incident response - asecuritysite.com · incident response eve ... snort. intrusion detection...

50
Author: Bill Buchanan Author: Bill Buchanan Stateful firewall Network Security Stateful firewall PIX/ASA Config Network Security PIX/ASA Author: Prof Bill Buchanan Author: Prof Bill Buchanan Incident Response Introduction. Risk Analysis. Risk Management. Outline of threats. Data Loss. Fundamentals. Alice Bob Eve Trent Bob

Upload: vuongkhanh

Post on 13-Apr-2018

237 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill BuchananAuthor: Prof Bill Buchanan

Incident Response Introduction.

Risk Analysis.

Risk Management.

Outline of threats.

Data Loss.

Fundamentals.

Alice

Bob

EveTrent

Bob

Page 2: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Types

Inc R

esponse

Author: Prof Bill Buchanan

Some data breaches

Page 3: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill BuchananAuthor: Prof Bill Buchanan

Inc

iden

t R

es

po

ns

e

Incident Taxonomy

Page 4: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Page 5: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill BuchananAuthor: Prof Bill Buchanan

Inc

iden

t R

es

po

ns

e

Data Sources/Timeline

Page 6: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Incid

en

tsIn

trod

uctio

n

Author: Prof Bill Buchanan

Incidents

During IncidentBefore Incident After Incident

Intruder

Intrusion Detection

Page 7: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Data

sta

tes

Inc. R

esponse

Data in-motion, data in-use and data at-rest

Intrusion

Detection

System

Intrusion

Detection

System

Firewall

Internet

Switch

Router

Proxy

server

Email

server

Web

serverDMZ

FTP

server

Firewall

Domain name

server

Database

serverBob

Alice

Eve

Data in-

motion

Data at-

rest

Data in-

use Data at-

rest

Page 8: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Incid

ents

Intr

oduction

Author: Prof Bill Buchanan

Incidents

During IncidentBefore Incident After Incident

Timeline

Data At Rest

Data In-Motion

Data In-Process

Files, Directories, File Rights,

Domain Rights, etc.

File changes, File CRUD

(Create, Delete, Update,

Delete), Thumbprints

Network packet logs, Web

logs, Security logs

Network scanners, Intrusion

Detection Systems, Firewall

logs, etc

Processes, Threads, Memory,

etc.Security Log, Application Log,

Registry, Domain Rights.

Intruder

Page 9: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Intr

od

uctio

nIn

c R

esp

on

se

Four Vs of Big Data

Intrusion

Detection

System

Firewall

Router

Proxy

server

Email

server

Web

server

FTP

server

Switch

Alice

Management report

Sales analysis

Targeted marketing

Trending/Correlation

V- Volume

[Scale of data]

V- Variety

[Different forms of

data]

V- Velocity

[Speed of data generation]

V- Veracity

[Trustworthiness]

Incident Response

Eve

Bob

Page 10: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Intr

oduction

Inc R

esponse

Data Capture

Web

server

IT Ops

Nagios.

NetApp.

Cisco UCS.

Apache.

IIS.

Web Services

Firewall

Router

Proxy

server

Email

server

FTP

server

Switch

Eve

Bob

Microsoft

Infrastructure

Active Directory.

Exchange.

SharePoint.

Structured Data

CSV.

JSON.

XML.

Database Sys

Oracle.

My SQL.

Microsoft SQL.

Network/Security

Syslog/SNMP.

Cisco NetFlow.

Snort.

Intrusion

Detection

System

Alice

Cloud

AWS Cloudtrail.

Amazon S3.

Azure.

Application Serv

Weblogic.

WebSphere.

Tomcat

Page 11: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Intr

od

uctio

nIn

c R

esp

on

se

Investigation sources

Web

server

Firewall

Router

Proxy

server

Email

server

FTP

server

Bob

Eve

Internal systems

Cloud service providers

Communication service

providers

Trusted partners

Page 12: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Intr

od

uctio

nIn

c R

esp

on

se

Basic timeline

Eve

Cloud service providers

Communication service

providers

Web services

Phone

call

Wifi

connect

Tweet

Facebook

post

Email

send

Web page

access

Web logCall record

Location

record

Corporate login

Web/Domain

Log

Device

switch-on

Logs/Email

Time line

Device logs

System Log Internet cache

Page 13: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Intr

oduction

Inc R

esponse

Security Operations Centre

EveEve

Logs/alerts

Bob

SIEM Package (Splunk)

News feeds

Security alerts

Page 14: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill BuchananAuthor: Prof Bill Buchanan

Inc

iden

t R

es

po

ns

e

Patterns of Intrusion

Page 15: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Type

sIn

c R

esp

onse

Author: Prof Bill Buchanan

Typical pattern of intrusion …

Outside

reconnaissance

Inside

reconnaissance

Exploit

FootholdProfit

Intruder gains public information

about the systems, such as DNS and

IP information

Intruder gains more specific

information such as subnet layout, and

networked devices.

