Lesson 6 Basics of Incident Response. UTSA IS 6353 Security Incident Response Overview Hacker Lexicon Incident Response.

Slides:



Advertisements
Similar presentations
COEN 250 Computer Forensics Unix System Life Response.
Advertisements

HONEYPOTS Mathew Benwell, Sunee Holland, Grant Pannell.
1 Computer and Internet Security JCCAA Presentation 03/14/2009 Yu-Min (Phillip) Hsieh Sr. System Administrator Information Technology Rice University.
SECAM Systems Product Presentation SECAM Systems © 2010.
Guide to Computer Forensics and Investigations1 Network Forensics Overview Network forensics –Systematic tracking of incoming and outgoing traffic To ascertain.
Using Nagios for Intrusion detection Miguel Cárdenas Montes Elio Pérez Calle Francisco Javier Rodríguez Calonge.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Incidence Response & Computer Forensics, Second Edition Chris Prosise Kevin Mandia.
Information Security Policies and Standards
Security+ Guide to Network Security Fundamentals
Network Security Testing Techniques Presented By:- Sachin Vador.
Handling Security Incidents
Incidence Response & Computer Forensics, Second Edition
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Lecture 11 Reliability and Security in IT infrastructure.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Computer Security: Principles and Practice
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network security policy: best practices
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
General Awareness Training
13Computer Intrusions Dr. John P. Abraham Professor UTPA.
COEN 252 Computer Forensics
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
FORESEC Academy FORESEC Academy Security Essentials (II)
Computer & Network Security
COEN 252 Computer Forensics Collecting Network-based Evidence.
Honeypot and Intrusion Detection System
Introduction of Internet security Sui Wang IS300.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Information Systems Security Operations Security Domain #9.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
CIS 450 – Network Security Chapter 14 – Specific Exploits for UNIX.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
COEN 250 Computer Forensics Windows Life Analysis.
Lesson 5 Introduction to Incident Response. UTSA IS 6353 Incident Response Overview Hacker Lexicon Incident Response.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
COEN 250 Computer Forensics Unix System Life Response.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Role Of Network IDS in Network Perimeter Defense.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Lesson 6 Basics of Incident Response
Critical Security Controls
Lesson 11 Basics of Incident Response
Data Compromises: A Tax Practitioners “Nightmare”
Chapter 17 Risks, Security and Disaster Recovery
IS4680 Security Auditing for Compliance
Lesson 16-Windows NT Security Issues
Operating System Security
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

Lesson 6 Basics of Incident Response

UTSA IS 6353 Security Incident Response Overview Hacker Lexicon Incident Response

UTSA IS 6353 Security Incident Response Hacker Lexicon Rootkit - a collection of tools an intruder loads onto a compromised computer Usually Consists of: –trojanized utilities –network sniffers –log-cleaning scripts

UTSA IS 6353 Security Incident Response Root Kits Three primary types: –traditional –loadable kernel modules (LKMs) for Unix/Linux –kernel -level rootkit for Windows Hundreds of Root-kits in existence –Hackers sites contain “click and choose smorgasbord” (KNOW THY ENEMY)

UTSA IS 6353 Security Incident Response Basic RootKit Functionality Maintain Access Attack other Systems Destroy Evidence

UTSA IS 6353 Security Incident Response Traditional Rootkit Tools Backdoors - programs that listen on TCP/UDP ports that allow intruder stealthy access Log wipers - utility which erases log files to hide signs of intruders presence Packet sniffers - software designed to monitor network traffic to capture packets of interest Internet Relay Chat (IRC) utilities for comms DDOS agents - S/W that sends UDP/ICMP floods

UTSA IS 6353 Security Incident Response LKM Rootkits Most rootkits used against Unix/Linux systems are Loadable Kernel Modules (LKMs) Kernel is transparently modified: –Execute Redirection: remaps system utility calls –Remote execution: commands transmitted via the net –Promiscuous mode hiding: hides sniffers –Task hacking: changing the user id (UID), effective user id (EUID), and file system user id (FSUID) of any process

UTSA IS 6353 Security Incident Response LKM Rootkits Kernel is transparently modified (contd): –Real-time process hiding -sending the following: “kill -31 process id” allows kernel to suppress all info about the given process –Kernel Module Hiding: LKMs can actually mask their own presence (stealthy LKMs)

UTSA IS 6353 Security Incident Response WINDOWS Rootkits Contains: – Kernel Mode Device Driver: “_root_.sys” –Launcher program: “deploy.exe” Capabilities: –Back doors –Hide files: files with _root_ will be hidden from “dir” –Hide processes and registry entries –Keystroke Intercept

UTSA IS 6353 Security Incident Response Incident Response Overview Goals Methodology Preparation Detection Initial Response Strategy Formulation Investigation Monitoring Recovery Reporting

UTSA IS 6353 Security Incident Response What is an Incident? Incident - an event in an information system/network Time based security: Protection time >> detection time + reaction time Some say its all about vulnerability management

UTSA IS 6353 Security Incident Response SANS/FBI Top 20 List 20 MOST CRITICAL INTERNET VULNERABILITIES UP TO 800 POSSIBLE SANS Institute 20 Most Critical Internet Security Vulnerabilities

