Using Splunk – A Case Study

Slides:



Advertisements
Similar presentations
Case study : The curious mr. x
Advertisements

Cybersecurity Training in a Virtual Environment By Chinedum Irrechukwu.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Web server security Dr Jim Briggs WEBP security1.
DVG-N5402SP.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
1 Enabling Secure Internet Access with ISA Server.
1 Computer Security: Protect your PC and Protect Yourself.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
One to One instructions Installing and configuring samba on Ubuntu Linux to enable Linux to share files and documents with Windows XP.
Eucalyptus Virtual Machines Running Maven, Tomcat, and Mysql.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Introduction to our On-Line Self Service Center at
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Lab How to Use WANem Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Recovery-Oriented Computing User Study Training Materials October 2003.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
Implementing a Port Knocking System in C Honors Thesis Defense by Matt Doyle.
Firewalls. Intro to Firewalls Basically a firewall is a __________to keep destructive forces away from your ________ ____________.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
FitnessGram® 2015 Student Information System (SIS) Extract Import Training for Georgia School Year.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Module 10: Windows Firewall and Caching Fundamentals.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
SCSC 455 Computer Security Chapter 3 User Security.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Role Of Network IDS in Network Perimeter Defense.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
How to fix Error code 0x80072ee2 in Windows 8.1? Fix%20%20Update%20Error%200x80072EE2%20in%20Windows%20 8.1,%20Windows%2010!%20-%20Fix%20PC%20Errors.htm.
1.Switch on the computer and wait for loading. 2.Select the Windows 7 OS at the end of the list. 3.Click on the link ‘Administrator’ 4.Enter the administrator.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
1 E-Site - FTP Services Setup / install guide. 2 About FTP services can run on any desired port(s) Runs as a windows service Works for all sites installed.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Traffic Analysis– Traffic Forensic Example
Penetration Testing Exploiting I: Password Cracking
Traffic Analysis– Wireshark Simple Example
Penetration Testing Armitage: Metasploit GUI and Machine-Gun Style Attack CIS 6395, Incident Response Technologies Fall 2016, Dr. Cliff Zou
FIREWALL configuration in linux
Nicholas Hsiao Critical Log Review Checklist for Security Incidents – By ArcSight Logger For template guidelines or applying this.
The Linux Operating System
Installation and Configuration
Remote Control and Advanced Techniques
FTP - File Transfer Protocol
Welcome To : Group 1 VC Presentation
6.6 Firewalls Packet Filter (=filtering router)
Contact QuickBooks File Doctor
Intuit has launched QuickBooks File Doctor tool (QBFD) in QuickBooks File Doctor is a tool that has been designed to recover the damaged company.
Information Security Session October 24, 2005
Chapter 27: System Security
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
Configuring Internet-related services
Traffic Analysis– Traffic Forensic Example
Cyber Operation and Penetration Testing Online Password Cracking Cliff Zou University of Central Florida.
Traffic Analysis– Wireshark Simple Example
Firewalls Chapter 8.
FitnessGram® 2015 Student Information System (SIS) Extract Import Training for Georgia School Year.
6. Application Software Security
HC VMware Module
Presentation transcript:

Using Splunk – A Case Study Incident Response Technologies Dr. Cliff Zou

Acknowledgement This case study comes from textbook: Network Forensics: Tracking hackers through cyberspace, by Sherri Davidoff and Jonathan Ham. Prentice Hall; June 23, 2012

The Book’s Free Case Study Files They are free to download and use: https://lmgsecurity.com/wp- content/cache/page_enhanced/lmgsecurity.com/ nf/_index.html_gzip For self-study or educational use I have uploaded this lecture’s case study file, ‘NetworkForensics-Ch8-EventLogs.zip’, on webCourse

Case Scenario and Network Environment Bob’s Dry cleaner was attacked The Cleaner’s network consists of: Internal network: 192.168.30.0/24 DMZ (demilitarized zone): 10.30.30.0/24 DMZ is usually used to host web server that needs to accept outside connections (but less secure) The outside “Internet”: 172.30.1.0/24 (simplified for case study; all Internet side traffic belongs to this subnet)

Case Scenario and Network Environment List of important systems in the company: Hostname Description IP address(es) Ant-fw Cisco ASA firewall 192.168.30.10 10.30.30.10 172.30.1.253 Baboon-srv Server running SSH, NTP, DNS 10.30.30.20 Cheetah-srv Server running rsyslogd 192.168.30.30 Dog-ws Workstation 192.168.30.101 Elephant-ws 192.168.30.102 Fox-ws 192.168.30.100 Yak-srv Server 192.168.30.90

Case Scenario and Network Environment Baboon-srv Ant-fw 172.30.1.253 10.30.30.10 192.168.30.10 Cheetah-srv Dog-ws Elephant-ws Fox-ws Yak-srv

Security Event Logs in the Case Study The log data contains: Auth.log: system authentication and privileged command logs from the Linux server, baboon-srv Workstations.log: logs from Windows workstations Firewall.log: cisco ASA firewall logs The Cleaner company’s IT staff noticed a sudden burst of failed login attempts to the ‘baboon-srv’, beginning 18:56:50 on April 27, 2011, so they began investigation