Intruder finds a

weakness, such as

cracking a password,

breaching

a firewall, and so on.

Once into the system, the

intruder can then advance

up the privilege levels,

Data stealing, system

damage,

user abuse, and so on.

From code yellow to code

red ...

Intrusion Detection

Intrusion Detection

Intrusion

Detection

Intrusion Detection

Eve

Bob

Intrusion

Detection

Page 16: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Types

Inc R

esponse

Author: Prof Bill Buchanan

Cyber Kill Chain ®

From code yellow to

code red ...

Eve

Reconnaissance Weaponization

Preparation (hrs to mons)

Delivery

Explotation

Installation

Intrusion

(minutes)

Command and

Control

Action on

Objective

Bob

Active Breach (months)

Page 17: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill BuchananAuthor: Prof Bill Buchanan

Inc

iden

t R

es

po

ns

e

Risk Analysis

Page 18: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Ris

k a

na

lysis

Intr

od

uctio

n

Author: Prof Bill Buchanan

Risk analysis (Cost/likelihood)

Highly Likely, Low Cost

- Worth mitigating against

High Likelihood, High

Cost

- Maybe worth mitigating

against.

Low Likelihood, Low

Cost

- Maybe worth mitigating

against.

Low Likelihood, High

Cost

- Probably not worth

mitigating against

Cost

Likelihood

High

cost

Low

cost

High

likelihoodLow

likelihood

Intruder

Page 19: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Page 20: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Page 21: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill BuchananAuthor: Prof Bill Buchanan

Inc

iden

t R

es

po

ns

e

Risk Management

Page 22: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Page 23: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Page 24: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Page 25: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill BuchananAuthor: Prof Bill Buchanan

Inc

iden

t R

es

po

ns

e

Some Threats

Page 26: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Risk 2: Rogue SSID/Gateway

Free Moonbucks Wireless

Moonbucks Wireless

Rogue Gateway

Internet Gateway

Page 27: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Risk 3: Lack of Separation

Business Life

Home Life

Corporate Firewall

Page 28: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Risk 4: One Password Fits All

150 million accounts

compromised

# Count Ciphertext Plaintext--------------------------------------------------------------1. 1911938 EQ7fIpT7i/Q= 1234562. 446162 j9p+HwtWWT86aMjgZFLzYg== 1234567893. 345834 L8qbAD3jl3jioxG6CatHBw== password4. 211659 BB4e6X+b2xLioxG6CatHBw== adobe1235. 201580 j9p+HwtWWT/ioxG6CatHBw== 123456786. 130832 5djv7ZCI2ws= qwerty7. 124253 dQi0asWPYvQ= 12345678. 113884 7LqYzKVeq8I= 1111119. 83411 PMDTbP0LZxu03SwrFUvYGA== photoshop10. 82694 e6MPXQ5G6a8= 123123

1 million accounts – in

plain text. 77 million

compromised

47 million accounts

200,000 client accounts

Dropbox

compromised 2013

One account hack … leads to others

6.5 million accounts

(June 2013)

Page 29: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Risk 4: One Password Fits All

150 million accounts

compromised

# Count Ciphertext Plaintext--------------------------------------------------------------1. 1911938 EQ7fIpT7i/Q= 1234562. 446162 j9p+HwtWWT86aMjgZFLzYg== 1234567893. 345834 L8qbAD3jl3jioxG6CatHBw== password4. 211659 BB4e6X+b2xLioxG6CatHBw== adobe1235. 201580 j9p+HwtWWT/ioxG6CatHBw== 123456786. 130832 5djv7ZCI2ws= qwerty7. 124253 dQi0asWPYvQ= 12345678. 113884 7LqYzKVeq8I= 1111119. 83411 PMDTbP0LZxu03SwrFUvYGA== photoshop10. 82694 e6MPXQ5G6a8= 123123

Two-factor everything in

the Cloud

Page 30: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Risk 5: Device Poisoning

Gateway

(192.168.0.1)

Who has this IP

address (192.168.0.1)?

