Penetration Testing Security Analysis and Advanced Tools: Snort.

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Advertisements

Snort & ACID. UTSA IS 6973 Computer Forensics SNORT.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 5 Port Scanning.
Introduction to Network Analysis and Sniffer Pro
Lecture 14 Firewalls modified from slides of Lawrie Brown.
Snort - Open Source Network Intrusion Detection System Survey.
Guide to Network Defense and Countermeasures Second Edition
Snort Roy INSA Lab.. Outline What is “ Snort ” ? Working modes How to write snort rules ? Snort plug-ins It ’ s show time.
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Intrusion Detection Systems and Practices
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Martin Roesch Sourcefire Inc.
Introduction to Snort’s Working and configuration file
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Introduction. 2 What Is SmartFlow? SmartFlow is the first application to test QoS and analyze the performance and behavior of the new breed of policy-based.
Intrusion Detection CS-480b Dick Steflik. Hacking Attempts IP Address Scans scan the range of addresses looking for hosts (ping scan) Port Scans scan.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Lesson 19: Configuring Windows Firewall
Information Networking Security and Assurance Lab National Chung Cheng University Snort.
Lecture 11 Intrusion Detection (cont)
INTRUSION DETECTION SYSTEM
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
USENIX LISA ‘99 Conference © Copyright 1999, Martin Roesch Snort - Lightweight Intrusion Detection for Networks Martin Roesch.
Simulation of IDS by using Activeworx Security Center (ASC) and Snort, MySQL, CommView Presented by Shamsul Wazed & Quazi Rahman School of Computer Science.
The open source network intrusion detection system. Secure System Administration & Certification Ravindra Pendyala.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Intrusion Protection Mark Shtern. Protection systems Firewalls Intrusion detection and protection systems Honeypots System Auditing.
COEN 252 Computer Forensics
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
Intrusion Detection: Snort. Basics: History Snort was developed in 1998 by Martin Roesch. It was intended to be an open-source technology, and remains.
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Honeypot and Intrusion Detection System
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
COEN 252: Computer Forensics Network Analysis and Intrusion Detection with Snort.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
SNORT Feed the Pig Vicki Insixiengmay Jon Krieger.
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
What is a “Network Intrusion Detection System (NIDS)"?
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Snort & Nmap Mike O’Connor Eric Tallman Matt Yasiejko.
Cs490ns - cotter1 Snort Intrusion Detection System
Intrusion Detection System (Snort & Barnyard) : Security and Privacy on the Internet Instructor: Dr. A. K. Aggarwal Presented By: Vic Ho & Kashif.
Linux Networking and Security
Chapter 5: Implementing Intrusion Prevention
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Snort Intrusion Detection. What is Snort Packet Analysis Tool Most widely deployed NIDS Initial release by Marty Roesch in 1998 Current version
Intrusion Intrusion Detection Systems with Snort Hailun Yan 564-project.
COEN 252: Computer Forensics Network Analysis and Intrusion Detection with Snort.
Snort - Lightweight Intrusion Detection for Networks YOUNG Wo Sang Program Committee, PISA
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
Greg Steen.  What is Snort?  Snort purposes  Where can it be used?
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Role Of Network IDS in Network Perimeter Defense.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Eric Van Horn Cosc 356.  Nearly every organization in todays era uses computers and a network to send, receive, and store information  Very important.
An Introduction To Gateway Intrusion Detection Systems Hogwash GIDS Jed Haile Nitro Data Systems.
Some Great Open Source Intrusion Detection Systems (IDSs)
Snort – IDS / IPS.
CITA 352 Chapter 5 Port Scanning.
Domain 4 – Communication and Network Security
SNORT.
Chapter 8: Monitoring the Network
Presentation transcript:

Penetration Testing Security Analysis and Advanced Tools: Snort

Introduction to Snort Analysis Snort – Widely used, open-source, network-based intrusion detection system capable of performing real-time traffic analysis and packet logging on IP networks – Performs protocol analysis and content matching to detect a variety of attacks and probes such as: buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and more

