SlideShare una empresa de Scribd logo
1 de 49
Descargar para leer sin conexión
McGyver’s SIEM
                           Building the best free HUD




                                          Wim Remes

Thursday 21 October 2010
What we won’t need today ...




Thursday 21 October 2010
The views and opinions expressed in this presentation are
         those of the presenter and do not reflect those of past,
            current or future employers, associates or clients.




Thursday 21 October 2010
FOSS will never ever provide you with a complete SIEM
                                          solution. Implementing SIEM is hard work and requires
                                       dedication and vision. The premise of this talk is to enable
                                    you to build the skillset required to implement a SIEM solution and
                                 for you to understand your needs using free and open source software.
                           With that skillset you will then be enabled to to make an informed choice, lower the
                                               actual implementation cost and improve ROI.

                                      More importantly, it will teach your technical people how to
                              interpret data, build use cases and apply a common-sensical methodology.

                                        Instead of making them button-clicking drones (again),
                              here’s your chance to make your people the strongest link not the weakest.




Thursday 21 October 2010
Who am I ?

                           Wim Remes

                            Ernst & Young (Belgium)

                            infosecmentors.com

                           eurotrashsecurity.eu




Thursday 21 October 2010
What is this about ?


              1. What is SIEM ?
              2. A common-sensical approach.
              3. Let’s get it on !
              4. Ask away ...




Thursday 21 October 2010
1
                           What is SIEM ?
                               (Definition)




Thursday 21 October 2010
Security Information & Event Management


      Software/Hardware that gathers, analyzes and presents
               information from multiple sources
                    of security-relevant data.
                           (thanks to wikipedia)




Thursday 21 October 2010
SIEM
                                                Log Management
            Security Information & Event Management

                            SEM                                     SIM
                                             ESIM


                            (+ everything your vendor wants it or it’s name to be)


Thursday 21 October 2010
DATA   INFORMATION

Thursday 21 October 2010
Information
                           Knowledge
                               Understanding

                                       Wisdom

Thursday 21 October 2010
1
                           What is SIEM ?
                            (Functionality we want)




Thursday 21 October 2010
Collection


                                    syslog



                              scp



                              ftp




Thursday 21 October 2010
Normalization
                           FW_1 I dropped a packet from x to z on port 80 at 13:22
                                           time : 13:22
                                           action : dropped
                                           source: x
                                           destination : z
                                           port : 80



                           FW_2 rejected x:1234 to z:22 at 1:23pm
                                           time : 13:23
                                           action : dropped
                                           source: x
                                           destination : z
                                           port : 22



Thursday 21 October 2010
Correlation
                       time : 04:22        time : 04:23        time : 04:24       time : 04:25
                       action : failed     action : failed     action : failed    action : success
                       src_ip : a.b.c.d    src_ip : a.b.c.d    src_ip : a.b.c.d   src_ip : a.b.c.d
                       user : craig        user : craig        user : craig       user : craig




                                      Brute-force
                                        attack ?                             Brute-force
                               (look at this in the morning)                   attack ?
                                                                         (wake the f* up now !)



Thursday 21 October 2010
3 base use cases

                                  React Faster

                            Improve Efficiency

                           Automate Compliance


                             Securosis : Understanding and Selecting SIEM/Log Management




Thursday 21 October 2010
Thursday 21 October 2010
2
   common-sensical approach




Thursday 21 October 2010
Architecture




                               FLAT

Thursday 21 October 2010
Architecture




                            HIERARCHICAL

Thursday 21 October 2010
Architecture




                               MESH

Thursday 21 October 2010
integrating SIEM

                             Data Sources




         Data Points
                                              Use Cases

Thursday 21 October 2010
3
                           Let’s get it on !




Thursday 21 October 2010
Our arsenal

                           ossec
                    http://www.ossec.net                    ossim
                                                    http://www.alienvault.com


                             syslog-ng
        http://www.balabit.com/network-security/syslog-ng




                                 davix
                            http://www.secviz.org


                                                        (+ some golden nuggets)

Thursday 21 October 2010
OSSEC
            Host Based Intrusion Detection/Prevention

                     - Log Monitoring
                     - Integrity Control & Host Checking
                     - Policy Monitoring
                     - Real-time alerting & Active Response


                                          Running on :
                             Windows, AIX,Solaris,HP-UX,MacOS & Linux




Thursday 21 October 2010
OSSEC

                           ossec-logcollector

                                agentd                  remoted

                                                        analysisd
                               Client
                                                    maild       execd


                                                        Server



Thursday 21 October 2010
OSSEC
                                                                     SIEM


                                               OSSEC                                  OSSEC
                                                                                                           agentless !



                           syslog




                                                                                                             = OSSEC agent

                   * observation : none of the leading SIEM solutions support OSSEC as an event source out of the box, why ?


