                             logs




                              OSSEC monitors local
                              logs, file integrity &
                              rootkits

                              Can receive logs from
                              OSSEC Agents and
                              standard Syslog

Friday 23 November 12
Haz Tools 3




                 Complete List: http://code.google.com/p/security-onion/wiki/Tools
Friday 23 November 12
Directory Structure

                Data : /nsm

                        backup, bro, server data &sensor data

                          By sensor name “$hostname-$interface”

                Config : /etc/nsm

                        ossec, pulledpork, securityonion

                        $hostname-$interface

                          pads, snort, suricata, barnyard etc

                Logs: /var/log/nsm
Friday 23 November 12
NSM


                sudo service nsm
                restart

                        bro

                        ossec

                        sguil

                sudo service nsm-
                server restart

                sudo service nsm-
                sensor restart



Friday 23 November 12
Pivot To Wireshark




Friday 23 November 12
Pivot To Wireshark




Friday 23 November 12
Pivot To Wireshark




Friday 23 November 12
Pivot To Wireshark




Friday 23 November 12
Pivot To Wireshark




Friday 23 November 12
Attack : Client-Side




Friday 23 November 12
Attack : Client-Side




           Innocence


Friday 23 November 12
Attack : Client-Side




                                          Oops, now
           Innocence
                                          inside!

Friday 23 November 12
Sit Back, Relax & Enjoy



          Upcoming Demo of Client-side attack



          User clicks on link



          Channel is created back to attacker




Friday 23 November 12
CS Attack: Sguil




Friday 23 November 12
CS Attack: Sguil




Friday 23 November 12
CS Attack: Sguil




Friday 23 November 12
CS Attack: Sguil




Friday 23 November 12
CS Attack: Snorby




Friday 23 November 12
CS Attack: Snorby




Friday 23 November 12
CS Attack: Snorby




Friday 23 November 12
CS Attack: Snorby




Friday 23 November 12
CS Attack: Snorby




Friday 23 November 12
CS Attack: Bro 1


                bash/bro scripting

                framework & built-in scripts

                /nsm/bro/logs/current

                        http.log

                        conn.log




Friday 23 November 12
CS Attack: Bro 2


                    DETAIL, DETAIL, DETAIL......




Friday 23 November 12
CS Attack: Bro 2


                    DETAIL, DETAIL, DETAIL......




Friday 23 November 12
CS Attack: Bro 2


                    DETAIL, DETAIL, DETAIL......




Friday 23 November 12
CS Attack: Elsa




Friday 23 November 12
CS Attack: Elsa




Friday 23 November 12
CS Attack: Elsa




Friday 23 November 12
CS Attack: Elsa




Friday 23 November 12
CS Attack: Elsa




Friday 23 November 12
CS Attack: Network
                   Miner




Friday 23 November 12
CS Attack: Network
                   Miner




          $ ls -lart | grep 4444

     -rw-rw-r-- 1 nsmadmin nsmadmin 1291079 Nov 4 21:22
     10.20.0.111:4444_10.20.0.165:1804-6.raw




Friday 23 November 12
CS Attack: Network
                   Miner




          $ ls -lart | grep 4444

     -rw-rw-r-- 1 nsmadmin nsmadmin 1291079 Nov 4 21:22
     10.20.0.111:4444_10.20.0.165:1804-6.raw




Friday 23 November 12
Ah, yeah, now.......




Friday 23 November 12
Ah, yeah, now.......



          How many clicks does it take you to get from an alert to
          the packet????



          Can you pivot?



          Could you take a Windows Administrator off the
          street???


Friday 23 November 12
Don’t Forget




Friday 23 November 12
All Wrapped Up


          Thanks to Doug & the team

                No more

                        compiling

                        messing with installations

                        sorting out pre-requisites

                Significantly reduced testing

                Point & Click

Friday 23 November 12
Conclusion

               Easy Peasy

               Powerful - haz tools

               Nice pictures, GUIs &
               graphs for
               management ;-)

               Open-Source is possible
               & SO viable

               Commodity H/W

               Support - mixture!

Friday 23 November 12
Want to join?

           Security Onion needs:

                Documentation & Artwork

                Web Interface

                Package Maintainers

                Performance Benchmarks

                Me -> “GetOpts -> sosetup &
                Chef”


              http://code.google.com/p/security-onion/wiki/TeamMembers

Friday 23 November 12
Further Reading!!!

