Data Capture in Encrypted Environments with Sebek.

Slides:



Advertisements
Similar presentations
Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 URL: Security.
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
1 Figure 6-16: Advanced Server Hardening Techniques Reading Event Logs (Chapter 10)  The importance of logging to diagnose problems Failed logins, changing.
Near Term Tools: Using honeynet tools and techniques for post intrusion intelligence gathering Edward G. Balas Indiana University Advanced Network Management.
Cryptography and Network Security Chapter 20 Intruders
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system.
System and Network Security Practices COEN 351 E-Commerce Security.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Copyright 2010 Justin C. Klein Keane Using Kojoney Open Source Low Interaction Honeypot to Develop Defensive Strategies and Fingerprint Post-Compromise.
Lecture 11 Intrusion Detection (cont)
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
IDS – Intrusion Detection Systems. Overview  Concept  Concept : “An Intrusion Detection System is required to detect all types of malicious network.
What is FORENSICS? Why do we need Network Forensics?
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 12 Windows 2000 Server.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Honeynets in operational use Gregory Travis Indiana University, Advanced Network Management Lab
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Honeynets Detecting Insider Threats Kirby Kuehl
CSCE 815 Network Security Lecture 24 Your Jail and HoneyNets April 17, 2003.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
CHAPTER 10 Session Hijacking. INTRODUCTION The act of taking over a connection of some sort, for examples, network connection, a modem connection or other.
Honeynet Data Analysis: A technique for correlating sebek and network data Edward G. Balas Indiana University Advanced Network Management Lab 6/15/2004.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Linux Networking and Security
INTRUDERS BY VISHAKHA RAUT TE COMP OUTLINE INTRODUCTION TYPES OF INTRUDERS INTRUDER BEHAVIOR PATTERNS INTRUSION TECHNIQUES QUESTIONS ON INTRUDERS.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Honeynet Data Analysis: A technique for correlating sebek and network data Edward G. Balas Indiana University Advanced Network Management Lab 6/15/2004.
Cracking Techniques Onno W. Purbo
1 Next Generation Kernel Activity Monitoring Edward Balas, Indiana University Michael Davis, Savid Technologies IU Partners in Crime: Camilo Viecco Gregory.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Intrusion Intrusion Detection Systems with Snort Hailun Yan 564-project.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
1 HoneyNets, Intrusion Detection Systems, and Network Forensics.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
Wireless and Mobile Security
Chapter 9 Intruders.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Web Technology – Web Server Setup : Chris Uriarte Meeting 4: Advanced Topics, Continued: Securing the Apache Server and Apache Performance Tuning Rutgers.
Role Of Network IDS in Network Perimeter Defense.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
Lecture 5 Rootkits Hoglund/Butler (Chapters 1-3).
By Collin Donaldson Man in the Middle Attack: Password Sniffing and Cracking.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Chapter 9 Intruders.
Onno W. Purbo Cracking Techniques Onno W. Purbo
Outline Introduction Characteristics of intrusion detection systems
Backtracking Intrusions
An Innovative Distributive Training and Information Platform
SECURITY IN THE LINUX OPERATING SYSTEM
Chapter 9 Intruders.
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Operating System Concepts
Dirty COW Race Condition Attack
Presentation transcript:

Data Capture in Encrypted Environments with Sebek

Speakers  Edward Balas  Researcher at Indiana University  Member of the Honeynet Project

 This material is based on research sponsored by the Air Force Research Laboratory under agreement number F The U.S. Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon.

Motivation  Observe intruders even in encrypted environments  Do so without being noticed.  Monitor all attacker activity, not just keystrokes

Historical techniques  Serial line monitoring  Packet sniffing  Ethereal  Snort  Trojaned binaries  Bash  SSH

Limits of existing techniques  Network based capture  limit you to black box system analysis.  Unable to monitor encrypted sessions  presuming no key escrow  Trojaned binaries  Easy to detect  Easier to avoid

Next step in the arms race  Data Capture needs to circumvent encryption.  Application trojaning is insufficient.  Time to head for the Kernel Space.