Modes of Operation Snort can be configured to run in the following modes: – Packet Sniffer – Packet Logger – Network Intrusion Detection System – Inline

Features of Snort Features of Snort: – Protocol analysis – Content searching/matching – Real-time alerting capability – Can read a Tcpdump trace and run it against a rule set – Flexible rules language Snort can be configured to watch a network for a particular type of attack profile – It can alert the incident response team as soon as the attack takes place

Configuring Snort Snort is configured using the text file snort.conf – include keyword allows other rules files to be included within the rules file Variables – Used to define parameters for detection, specifically those of the local network or specific servers or ports for inclusion or exclusion in the rules Snort Preprocessors – Offer additional detection capabilities – Port scan: TCP connection that attempts to send to more than P ports in T seconds or as UDP packets sent to more than P ports in T seconds

Configuring Snort (cont’d.) These are the different directives that can be used with the config command

Configuring Snort (cont’d.) Output Plug-ins – Allow Snort to be much more flexible in the formatting and presentation of output to its users – Snort has nine output plug-ins: alert_syslog alert_fast alert_full alert_unixsock log_tcpdump database csv unified log_null

How Snort Works Initializing Snort – Starting Up – Parsing the Configuration File Decoding – Execution begins at the ProcessPacket() function when a new packet is received Preprocessing – ProcessPacket() function tests to see the mode in which Snort is running Detection – Detection phase begins in the Detect() function

Content Matching Snort uses a series of string matching and parsing functions – Contained in the src/mstring.c and src/mstring.h files in the Snort source tree Detection engine slightly changes the way Snort works by having the first phase be a setwise pattern match Some detection options, such as pcre and byte test, perform detection in the payload section of the packet, rather than using the setwise pattern- matching engine

The Stream4 Preprocessor stream4 module – Provides TCP stream reassembly and stateful analysis capabilities to Snort – Gives large-scale users the ability to track many simultaneous TCP streams – Set to handle 8,192 simultaneous TCP connections in its default configuration Stream4 contains two configurable modules: – Global Stream4 preprocessor – Stream4 reassemble preprocessor

Inline Functionality Implemented utilizing the iptables or ipfw firewall option to provide the functionality for a new set of rule types: drop, reject, and sdrop Inline Initialization – inline_flag variable is used to toggle the use of inline functionality in Snort Inline Detection – To receive packets from ipqueue or ipfw, calls to the IpqLoop() and IpfwLoop() functions are added to the SnortMain() function

Writing Snort Rules Snort uses a simple, lightweight rules description language that is both flexible and powerful The Rule Header (fields) – Rule action – Protocol – IP address – Port information – Directional operator Rule Options – Specify exactly what to match and what to display after a successful match

Writing Snort Rules (cont’d.) These are all available Snort rule options.

Writing Snort Rules (cont’d.) Writing Good Snort Rules – Develop effective content-matching strings – Catch the vulnerability, not the exploit – Catch the oddities of the protocol in the rule – Optimize the rules

Snort Tools IDS Policy Manager – Written to manage Snort IDS sensors in a distributed environment Snort Rules Subscription – Sourcefire, the company behind Snort, uses a registration and subscription model for distribution of new rules Honeynet Security Console – Analysis tool to view events on a personal network or honeynet

Snort Tools (cont’d.) IDS Policy Manager configures Snort with a graphical user interface.

Snort Tools (cont’d.) Honeynet Security Console displays and analyzes events from several IDS programs.

Summary Snort is a powerful intrusion detection system (IDS) and traffic analyzer A Snort configuration file has four major components: – Variables – Preprocessors – Output plug-ins – Rules A Snort rule contains a rule header and rule options Users can write their own Snort rules either manually or with the assistance of tools

Summary (cont’d.) A three-homed firewall DMZ handles the traffic between the internal network and firewall, as well as the traffic between the firewall and DMZ A site survey can be conducted to determine the proper number of access points needed based on the expected number of users and the specific environment for a WLAN Authentication may not be desired if a network is publicly accessible An access point is a layer-2 device that serves as an interface between the wireless network and the wired network