network forensics: when conventional forensic analysis is not enough

15
Network Forensics: Network Forensics: When conventional When conventional forensic analysis is forensic analysis is not enough not enough Manuel Humberto Santander Peláez GIAC GCFA Gold, GNET Silver, GCIA Gold

Upload: burke-sykes

Post on 03-Jan-2016

27 views

Category:

Documents


0 download

DESCRIPTION

Network Forensics: When conventional forensic analysis is not enough. Manuel Humberto Santander Peláez GIAC GCFA Gold, GNET Silver, GCIA Gold. Network Security Perimeter. Firewalls NIDS/NIPS VPN Concentrator NAC (Switches) Antivirus Antispyware Content Filtering. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Network Forensics: When conventional forensic analysis is not enough

Network Forensics: When Network Forensics: When conventional forensic analysis conventional forensic analysis

is not enoughis not enough

Manuel Humberto Santander Peláez

GIAC GCFA Gold, GNET Silver, GCIA Gold

Page 2: Network Forensics: When conventional forensic analysis is not enough

Network Security PerimeterNetwork Security Perimeter

• Firewalls

• NIDS/NIPS

• VPN Concentrator

• NAC (Switches)

• Antivirus

• Antispyware

• Content Filtering

Page 3: Network Forensics: When conventional forensic analysis is not enough

Network Security PerimeterNetwork Security Perimeter

Firewall Switch (NAC)

VPN Concentrator

NIDS

Security Event Correlator

Page 4: Network Forensics: When conventional forensic analysis is not enough

Network ForensicsNetwork Forensics

• Capture, recording and analysis of network events

• Need to discover source and type of network attacks

• Big amount of logs and traffic

• Network Security Perimeter devices gives lots of interesting info

Page 5: Network Forensics: When conventional forensic analysis is not enough

Network ForensicsNetwork Forensics

• Network traffic gives evidence of attacks like:– Exploit attacks

– Virus breach attempts

– MITM

• Valuable if possible to correlate to computer breaches.

• Can find the missing information on a computer attack (“missing puzzle”)

Page 6: Network Forensics: When conventional forensic analysis is not enough

Billing Information Change Billing Information Change using a network attackusing a network attack• Colombia Utility Company is the biggest

utility company in all Colombia

• Massive change of billing amount on 10000 installations, about 40% less on each invoice

• Once invoice is delivered, no change can be made (Law 142 of 1994 Colombian Congress)

• Where was the breach? How can this be prevented?

Page 7: Network Forensics: When conventional forensic analysis is not enough

Billing Information Change Billing Information Change using a network attackusing a network attack• Billing process is a daily batch process

• 98% of invoices were altered

• Billing Calculations are done by stored procedures on the database

• First evidence gathered was report of users executing the offending transactions on the application (August 25/2007)

Page 8: Network Forensics: When conventional forensic analysis is not enough

Billing Information Change Billing Information Change using a network attackusing a network attack

Page 9: Network Forensics: When conventional forensic analysis is not enough

Billing Information Change Billing Information Change using a network attackusing a network attack

Same result obtained on every computer analyzed from the obtained table

Page 10: Network Forensics: When conventional forensic analysis is not enough

Billing Information Change Billing Information Change using a network attackusing a network attack• IDS alerts showed ARP address change for main

router several times, No firewall or NAC alert• Found 4970 alerts for August 25/2007• Investigation showed a local desktop machine

claimed to be the router for the whole network segment

• All billing department people in that segment logged on the application

Page 11: Network Forensics: When conventional forensic analysis is not enough

Billing Information Change Billing Information Change using a network attackusing a network attack

Page 12: Network Forensics: When conventional forensic analysis is not enough

Billing Information Change Billing Information Change using a network attackusing a network attack

Oexplore access time matches the first access at the database. Passwords found cracked by Cain.

Page 13: Network Forensics: When conventional forensic analysis is not enough

Billing Information Change Billing Information Change using a network attackusing a network attack

Page 14: Network Forensics: When conventional forensic analysis is not enough

Billing Information Change Billing Information Change using a network attackusing a network attack

Page 15: Network Forensics: When conventional forensic analysis is not enough

Lessons LearnedLessons Learned

• Network Forensics completes computer forensic evidence when evidence found inside computers doesn’t give enough clues.

• Network Forensics evidence must be correlated with the evidence found in computers to be valuable.

• Security Perimeter devices gives valuable information if well configured.