A kernel based Data Capture tool  How do we gain access to the data of interest?  How do we get this data to a server without the attacker detecting it?  Can we make the system impossible to detect?

Sebek  Uses kernel space “privilege” to gain access to all data read by intruder.  Exports this data to remote server in covert manner.  It can be detected and disabled, but it is a step in the right direction.

Typical deployment

Getting access to the data  Replace the read() system call in the kernel  Have new syscall record interesting data  Just change the function pointer in the system call table.

What the read hijack looks like

Getting the data to the server  We don’t want data export slowing down the host.  UDP works well in this situation  We don’t want a hacker to see or block these packets.  Using the standard socket interface wont work  Sebek generates packet itself and interacts directly with ethernet driver.

What the data export looks like

Capabilities  Keystroke monitoring  SCP file transfer recovery  Burneye password recovery  Monitor network inactive processes

Anti-Sebek Foo The weak points in Sebek’s Armor

Detecting Sebek  Static Fingerprinting via kernel memory  /proc/kcore  kernel space via insmode  find data structures, symbols etc.  a true wealth of data  Dynamic performance profiling  Cause sebek to export packets  if sebek is running 1,000,000 reads will take longer than if it is not running  check to see if network latency increases as a result of Packets Per Second TX

Evading Sebek  One way to evade sebek is to not use the read call.  Dornseif, Holz and klien outline how to access files with the mmap call  not so useful in traditional shell and pipe environments  would work for custom malware etc.

Disabling Sebek  J. Cory outlined a method to disable Sebek by rewriting syscall table.  works for kernel module w/ syscall jacking  wont for a kernel patch  Dornseif, Holz and Klien simply called the cleanup_module() call.  also fails in a kernel patch

Anti-Sebek Bibliography  M. Dornseif, T. Holz, C. Klien, “NoSEBrEak - Attacking Honeypots”, Proceedings of the 2004 IEEE Workshop on Information Assurance and Security.  J. Corey, “Advanced Honeypot Identification” Sept 2003,  J. Corey, “Advanced Honeypot Identification and Exploitation” Jan 2004,

What can we do about this?  rollout a patch based Sebek.  monitor the mmap call / associated page faults?  futher obfuscate contents of sebek memory  Trojan the /proc/kcore device and the insmod related syscalls?

The Sebek Server.  Operates as a packet sniffer.  Uploads data into mysql database  Outputs keystroke logs  Web Interface allows one to browse all data

Data Analysis  Example shows a non-root user copying a file to his home directory.  The file is a Burneye protected copy of a ptrace exploit.  The user runs the binary and gains root access.

Analysis Questions 1.Can we recover the SCPed file using the web interface? 2.Can we determine the password used to run the Burneye binary? 3.Can we determine exactly when the user gained root access?

Main Page: All hosts summary

Looking at Keystrokes

Closer look at “scp” process

Using the SCP decode option

Looking at the SCPed file  We have now recovered a file named malware from PID 1264 FD 0.  After downloading, we examined the file with strings.  “TEEE burneye - TESO ELF Encryption Engine”  This is a burneye binary

Lets take a closer look at malware’s activity

I wonder what the password is?

Hmm... this looks bad

Back to the Questions  We were able to recover the file named malware, which was transfered using SCP.  The password used to run malware was “secret”  The blackhat user gained root access  Timestamp :04:01  Process ID 1318  File Descriptor 0

The Future  Ability to compile directly into kernel  Make harder to disable  anti-anti-Sebek techniques  provide a better facility for users to express what data they want to collect.  improved data analysis.

The Future...  Develop IDS that is based on Sebek Data.  Merging this IDS with Systrace to protect systems  Using this IDS to support Honeytokens

Where Can I learn more? 

Where Can I get Sebek  For questions or comments contact Edward Balas  ebalas at iu.edu