Pre-Analysis: Load log data into Splunk In Splunk, use ‘add data’, and add the log .zip file in, let us name it “Network-Forensics-Case-Study” You can see there are 4 data sources:

Analysis: First Steps Check logs related to failed login attempts to Linux server baboon-srv After loading the .zip data, select only the auth.log, and search for “failure”

Analysis: First Steps We can see that the remote host 172.30.1.77 attempted to login to the SSH server on baboon-srv for 73 times. Using the ‘zoom out’ to check the histogram, we can see that about 70 failed login attempts happened within 7 minutes That attacking host tried username of ‘bob’ and ‘root’ for these failed login attempts

Analysis: First Steps There are two types of matching failed login events: One records one login attempt The other records two login attempts

Visualize Failed Login Attempts Let us just check ‘root’ failed login by adding ‘user=root’ in the search The search uses regular expressions to define search terms

Visualize Failed Login Attempts Let us zoom in to login attempts within one minute period (by double clicking a column in the histogram) Regular pattern of two log events every six seconds This regularity is a strong indicator of using a brute- force password-guessing attack tool.

Targeted Accounts Q: what accounts were targeted? Was the attack successful? When we return to search of ‘failure’ on ‘All time’ period, check the ‘Interesting fields’ and find ‘user’ field

Successful Logins Q: Whether the attack was successful? Use the search phrase ‘password’, we found bob password was cracked (at 8/9/12 9:04:07.000PM)!

Activities Following Compromise List search result: In reverse order (oldest to newest), by appending “|reverse” in the search phrase Change the list format from ‘list’ to ‘raw’ data format Change the time to ‘Date & Time Range’ right after the crack is successful

Activities Following Compromise A first attempt is to run ‘sudo’ by attacker, but failed Successful execute privileged commands using sudo Used text editor vi edited local authentication log (but the log was sent to remote log server so it was preserved) Ran tcpdump Install nmap for local port scanning Not all commands are logged in the auth.log file, only privileged commands are logged. Attacker logged out after 7 minutes (what happened here?)

Firewall Logs Check if we can find evidence of activities relating to baboon-srv during the time frame of interest We remove the ‘source’ in the search, still keep the time period, then we can select source field to be the firewall.log, and search for the baboon-srv IP 10.30.30.20

Firewall Logs There is a sudden spike of activities at 7:08pm in the time frame of interest. The baboon-srv is scanning internal network

Firewall Logs But the Splunk does not extract many interesting fields, such as source/dest IP, source/dest port on this firewall log We need to add these fields in to let Splunk extract them On left panel, check “Extract New Fields” The previous introduction slides have introduced how to add new fields Let us add three fields named as: fw_src_ip, fw_dst_ip, fw_dst_port, you can see they are added to left field panel

Firewall Logs Besides changing the search time period, we can also select and click a field in records (e.g., timestamp) to define a search keyword (e.g., timestamp to constrain the time period). You can edit the search phrase. We are interested in the spike activities happened on 19:08 minute Don’t forget to add ‘|reverse’ if you want records to follow normal time order

Firewall Logs We focus on baboon-srv outgoing traffic, so select ‘fw_src_ip’ to only show 10.30.30.20, then we can check ‘fw_dst_port’ to see what destination ports have been scanned by it. The server scanned both Web service (80, 443) and Remote Desktop service (3389)

Firewall Logs Focus on Remote Desktop service (3389) scan. By clicking the 3389 port, and then click the fw_dst_ip field (remove the time constraint in search field) So, each subnet IP was scanned 4 times. We have 3 internal Windows machine (192.168.30.100 - 102), could any one of them be compromised? Note that 192.168.30.101 was connected 6 times! But, the firewall log cannot tell whether these connection attempts are successful or not However, we have those windows computer log (workstations.log)!

Windows Workstations Log Restart search on workstations.log, and focus on 192.168.30.101 (dog-ws) and 3389 connections Click ‘dog-ws’ to add in search phrase In Windows log, RDP logon correspond to ‘logon Type: 10” It is the same user name ‘bob’, whose password was cracked before And the account runs ‘cmd.exe’, then runs ‘ftp.exe’ (who he ftp with?)

Firewall Log Focus on 192.168.30.101 sending ftp connections out, use the firewall log (firewall.log) Thus choose fw_src_ip and select 192.168.30.101 Thus the remote ftp server is 172.30.1.77

Afterwards Response Containment/Eradication: Rebuild the two compromised machine, 10.30.30.20 (in DMZ) and 192.168.30.101 Change all passwords related to above two PCs Limite DMZ access to internal subnet For example, disable RDP from DMZ to internal sub Block outbound FTP or other not needed ports Consider two-factor authentication to remove password guessing attack risk

Additional Sources of Evidence Network flow data Then we will know what has been transferred in the outgoing FTP connection to attacker’s ftp server Hard drives of the two compromised machines