Accelerating Incident Response With Network Forensics Techniques NJ InfraGard November 2007 Nick...
-
date post
18-Dec-2015 -
Category
Documents
-
view
220 -
download
0
Transcript of Accelerating Incident Response With Network Forensics Techniques NJ InfraGard November 2007 Nick...
Accelerating Incident Response With Network Forensics Techniques
NJ InfraGard November 2007
Nick Lantuh
President
NetWitness Corporation
Copyright 2007 NetWitness Corporation Copyright 2007 NetWitness Corporation
2
Today’s Threat Landscape -- Commercial
VISA, MasterCard USA (with cvv2 code)
количествоидентификац
ияцена в $USD
5-50есть в продаже
5.0
51-100есть в продаже
4.5
101-500есть в продаже
4.0
501-1000есть в продаже
3.0
1001-5000есть в продаже
2.0
более 10000есть в продаже
пишите
Если Вам нужно более 10000 карт, свяжитесь с нами, для Вас будет отдельная скидка
Call for bulk pricing info!
Copyright 2007 NetWitness Corporation
TJX Hack Basics
• Use of WEP protocol led to the ability of hackers to target at least one of their sites and gain network access– WEP has had known problems for years– Should have been using WPA or VPN in accordance with
standard practices
• Hackers exploited vulnerabilities to place malicious code on TJX servers and used this platform to achieve desired goals
Copyright 2007 NetWitness Corporation
Today’s Threat Landscape - USG
Copyright 2007 NetWitness Corporation
China Hack Basics
• Spear phishing attack as entry point due to good network layer perimeter security
• End user weaknesses permitted initial entry points
• Various techniques used:– non-HTTP over port 80– non-DNS over Port 53– non-SSL over 443
Copyright 2007 NetWitness Corporation
Subsequent Hacker Mechanisms Likely Used Following Initial Compromise
• Reconnaissance
• Command and control
• Communications
• Data exfiltration
• Clean-up
Copyright 2007 NetWitness Corporation
Insider Threats Are Compelling Too
• Enterprises also face important internal issues:– Protection of PII, PHI, R&D, classified data– Personnel/HR and Legal problems and concerns– Regulatory and policy compliance– Counterintelligence / counter-competitive– Achieving management control objectives
• Internal actors can include:– Disgruntled employees– Employees misusing I/T assets– Criminals– Espionage– Compromised technology assets (e.g., bots)
Copyright 2007 NetWitness Corporation Copyright 2007 NetWitness Corporation
8
Current State of the Incident Response
• Typical security investments focus on detection of a specific problem set, known issues, or known threats– But what about the unknowns like “designer malware”? – And how do you find problems that are not flagged by your
existing technologies and processes?
• Treating “problems” individually is myopic– Network traffic contains a common truth and insights about
a variety of interrelated problems– Network traffic can be recorded once and reused
forensically many times for a variety of mission objectives
• Today’s discussion will focus on using these techniques to enhance the incident response approach
Fully Understanding Network Traffic
Copyright 2007 NetWitness Corporation Copyright 2007 NetWitness Corporation
10
An Effective Approach
NetWitness NextGen provides a “record once / re-use many times” infrastructure
and the application framework to achieve Total Network Knowledge
• Many current technologies are antiquated and constrained by a myopic focus on a singular problem set – current challenges require a new generation of solutions
• Protection of corporate data in motion requires robust and diverse network monitoring to cope with threats from many dimensions
• NextGen provides unique investigative applications – both interactive and automated, which leverage a patented high speed data capture infrastructure, and an extensible application development platform
Copyright 2007 NetWitness Corporation Copyright 2007 NetWitness Corporation 11
Copyright 2007 NetWitness Corporation
Architecture
• Record, decode, and re-sessionize all network traffic
• Extract metadata and model ALL network, application and user layer characteristics for collected traffic
• Roll-up enterprise metadata as appropriate
• Ensure forensic validity, chain of custody
Live Network Capture
Span Port / Tap
Decoder Decoder
Concentrator
Copyright 2007 NetWitness Corporation
NetWitness Investigator (INTERACTIVE)Know Your Network Like NEVER Before
• Layer 7 Analytics– Infinite freeform analysis paths– Content/Context starting points– Specialized metadata paths,
such as PII
• Full Context– Pure data stored as it occurred– Data presented as the user
experienced (Web, Voice, Files, Emails, Chats, etc.)
• Supports massive data-sets• Instantly navigate 100’s of
gigabytes• Scalable to multi-TB data
stores
• Decrease time to resolution• Analysis that once took days,
now takes minutes
Copyright 2007 NetWitness Corporation Copyright 2007 NetWitness Corporation
NetWitness Informer (AUTOMATED) Enterprise Reporting and Alerting
• Informer builds upon the power of Investigator and the NextGen infrastructure
• Automates the review of huge sets of captured data
• Facilitates Total Network Knowledge
• Ships with 100’s of rules and canned reports
• Completely customizable to your environment and needs
Copyright 2007 NetWitness Corporation
Session Analysis Benefits
• Typical methods– Port based identification
example: Port=80 is web traffic
– IP based identificationexample: IP=216.178.38.116 is myspace
• Port agnostic method– If packet contains IRC structure in
the payload then it IS IRC traffic
– Important because so much traffic is designed to run over common ports such as 80, 443, 25, 53, etc.