               Project Home: https://code.google.com/p/
               security-onion/


               Blog: http://securityonion.blogspot.com


               GG: https://groups.google.com/forum/?
               fromgroups#!forum/security-onion


               Wiki: http://code.google.com/p/security-
               onion/w/list


               Mailing Lists: http://code.google.com/p/
               security-onion/wiki/MailingLists


               IRC: #securityonion on irc.freenode.net


               The Future: https://code.google.com/p/
               security-onion/wiki/Roadmap


Friday 23 November 12
Contact Me




            mark@kybeire.com

            @markofu




            BTW, Star Wars Fan :)




Friday 23 November 12
Pics Links



                Onion: https://secure.flickr.com/
                photos/7157427@N03/3248129452/

                Star Wars Lego: http://imgur.com/a/
                0XvKw (Huge thanks to Mike
                Stimpson ->
                www.mikestimpson.com:) )

                        Book -> “Stormtroopers, we love
                        you”




Friday 23 November 12
Thank You!!!




Friday 23 November 12

Weitere ähnliche Inhalte

Ähnlich wie Peeling back your Network Layers with Security Onion

Sebastian Burkhart — Berlin.apps.js Nov 2012 Talk
Sebastian Burkhart — Berlin.apps.js Nov 2012 TalkSebastian Burkhart — Berlin.apps.js Nov 2012 Talk
Sebastian Burkhart — Berlin.apps.js Nov 2012 TalkSebastian Burkhart
 
Ruxcon Finding Needles in Haystacks (the size of countries)
Ruxcon Finding Needles in Haystacks (the size of countries)Ruxcon Finding Needles in Haystacks (the size of countries)
Ruxcon Finding Needles in Haystacks (the size of countries)packetloop
 
Apache Cassandra - A gentle introduction
Apache Cassandra - A gentle introductionApache Cassandra - A gentle introduction
Apache Cassandra - A gentle introductionPrzemek Maciolek
 
Municipal Government Meets NoSQL
Municipal Government Meets NoSQLMunicipal Government Meets NoSQL
Municipal Government Meets NoSQLMongoDB
 
A Morning with MongoDB Barcelona: MongoDB Basic Concepts
A Morning with MongoDB Barcelona: MongoDB Basic ConceptsA Morning with MongoDB Barcelona: MongoDB Basic Concepts
A Morning with MongoDB Barcelona: MongoDB Basic ConceptsMongoDB
 
Building Sencha Themes
Building Sencha ThemesBuilding Sencha Themes
Building Sencha ThemesSencha
 
MongoDB Fundamentals
MongoDB FundamentalsMongoDB Fundamentals
MongoDB FundamentalsMongoDB
 
Secrets of a linux ninja Software Freedom Day 2013 Johannesburg, South Africa
Secrets of a linux ninja  Software Freedom Day 2013 Johannesburg, South AfricaSecrets of a linux ninja  Software Freedom Day 2013 Johannesburg, South Africa
Secrets of a linux ninja Software Freedom Day 2013 Johannesburg, South AfricaJumping Bean
 
Hacking Lab con ProxMox e Metasploitable
Hacking Lab con ProxMox e MetasploitableHacking Lab con ProxMox e Metasploitable
Hacking Lab con ProxMox e MetasploitableAndrea Draghetti
 
Provisionamento Orquestrado nas Nuvens com Juju
Provisionamento Orquestrado nas Nuvens com JujuProvisionamento Orquestrado nas Nuvens com Juju
Provisionamento Orquestrado nas Nuvens com JujuiMasters
 
Provisionamento orquestrado nas nuvens com Juju
Provisionamento orquestrado nas nuvens com JujuProvisionamento orquestrado nas nuvens com Juju
Provisionamento orquestrado nas nuvens com JujuThiago Rondon
 
Continuous Delivery for the Web Platform
Continuous Delivery for the Web PlatformContinuous Delivery for the Web Platform
Continuous Delivery for the Web PlatformJarrod Overson
 

Ähnlich wie Peeling back your Network Layers with Security Onion (16)

Sebastian Burkhart — Berlin.apps.js Nov 2012 Talk
Sebastian Burkhart — Berlin.apps.js Nov 2012 TalkSebastian Burkhart — Berlin.apps.js Nov 2012 Talk
Sebastian Burkhart — Berlin.apps.js Nov 2012 Talk
 
Ruxcon Finding Needles in Haystacks (the size of countries)
Ruxcon Finding Needles in Haystacks (the size of countries)Ruxcon Finding Needles in Haystacks (the size of countries)
Ruxcon Finding Needles in Haystacks (the size of countries)
 
Apache Cassandra - A gentle introduction
Apache Cassandra - A gentle introductionApache Cassandra - A gentle introduction
Apache Cassandra - A gentle introduction
 