Here is my MAC

address

(11:22:33:44:55:66)

Eve

Here is my MAC

address

(22:33:44:55:66)DHCP Request ...

Eve

1 0.000000 0.0.0.0 255.255.255.255 DHCP 314 DHCP Discover - Transaction ID 0x3d1d

Frame 1: 314 bytes on wire (2512 bits), 314 bytes captured (2512 bits)

Ethernet II, Src: Grandstr_01:fc:42 (00:0b:82:01:fc:42), Dst: Broadcast (ff:ff:ff:ff:ff:ff)

Internet Protocol Version 4, Src: 0.0.0.0 (0.0.0.0), Dst: 255.255.255.255 (255.255.255.255)

User Datagram Protocol, Src Port: bootpc (68), Dst Port: bootps (67)

2 0.000295 192.168.0.1 192.168.0.10 DHCP 342 DHCP Offer - Transaction ID 0x3d1d

Frame 2: 342 bytes on wire (2736 bits), 342 bytes captured (2736 bits)

Ethernet II, Src: DellComp_ad:f1:9b (00:08:74:ad:f1:9b), Dst: Grandstr_01:fc:42 (00:0b:82:01:fc:42)

Internet Protocol Version 4, Src: 192.168.0.1 (192.168.0.1), Dst: 192.168.0.10 (192.168.0.10)

User Datagram Protocol, Src Port: bootps (67), Dst Port: bootpc (68)

3 0.070031 0.0.0.0 255.255.255.255 DHCP 314 DHCP Request - Transaction ID 0x3d1e

Frame 3: 314 bytes on wire (2512 bits), 314 bytes captured (2512 bits)

Ethernet II, Src: Grandstr_01:fc:42 (00:0b:82:01:fc:42), Dst: Broadcast (ff:ff:ff:ff:ff:ff)

Internet Protocol Version 4, Src: 0.0.0.0 (0.0.0.0), Dst: 255.255.255.255 (255.255.255.255)

User Datagram Protocol, Src Port: bootpc (68), Dst Port: bootps (67)

4 0.070345 192.168.0.1 192.168.0.10 DHCP 342 DHCP ACK - Transaction ID 0x3d1e

Frame 4: 342 bytes on wire (2736 bits), 342 bytes captured (2736 bits)

Ethernet II, Src: DellComp_ad:f1:9b (00:08:74:ad:f1:9b), Dst: Grandstr_01:fc:42 (00:0b:82:01:fc:42)

Internet Protocol Version 4, Src: 192.168.0.1 (192.168.0.1), Dst: 192.168.0.10 (192.168.0.10)

User Datagram Protocol, Src Port: bootps (67), Dst Port: bootpc (68)

ARP

Poisoning

DNS

Poisoning

Here is your IP address,

Gateway, and DNS IP

Page 31: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Risk 6: Unpatched Systems

Eve

CVE-2013-5331

Adobe Flash Player.

Run code on

machine.

CVE-2007-0071

Adobe Flash Player.

Integer overflow

CVE-2013-1723

Java Exploit

CrimeBoss

Phoenix Exploit Kit

http://asecuritysite.com/subjects/chapter14

Page 32: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Page 33: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Page 34: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Page 35: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Page 36: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Page 37: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Page 38: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Page 39: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Page 40: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Page 41: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Page 42: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Page 43: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Page 44: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill BuchananAuthor: Prof Bill Buchanan

Inc

iden

t R

es

po

ns

e

A Few Fundamentals

Page 45: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Da

ta F

orm

ats

DL

P

Hex and Base-64

Bob

Encryption/

Encoding01000001 01000010 01000011 01000100

‘A’ ‘B’ ‘C’ ‘D’

Byte values

ASCII characters

01011110 0010000011100110 10101010

5e 20 e6 aa

Hex

XiDmqg==

Base-64

13610163252

^ æª

Octal

ASCII

Page 46: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Data

Form

ats

DLP

Hex

Bob

0101 1110 0010 0000 1110 0110 1010 1010

5 e 2 0 e 6 a a

Hex

Bit stream

What is 0100111011110001?