UTSA IS 6353 Security Incident Response General Vulnerabilities 1. Default installs of OSs and applications 2. Weak or non-existent passwords 3. Incomplete or non-existent backups 4. Large number of open ports 5. Lack of packet filtering 6. Incomplete or non-existent logging 7. Vulnerable CGI programs Source: The SANS Institute

UTSA IS 6353 Security Incident Response Windows Vulnerabilities 8. Unicode Vulnerability 9. ISAPI Extension Buffer Overflows 10. MS Remote Data Services Exploit 11. NETBIOS – Unprotected Windows Networking Shares 12. Leakage via Null Session Connections 13. Weak Hashing in SAM (Lan Manager Hash) Source: The SANS Institute

UTSA IS 6353 Security Incident Response Unix Vulnerabilities 14. Buffer Overflows in Remote Procedure Call Services 15. Sendmail Vulnerabilities 16. Bind Weaknesses 17. R Commands 18. LPD – Remote Print Protocol Daemon 19. Sadmind and Mountd 20. Default SNMP Strings Source: The SANS Institute

UTSA IS 6353 Security Incident Response Home User Guidelines Use strong passwords (alpha-numeric, over 8 characters) Make regular backups of critical data Use virus protection software Use a firewall as a gatekeeper between your computer and the Internet Do not leave computers online Do not open attachments from strangers Source: FBI

UTSA IS 6353 Security Incident Response The Worst Can Happen "Don't look at the past and assume that's the future. Look at the enemy's strengths and your vulnerability. You've got to realize that the worst case does sometimes happen." -Richard Clarke Special Advisor for Cybersecurity

UTSA IS 6353 Security Incident Response Goals of Incident Response Confirm or dispel incident Promote accurate info accumulation Establish controls for evidence Protects privacy rights Minimize disruption to operations Allow for legal/civil recriminations Provide accurate reports/recommendations

UTSA IS 6353 Security Incident Response Incident Response Methodology Pre-incident preparation Detection Initial Response Strategy formulation Duplication Investigation Security measure implementation Network monitoring Recovery Reporting Follow-up

UTSA IS 6353 Security Incident Response 7 Components of Incident Response Pre-Incident Preparation Detection of Incidents Initial Response Formulate Response Strategy Data Collection Data Analysis Reporting Investigate the Incident Resolution Recovery Implement Security Measures Page 15, Fig 2-1, Mandia 2nd Edition

UTSA IS 6353 Security Incident Response Detection Firewall Logs IDS Logs Suspicious User Sys Admin DETECTDETECT Notification Checklist Completed Response Team Activated

UTSA IS 6353 Security Incident Response Initial Critical Details Current time and date Who/what is reporting the incident Nature of the incident When the incident occurred Hardware/software involved Point of contact for involved personnel

UTSA IS 6353 Security Incident Response INITIAL RESPONSE Details from notification checklist Prepared response team I R N E I S T P I O A N L S E Verified information about the incident Success Failure How much info is enough?

UTSA IS 6353 Security Incident Response Response Strategy Formulation Formulate Response Strategy Mgt Approved Action Plan Verified information about the incident Response Posture Goal: determine most appropriate response strategy

UTSA IS 6353 Security Incident Response Factors for Strategy How critical are the impacted systems? Data sensitivity Who are the perpetrators? Does the incident have publicity Level of access to the hacker Apparent skill of the attacker How much downtime can be tolerated Overall dollar loss involved

UTSA IS 6353 Security Incident Response Common Incidents Denial of Service Attack Unauthorized Use Vandalism Information Theft Computer Intrusion Type of incident + response likely outcome Management Support network downtime user downtime legal liability publcity theft of intellectual property

UTSA IS 6353 Security Incident Response Investigation Stage Live System Network Logs Forensic Duplicate Investigation Investigative Report

UTSA IS 6353 Security Incident Response Security Measure Implementation Stage Verified Info Network Logs Response Posture Implementing Security Remedies Monitor Isolate and Contain Prevent Same Exposure! Fishbowling the attacker

UTSA IS 6353 Security Incident Response Recovery/Reporting Process Conclusions Successful containment Recovery backups hardening user education COOP Report Support Criminal Actions Lessons Learned Prevent Repeats

UTSA IS 6353 Security Incident Response What Will You Do? We Need a Initial Response that: –Supports the Goals of Computer Security –Supports the Business Practices –Supports Administrative and Legal Policy –Is Forensically Sound –Is Simple and Efficient (KISS) –Provides an Accurate Snapshot for Decision Makers –Supports Civil, Administrative, or Criminal Action.

UTSA IS 6353 Security Incident Response Common Mistakes Failure to Document Findings Appropriately. Failure to Notify or Provide Accurate Information to Decision Makers. Failure to Record and Control Access to Digital Evidence. Wait Too Long Before Reporting. Underestimating the Scope of Evidence that may be found.

UTSA IS 6353 Security Incident Response Common Mistakes Technical Blunders: –Altering Time/Date Stamps on Evidence Systems –“Killing” Rogue Processes –Patching the System –Not Recording the Steps Taken on the System –Not Acting Passively