Introduction to InfoSec – Recitation 13 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)

Slides:



Advertisements
Similar presentations
Intel® RPIER 3.1 User Training Joe Schwendt Steve Mancini 7/31/2006.
Advertisements

Lesson 4 : Computer Literacy Basics Laquan Hale. Maintenance Issues To maintain optimal performance, you have to keep up with your hardware. Even if you.
Thank you to IT Training at Indiana University Computer Malware.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
The Most Analytical and Comprehensive Defense Network in a Box.
Cosc 4765 Cleaning up.. So… The Windows machine has been infected/comprised or just “acting funny”. How to clean it up. Hope you have backups…
AVG- Protecting those who are vulnerable.  Free Anti-Virus Software ◦ J.R. Smith President of AVG oversees a lineup of antivirus products used by 110.
ITMS Information Systems Security 1. Malicious Code Malicious code or rogue program is the general name for unanticipated or undesired effects in.
Introduction to InfoSec – Recitation 6 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
How (not) to use your firewall Jurjen N.E. Bos Information Security Consultant.
1 UNIX Postmortem Mark Henman. 2 Introduction For most system administrators, there is no question that at some point at least one of their systems is.
Pacific North West Honeynet Project Dave Dittrich The Information School University of Washington DIMACS Large Scale Attack Workshop, Sept. 23, 2003.
Neural Technology and Fuzzy Systems in Network Security Project Progress 2 Group 2: Omar Ehtisham Anwar Aneela Laeeq
Introduction to InfoSec – Recitation 12 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
CH 13 Server and Network Monitoring. Hands-On Microsoft Windows Server Objectives Understand the importance of server monitoring Monitor server.
Chapter Nine Maintaining a Computer Part III: Malware.
Introduction to InfoSec – Recitation 10 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Virtual Memory Tuning   You can improve a server’s performance by optimizing the way the paging file is used   You may want to size the paging file.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
The Impact of Physical Security on Network Security
John Prisco President and CEO Triumfant, Inc. Our defenses are designed to defeat threats we have seen before. We have very little protection against.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Introduction to InfoSec – Recitation 15 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Data Security.
Viruses.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Hacker Zombie Computer Reflectors Target.
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Introduction to InfoSec – Recitation 7 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
IT Essentials 1 v4.0 Chapters 4 & 5 JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
The Most Analytical and Comprehensive Defense Network in a Box.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Proof-Of-Concept: Signature Based Malware Detection for Websites and Domain Administrators - Anant Kochhar.
Introduction to InfoSec – Recitation 11 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Introduction to InfoSec – Recitation 07 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (infosec15 at modprobe.net)
CensorNet Desktop Surveillance Description, Target audience, Positioning Components, Features
Attack Plan Alex. Introduction This presents a step-by-step attack plan to clean up an infected computer This presents a step-by-step attack plan to clean.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Lecture 19 Page 1 CS 236 Online 16. Account Monitoring and Control Why it’s important: –Inactive accounts are often attacker’s path into your system –Nobody’s.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
CH 13 Server and Network Monitoring. Hands-On Microsoft Windows Server Objectives Understand the importance of server monitoring Monitor server.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Role Of Network IDS in Network Perimeter Defense.
The hidden part of TDSS Sergey (k1k) Golovanov, Malware Expert Global Research and Analysis Team Kaspersky Lab.
Introduction to InfoSec – Recitation 3 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (infosec15 at modprobe.net)
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
Logging and Monitoring. Motivation Attacks are common (see David's talk) – Sophisticated – hard to reveal, (still) quite limited in our environment –
Computer Security Keeping you and your computer safe in the digital world.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Ilija Jovičić Sophos Consultant.
Lesson Objectives Aims You should be able to:
Utilize Group Policy Terminal Server Settings
Secure once, run anywhere Simplify your security with Sophos
16. Account Monitoring and Control
Firewall Installation
Cybersecurity Simplified: Ransomware
Presentation transcript:

Introduction to InfoSec – Recitation 13 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)

Today What is Computer Forensics? Threat types Useful data sources Gathering information Malware Analysis Hunting Rootkits Expanding the search Planning to facilitate forensics and incident analysis

Forensics 101 We have a suspected machine / network installation You know little to nothing about the specific threat, and even less about how it got there You want to know everything! o How they got there o Find and fix any damage they’ve done o Find out if they took any sensitive information o Who they are, what do they want? o Finally – figure out how to prevent the next incident

Threat Types Non targeted attack – script-kiddies, botnets, drive-by downloads, toolbars, scam sites, etc. Targeted attack, a.k.a. APT (Advanced Persistant Threats) – o They know who you are o They’ll invest lots of resources to get what they want o Very hard to defend against o But if you do your work well – you’ll know what they did

Basic Data Sources Running process list, loaded Kernel module list Complete memory image – RAM + Swap Anything that’s changed in the suspected time frame (time since last major system change is a good start) Checking file signatures against ‘known good’ list (whitelist) Contents of config files – users, lowered hardening, anything an attack might want to change LOG FILES File / directory creation, modification and access times Network analysis – which machines download/upload more than they should? Which machines are talking to machines that they shouldn’t?

Gathering Information You could work in the client’s production environment But then you could make mistakes that will destroy valuable ‘bread crumbs’ and/or reveal information to the adversary You want a perfect memory snapshot, and a perfect disk image to take to the lab

Getting a snapshot of the system Getting the contents of the memory by asking the computer to hibernate / reading memory via FireWire Getting the contents of the disks by pulling the power immediately, and taking the disks to the lab

Disks or Memory – choose one! If the attacker was smart – her tools will hide better in a some scenarios o She’s put a hook on the hibernate function, to make the memory snapshot “clean”, and maybe even clean her rootkit from the disk o She might scrub her files off the disk after loading, only writing them back on a regular shutdown, or not at all… You may have a better tool (Liquid NO2 + magic) – but you’ll still have to choose one over the other

Malware Analysis First – a quick check against any known signatures Then, lots of looking for potential malware Once good candidates surface, lots of reverse engineering The goal is to spend as little time initially, to classify things as “interesting”, “maybe”, and “junk” Finally, start diving into the “interesting” and “maybe” bins You may find hints that will make you go back on the field and collect more information

Hunting Rootkits Nir touched upon offline scanning in the last exercise One of the simplest and most reliable tool to find a rootkit o test any resource via the API o Test again from a trusted machine, booting from a live-cd, accessing the data on the lowest level you can muster o Compare the two. Any difference should be worth your time! Very clever rootkits may detect a process that is walking the entire namespace, and revert to “innocent” operation. Very very rare.

Expanding the Search You’ve identified a threat Next step is to build a detector, and spread it as far as you can Gather more information from new infections you found Continue to learn more about the attacker … Repeat

Planning for Forensics Instead of reacting – we can plan the system / network to facilitate forensics, and make it much harder for the attacker Logging should be local AND network based, in multiple locations, and logging servers should be extremely secure Logging should be as deep as possible (forever is a good depth) Log anything important, especially anything touching the core secrets of the company Keep ‘good’ system images for important machines, and again – depth is your friend Keep an exact and central log for any maintenance event, to help quickly filter these events later on

Monitoring Find a SOC (Security Operations Center) solution that suits you, and USE it! Build rules to filter out the noise Build rules to highlight important events Central logging will permit high-order anomaly detection, data clustering and machine learning based filtering to help you analyze all that data If possible – make this system report to the system administrators in real-time! The key is to actively look for the threats, not just install-and-forget…

Questions?