Decimal Binary Oct

0 000 0

1 001 1

2 010 2

3 011 3

4 100 4

5 101 5

6 110 6

7 111 7

Decimal Binary Hex

0 0000 0

1 0001 1

2 0010 2

3 0011 3

4 0100 4

5 0101 5

6 0110 6

7 0111 7

8 1000 8

9 1001 9

10 1010 A

11 1011 B

12 1100 C

13 1101 D

14 1110 E

15 1111 F

Page 47: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Data

Form

ats

DLP

Base-64

Bob

010111 100010 000011 100110 101010 100000

X I D m q g = = Base-64

Bit stream

0101 1110 0010 0000 1110 0110 1010 1010

010111 100010 000011 100110 101010 100000 = =

24-bit width

Val Enc Val Enc Val Enc Val Enc

0 A 16 Q 32 g 48 w

1 B 17 R 33 h 49 x

2 C 18 S 34 i 50 y

3 D 19 T 35 j 51 z

4 E 20 U 36 k 52 0

5 F 21 V 37 l 53 1

6 G 22 W 38 m 54 2

7 H 23 X 39 n 55 3

8 I 24 Y 40 o 56 4

9 J 25 Z 41 p 57 5

10 K 26 a 42 q 58 6

11 L 27 b 43 r 59 7

12 M 28 c 44 s 60 8

13 N 29 d 45 t 61 9

14 O 30 e 46 u 62 +

15 P 31 f 47 v 63 /abc 24 bits (4*6) YWJj

abcd 32 bits (5*6) + (2+4) + 12 bits YWJjZA==

abcde 40 bits (8*6) + (2+4) + 4 bits YWJjZGU=

Page 48: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

Da

ta F

orm

ats

DL

P

MD5

hello

5D41402ABC4B2A76B9719D911017C592MD5

128 bits (32 hex characters)

AAF4C61DDCC5E8A2DABEDE0F3B482CD9AEA9434DSHA-1

160 bits (40 hex characters)

SHA-256SHA-384 SHA-512

$ cat hello.txtHello$ openssl md5 hello.txtMD5(c:\hello.txt)= 5d41402abc4b2a76b9719d911017c592

$ echo -n "hello" | openssl md5(stdin)= 5d41402abc4b2a76b9719d911017c592

Page 49: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill Buchanan

[ character_group ]

Matches any single character in character_group. By default, the match is case-sensitive.

Data

Form

ats

DLP

RegEx

[ character_group ] Match any single character in character_group Example: gr[ae]y – gray, grey

[ ^character_group ] Match any single character in character_group Example: gr[^ae]y – grby, grcy

[a-z] Character range Example a, b, c … z

{n} Matches previous character repeated n times

a{n,m} Matches between n and m or a

\d Matches a digit

. Single character

(a | b) Matches a or b

a? Zero or one match of a

a* Zero or more match of a

a+ One or more match of a

$ Match at the end

Escape: \s (space)

Telephone: \\d{3}[-.]?\\d{3}[-.]?\\d{4}

Email: [a-zA-Z0-9._%+-]+@[a-zA-Z0-9._%+-]

444.444.2312

[email protected]

Master: 5\\d{3}(\\s|-)?\\d{4}(\\s|-)?\\d{4}(\\s|-)?\d{4}Am Ex: 3\\d{3}(\\s|-)?\\d{6}(\\s|-)?\\d{5}Visa: 4\\d{3}(\\s|-)?\\d{4}(\\s|-)?\\d{4}(\\s|-)?\d{4}

5555-1234-3456-4312

Year: [0-9]{4}

IP: [0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}.[0-9]{1,3} 1.2.3.4

1961

Page 50: Incident Response - asecuritysite.com · Incident Response Eve ... Snort. Intrusion Detection System Alice Cloud AWS Cloudtrail. Amazon S3. Azure. Application Serv Weblogic. WebSphere

Au

tho

r:B

ill B

uchanan

Au

tho

r:B

ill B

uchanan

Sta

tefu

l fire

wa

llN

etw

ork

Se

cu

rity

Stateful firewall

PIX

/AS

A C

on

fig

Ne

two

rk S

ecu

rity

PIX/ASA

Author: Prof Bill BuchananAuthor: Prof Bill Buchanan

Incident Response Introduction.

Risk Analysis.

Risk Management.

Outline of threats.

Data Loss.

Fundamentals.

Alice

Bob

EveTrent

Bob