Xtreme Deployment
Xtreme DeploymentXtreme Deployment
Xtreme Deployment
 
Municipal Government Meets NoSQL
Municipal Government Meets NoSQLMunicipal Government Meets NoSQL
Municipal Government Meets NoSQL
 
A Morning with MongoDB Barcelona: MongoDB Basic Concepts
A Morning with MongoDB Barcelona: MongoDB Basic ConceptsA Morning with MongoDB Barcelona: MongoDB Basic Concepts
A Morning with MongoDB Barcelona: MongoDB Basic Concepts
 
Building Sencha Themes
Building Sencha ThemesBuilding Sencha Themes
Building Sencha Themes
 
MySQL Sandbox 3
MySQL Sandbox 3MySQL Sandbox 3
MySQL Sandbox 3
 
MongoDB Fundamentals
MongoDB FundamentalsMongoDB Fundamentals
MongoDB Fundamentals
 
Secrets of a linux ninja Software Freedom Day 2013 Johannesburg, South Africa
Secrets of a linux ninja  Software Freedom Day 2013 Johannesburg, South AfricaSecrets of a linux ninja  Software Freedom Day 2013 Johannesburg, South Africa
Secrets of a linux ninja Software Freedom Day 2013 Johannesburg, South Africa
 
Hacking Lab con ProxMox e Metasploitable
Hacking Lab con ProxMox e MetasploitableHacking Lab con ProxMox e Metasploitable
Hacking Lab con ProxMox e Metasploitable
 
Provisionamento Orquestrado nas Nuvens com Juju
Provisionamento Orquestrado nas Nuvens com JujuProvisionamento Orquestrado nas Nuvens com Juju
Provisionamento Orquestrado nas Nuvens com Juju
 
Provisionamento orquestrado nas nuvens com Juju
Provisionamento orquestrado nas nuvens com JujuProvisionamento orquestrado nas nuvens com Juju
Provisionamento orquestrado nas nuvens com Juju
 
Vim Notes
Vim NotesVim Notes
Vim Notes
 
Continuous Delivery for the Web Platform
Continuous Delivery for the Web PlatformContinuous Delivery for the Web Platform
Continuous Delivery for the Web Platform
 
Camilo Gómez
Camilo GómezCamilo Gómez
Camilo Gómez
 

Mehr von Mark Hillick

Introduction to MongoDB
Introduction to MongoDBIntroduction to MongoDB
Introduction to MongoDBMark Hillick
 
PHP Loves MongoDB - Dublin MUG (by Hannes)
PHP Loves MongoDB - Dublin MUG (by Hannes)PHP Loves MongoDB - Dublin MUG (by Hannes)
PHP Loves MongoDB - Dublin MUG (by Hannes)Mark Hillick
 
Integrated Cache on Netscaler
Integrated Cache on NetscalerIntegrated Cache on Netscaler
Integrated Cache on NetscalerMark Hillick
 
Scareware - Irisscon 2009
Scareware - Irisscon 2009Scareware - Irisscon 2009
Scareware - Irisscon 2009Mark Hillick
 
Implementing a WAF
Implementing a WAFImplementing a WAF
Implementing a WAFMark Hillick
 
CTF: Bringing back more than sexy!
CTF: Bringing back more than sexy!CTF: Bringing back more than sexy!
CTF: Bringing back more than sexy!Mark Hillick
 
MongoDB - Who, What & Where!
MongoDB - Who, What & Where!MongoDB - Who, What & Where!
MongoDB - Who, What & Where!Mark Hillick
 

Mehr von Mark Hillick (8)

Introduction to MongoDB
Introduction to MongoDBIntroduction to MongoDB
Introduction to MongoDB
 
PHP Loves MongoDB - Dublin MUG (by Hannes)
PHP Loves MongoDB - Dublin MUG (by Hannes)PHP Loves MongoDB - Dublin MUG (by Hannes)
PHP Loves MongoDB - Dublin MUG (by Hannes)
 
HackEire 2009
HackEire 2009HackEire 2009
HackEire 2009
 
Integrated Cache on Netscaler
Integrated Cache on NetscalerIntegrated Cache on Netscaler
Integrated Cache on Netscaler
 
Scareware - Irisscon 2009
Scareware - Irisscon 2009Scareware - Irisscon 2009
Scareware - Irisscon 2009
 
Implementing a WAF
Implementing a WAFImplementing a WAF
Implementing a WAF
 
CTF: Bringing back more than sexy!
CTF: Bringing back more than sexy!CTF: Bringing back more than sexy!
CTF: Bringing back more than sexy!
 
MongoDB - Who, What & Where!
MongoDB - Who, What & Where!MongoDB - Who, What & Where!
MongoDB - Who, What & Where!
 