Copyright 2007 NetWitness Corporation
Technology – Beyond Signatures to Knowledge
• To face today’s threats and issues, technologies must provide KNOWLEDGE to address questions that can be answered from network data:– Why are employees running non standard traffic over ports?– Does the event need to be flipped to an Incident?– What is the magnitude of this incident?– How was an attack or breach conducted?– Who’s contacting our competitors and how?– Why is our top destination a foreign IP address?– How is specific data leaving our organization?– Who is using Skype to transfer files out of our network?
• Packet headers, logs and high level data do not provide enough information to answer these questions
Illustrations
Copyright 2007 NetWitness Corporation
Better Business Bureau Phishing Scam
• Two company execs (President & VP) at NetWitness received emails claiming that complaints were made against them and the company
• Email instructed recipients to open Word attachment for instructions on how to resolve the complaint (“Document_for_Case.doc”)
• Executives identified emails as suspicious and did not open
• Attachment analyzed using virtual system (VMWare) & open source tools (Sysinternals, Ollydbg, Hex Workshop, etc)
Copyright 2007 NetWitness Corporation
Suspicious email
Copyright 2007 NetWitness Corporation
Suspicious attachment gets more suspicious
• An embedded PDF file inside of Word attachment looks even more fishy
• Alarm bells should be going off at this point
Copyright 2007 NetWitness Corporation
Unsophisticated Delivery Mechanism
Copyright 2007 NetWitness Corporation
More bad karma
• Adobe Reader issues an error • Malicious code executed in background• “update443.exe” downloaded from http://64.17.184.98/cs/scripts
Copyright 2007 NetWitness Corporation
Malicious executable “update443.exe” hosted on a church website in Kentucky
(graceofholland.org)
Copyright 2007 NetWitness Corporation
“update443.exe”
• Binary file compressed using Ultimate Packer for Executables / format: WIN32/PE) – A self-extracting binary compressor favored by malware writers
• Evidence of binary compression is a good indicator that it will probably do bad things to your system
• Stepped through uncompressed executable using open source debugger “Ollydbg”
Copyright 2007 NetWitness Corporation
“update443.exe” Analysis
• Malware makes registry changes to ensure persistence after reboot– Adds registry keys for new service “UpdateManager”
Copyright 2007 NetWitness Corporation
“update443.exe” Analysis
• Malicious code injected into IEXPLORE.EXE process; runs as “SYSTEM” vs. user-level
• Malicious DLL “update.dll” hooked into running IEXPLORE.EXE process, and any new instances of IEXPLORE.EXE processes
Copyright 2007 NetWitness Corporation
Beacon Activity
• Beaconing activity is obvious because of short time delay (~7 seconds)
• Much harder to detect beacons with large time delays (i.e. one packet / hour)
• Begins after malware is retrieved, extracted, installed & running
• A “phone home” to report in with machine name & logged in user
• DEMONSTRATION
Copyright 2007 NetWitness Corporation
Bad News DNS
• Lots of bad uses for DNS by state-sponsored hackers and organized crime
• Dynamic DNS– Used for spear-phishing attacks and obfuscation of other
data exfiltration activities
• Use of DNS as a covert channel– Hiding of non-DNS traffic in what appears to be DNS
packets
• DEMONSTRATION
Copyright 2007 NetWitness Corporation
Virus/Worm Outbreak
• Zero-Day Incident– Large enterprise of 40,000 users is experiencing network
degradation. – Anti-virus & IDS were silent. – Traffic flow monitors show increased volume from 100's of
hosts.
• DEMONSTRATION
Final Thoughts and Conclusions
Copyright 2007 NetWitness Corporation
Who Needs This Solution?
• CIO / CSO / CISO– Convergence of network and application layer reporting giving insight
and knowledge into behavior on the network
• Compliance / Risk Officer– Data Leakage– Compliance verification– Non-malicious network waste and abuse is recognized immediately for
comparison to company business rules and policies
• Investigator / General Counsel– Insider Threat– eDiscovery– Intensive/Deep Analysis– Reconstruction of malicious attacks, such as SQL injection, IRC bots,
and windows vulnerability exploitation, are identified through quick and accurate analysis
• Security & Network Operations– Orders of magnitude increase in speed to analysis: virus outbreaks,
BOTnets, network anomalies, network health insights, etc.– Advanced Analysis Capabilities for Incident Response Teams permitting
faster identification and resolution of events and problems
Copyright 2007 NetWitness Corporation
Summary
• Today’s threat and compliance landscape requires a new generation of network monitoring that goes way beyond log files and simple content review techniques
• NetWitness NextGen provides a powerful record once, re-use many time infrastructure that permits users to easily and quickly search across terabytes of data
• NextGen can lower the risks to your information assets by providing a much higher level of assurance regarding your ability to defend against threats
• NextGen improves response time and increases the overall likelihood of problem detection, lowering the potential impact of problems
For a copy of this presentation, please email me:
(703) 608-3323
Thanks for your time!