Kürzlich hochgeladen

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Peeling back your Network Layers with Security Onion

  • 1. Peeling Your Network Layers With { _id: “Mark Hillick”, “company”: “Kybeire” } Friday 23 November 12
  • 2. > db.whoam.findOne() { "contact": { "email": "mark@kybeire.com", "web": "www.hackeire.net", "twitter": "markofu" }, "work" : { "10gen" : "MongoDB" }, "cert" : { "GIAC GSE" : true }, "state" : { "Nervous" : true, "Relaxed" : false }, "tags" : [ { "securityonion" : 1}, {"tcp" : 1} , {"ids" : 1}, {"packet analysis" : 1}, {"defensive fun" : 1}, {"nsm" : 1} ], "try-to-help" : [ { "IrissCert" : "not very well"} , {"Security Onion" : "not well enough"} ] } Friday 23 November 12
  • 3. SO @ IrissCon Last Presentation - need humour!!! Or at least an attempt at it :) Friday 23 November 12
  • 4. Four Things This talk is NOT an IDS talk! This talk will be fairly technical :) And fast :) If you don’t like Lego or Star Wars, you might want to leave Friday 23 November 12
  • 5. Creator Doug Burks - the guy is incredible, he does not sleep :) Grew out of SANS Gold Paper Wanted to help make Sguil & NSM “easier” to deploy! Friday 23 November 12
  • 6. So, what is it? Security Onion is a Linux distro for IDS (Intrusion Detection) & NSM (Network Security Monitoring). New version => all Ubuntu-type 12.04 distros [LTS], 32 & 64 bit Old version => Xubuntu 10.04 [LTS], 32 bit only Contains many security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes! Open-Source : so it’s all there!!!! Friday 23 November 12
  • 7. Traditionally DEFENCE-IN-DEPTH Layers, layers & more layers: Firewalls; IDS/IPS; WAF Restrict inbound, allow all outbound Different FW tech ACLs on Routers But what is going on? Friday 23 November 12
  • 8. IDS Alert, what now? alert ip $EXTERNAL_NET $SHELLCODE_PORTS -> $HOME_NET any (msg:"GPL SHELLCODE x86 inc ebx NOOP"; content:"CCCCCCCCCCCCCCCCCCCCCCCC"; fast_pattern:only; classtype:shellcode-detect; sid: 2101390; rev:7;) Friday 23 November 12
  • 9. NSM, Old-Style :( WTF??????? Ah man, this sucks! grep this, awk that, sed this, pipe to cvs, scp & open excel :( Then make pretty for mgmt :) Friday 23 November 12
  • 10. State of IDS Source: http://img2.moonbuggy.org/imgstore/doorstop.jpg Friday 23 November 12
  • 11. State of IDS Source: http://img2.moonbuggy.org/imgstore/doorstop.jpg Friday 23 November 12
  • 12. NSM NSM != IDS Clarity!!! “the collection, analysis, and escalation of indications and warnings (I&W) to detect and respond to intrusions” Richard Bejtlich, TaoSecurity Blog http://taosecurity.blogspot.com/2007/04/networksecurity- monitoring-history.html Friday 23 November 12
  • 13. NSM, ONION-STYLE :) Friday 23 November 12
  • 14. NSM, ONION-STYLE :) Friday 23 November 12
  • 15. NSM, ONION-STYLE :) Friday 23 November 12
  • 16. NSM, ONION-STYLE :) Friday 23 November 12
  • 24. Architecture Server, Sensors or Both Ultimate Analyst Workstation Friday 23 November 12
  • 25. Deploy, Build & Use Aggregate or Tap Use Cases: Production - traditional DCs on VM Cloud Infrastructure Personally: HackEire & @ home ETC Admin - aptitude & upstart :) Friday 23 November 12
  • 26. Haz Tools 1 IDS: Snort or Suricata - your choice :) Friday 23 November 12
  • 27. Haz Tools 2 Bro: powerful network analysis framework with amazingly detailed logs OSSEC monitors local logs, file integrity & rootkits Can receive logs from OSSEC Agents and standard Syslog Friday 23 November 12
  • 28. Haz Tools 3 Complete List: http://code.google.com/p/security-onion/wiki/Tools Friday 23 November 12
  • 29. Directory Structure Data : /nsm backup, bro, server data &sensor data By sensor name “$hostname-$interface” Config : /etc/nsm ossec, pulledpork, securityonion $hostname-$interface pads, snort, suricata, barnyard etc Logs: /var/log/nsm Friday 23 November 12
  • 30. NSM sudo service nsm restart bro ossec sguil sudo service nsm- server restart sudo service nsm- sensor restart Friday 23 November 12
  • 31. Pivot To Wireshark Friday 23 November 12
  • 32. Pivot To Wireshark Friday 23 November 12
  • 33. Pivot To Wireshark Friday 23 November 12
  • 34. Pivot To Wireshark Friday 23 November 12
  • 35. Pivot To Wireshark Friday 23 November 12
  • 36. Attack : Client-Side Friday 23 November 12
  • 37. Attack : Client-Side Innocence Friday 23 November 12
  • 38. Attack : Client-Side Oops, now Innocence inside! Friday 23 November 12
  • 39. Sit Back, Relax & Enjoy Upcoming Demo of Client-side attack User clicks on link Channel is created back to attacker Friday 23 November 12
  • 40. CS Attack: Sguil Friday 23 November 12
  • 41. CS Attack: Sguil Friday 23 November 12
  • 42. CS Attack: Sguil Friday 23 November 12
  • 43. CS Attack: Sguil Friday 23 November 12
  • 44. CS Attack: Snorby Friday 23 November 12
  • 45. CS Attack: Snorby Friday 23 November 12
  • 46. CS Attack: Snorby Friday 23 November 12
  • 47. CS Attack: Snorby Friday 23 November 12
  • 48. CS Attack: Snorby Friday 23 November 12
  • 49. CS Attack: Bro 1 bash/bro scripting framework & built-in scripts /nsm/bro/logs/current http.log conn.log Friday 23 November 12
  • 50. CS Attack: Bro 2 DETAIL, DETAIL, DETAIL...... Friday 23 November 12
  • 51. CS Attack: Bro 2 DETAIL, DETAIL, DETAIL...... Friday 23 November 12
  • 52. CS Attack: Bro 2 DETAIL, DETAIL, DETAIL...... Friday 23 November 12
  • 53. CS Attack: Elsa Friday 23 November 12
  • 54. CS Attack: Elsa Friday 23 November 12
  • 55. CS Attack: Elsa Friday 23 November 12
  • 56. CS Attack: Elsa Friday 23 November 12
  • 57. CS Attack: Elsa Friday 23 November 12
  • 58. CS Attack: Network Miner Friday 23 November 12
  • 59. CS Attack: Network Miner $ ls -lart | grep 4444 -rw-rw-r-- 1 nsmadmin nsmadmin 1291079 Nov 4 21:22 10.20.0.111:4444_10.20.0.165:1804-6.raw Friday 23 November 12
  • 60. CS Attack: Network Miner $ ls -lart | grep 4444 -rw-rw-r-- 1 nsmadmin nsmadmin 1291079 Nov 4 21:22 10.20.0.111:4444_10.20.0.165:1804-6.raw Friday 23 November 12
  • 61. Ah, yeah, now....... Friday 23 November 12
  • 62. Ah, yeah, now....... How many clicks does it take you to get from an alert to the packet???? Can you pivot? Could you take a Windows Administrator off the street??? Friday 23 November 12
  • 64. All Wrapped Up Thanks to Doug & the team No more compiling messing with installations sorting out pre-requisites Significantly reduced testing Point & Click Friday 23 November 12
  • 65. Conclusion Easy Peasy Powerful - haz tools Nice pictures, GUIs & graphs for management ;-) Open-Source is possible & SO viable Commodity H/W Support - mixture! Friday 23 November 12
  • 66. Want to join? Security Onion needs: Documentation & Artwork Web Interface Package Maintainers Performance Benchmarks Me -> “GetOpts -> sosetup & Chef” http://code.google.com/p/security-onion/wiki/TeamMembers Friday 23 November 12
  • 67. Further Reading!!! Project Home: https://code.google.com/p/ security-onion/ Blog: http://securityonion.blogspot.com GG: https://groups.google.com/forum/? fromgroups#!forum/security-onion Wiki: http://code.google.com/p/security- onion/w/list Mailing Lists: http://code.google.com/p/ security-onion/wiki/MailingLists IRC: #securityonion on irc.freenode.net The Future: https://code.google.com/p/ security-onion/wiki/Roadmap Friday 23 November 12
  • 68. Contact Me mark@kybeire.com @markofu BTW, Star Wars Fan :) Friday 23 November 12
  • 69. Pics Links Onion: https://secure.flickr.com/ photos/7157427@N03/3248129452/ Star Wars Lego: http://imgur.com/a/ 0XvKw (Huge thanks to Mike Stimpson -> www.mikestimpson.com:) ) Book -> “Stormtroopers, we love you” Friday 23 November 12
  • 70. Thank You!!! Friday 23 November 12