Thursday 21 October 2010
OSSEC

                           pre-decoding



                            decoding



                            signatures



Thursday 21 October 2010
OSSEC
                              palo alto threat detection

          Aug 26 13:56:07 192.168.0.5 1,2010/08/26 13:56:07,0003A100245,THREAT,
            vulnerability,8,2010/08/26 13:56:01,10.0.0.1,10.0.0.2,0.0.0.0,
            0.0.0.0,rule2,domainuser,,netbios-ns,vsys1,TAP-ZONE,TAP-ZONE,ethernet1/1,
            ethernet1/1,Logger,2010/08/26 13:56:07,136674,3,137,137,0,0,0x8000,udp,
            alert,"",NetBIOS nbtstat query(31707),any,low,client-to-server




                                   thanks to Xavier Mertens (@xme)
Thursday 21 October 2010
OSSEC
                                  palo alto threat detection
                                          (decoder)

     <-- Custom decoder for PaloAlto Firewalls Threat Events -->
     <decoder name="paloalto-threat">  
       <prematch>^d,dddd/dd/dd dd:dd:dd,.+,THREAT,</prematch> 
       <regex>(d+.d+.d+.d+),(d+.d+.d+.d+),d+.d+.d+.d+,d+.d+.d+.d+,.+,(.*),(.*),.+,alert,.+,(.+),.
     +$</regex>
       <order>srcip,dstip,srcuser,dstuser,extra_data</order>
     </decoder>




                                        thanks to Xavier Mertens (@xme)
Thursday 21 October 2010
OSSEC
                             palo alto threat detection
                                       (rules)
        <group name="syslog,paloalto-threat,">
          <rule id="150000" level="0">
            <decoded_as>paloalto-threat</decoded_as>
            <description>PaloAlto Firewalls Threat Events</description>
          </rule>

          <rule id="150001" level="10">
            <if_sid>150000</if_sid>
            <match>NetBIOs</match>
            <description>Possible NetBIOS attack detected!</description>
          </rule>

          <rule id="150002" level="10">
            <if_sid>150000</if_sid>
            <user>domainadministrator</user>
            <description>Possible attack detected against Administrator!</description>
          </rule>
        </group>


                                  thanks to Xavier Mertens (@xme)
Thursday 21 October 2010
OSSEC
                                          rules

                                                  login




                              failed                          success



                 100 times in
                                                              from unauthorized
                  the last 10
                                                                 ip address !
                   minutes

                           on critical
                            server         wake the f* up !

Thursday 21 October 2010
OSSEC
                                           rules

                                                   login




                              failed                             success



                 100 times in
                                                                  from unauthorized
                  the last 10                  AR                    ip address !
                   minutes

                           on critical
                            server
                                          AR               don’t bother, everything is
                                                                 under control
Thursday 21 October 2010
OSSIM
                                         (includes OSSEC)



                                              front < you are here !
                                               end


                                                        normalization, prioritization,
                                 DB          server      collection, risk assessment,
                                                                correlation, ...




   snort, nessus, Spade, p0f,
  Ntop, arpwatch, OSSEC, ...    sensor       sensor         sensor



Thursday 21 October 2010
OSSIM
                           risk maps




Thursday 21 October 2010
OSSIM
                           compliance reporting




Thursday 21 October 2010
OSSIM
                           event analysis




Thursday 21 October 2010
OSSIM
                           incident response




Thursday 21 October 2010
3
                           Let’s get it on !
                    a few words on data visualization
                        (because it’s important !)



Thursday 21 October 2010
Choosing the right chart !




         http://ebiquity.umbc.edu/blogger/2009/01/25/how-to-choose-the-right-chart-for-your-data/


Thursday 21 October 2010
DAVIX
            Data visualization Live CD

                     - free data processing and visualization tools
                     - Bootable CD
                     - available from http://www.secviz.org
                     - part of “Applied Security Visualization” by
                     Raffael Marty




Thursday 21 October 2010
a firewall log treemap




                                 source : http://www.secviz.org


Thursday 21 October 2010
radial firewall visualization




                           source : http://www.secviz.org


Thursday 21 October 2010
windows event log types




                           source : http://www.secviz.org


Thursday 21 October 2010
1 day of firewall logs




                                 source : http://www.secviz.org

Thursday 21 October 2010
gl-tail




                           http://www.fudgie.org/

Thursday 21 October 2010
gl-tail




                           http://www.fudgie.org/

Thursday 21 October 2010
Recap

                           Focus on approach, not tools

            Use open source to facilitate & learn

                           Integrate in architecture later




Thursday 21 October 2010
Thank you !
                                       interesting people to follow :
                                             @andrewsmhay
                                                 @zrlram
                                             @anton_chuvakin
                                                 @rockyd
                                                   @xme

                                                podcast :
                wremes@gmail.com   LogChat (see Anton’s blog or iTunes)
                   @wimremes                     websites :
                                        http://www.securosis.com
                                          http://www.secviz.org
                                           http://www.ossec.net
                                        http://www.alienvault.com
                                      http://chuvakin.blogspot.com/
                                          http://blog.rootshell.be
                                         http://www.decurity.com



Thursday 21 October 2010

Más contenido relacionado

Destacado

Alienvault 4 Seguridad y riesgo
Alienvault 4 Seguridad y riesgoAlienvault 4 Seguridad y riesgo
Alienvault 4 Seguridad y riesgoa3sec
 
RSA 2015 Realities of Private Cloud Security
RSA 2015 Realities of Private Cloud SecurityRSA 2015 Realities of Private Cloud Security
RSA 2015 Realities of Private Cloud SecurityScott Carlson
 
Neira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf readyNeira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf readyNeira Jones
 
Tactical Edge - How Much Security Do You Really Need?
Tactical Edge - How Much Security Do You Really Need?Tactical Edge - How Much Security Do You Really Need?
Tactical Edge - How Much Security Do You Really Need?Wendy Nather
 
How to Make a Decent PowerPoint
How to Make a Decent PowerPointHow to Make a Decent PowerPoint
How to Make a Decent PowerPointAdam Fowler
 
Break it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure softwareBreak it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure softwareLeigh Honeywell
 
Distributed Denial Of Service Introduction
Distributed Denial Of Service IntroductionDistributed Denial Of Service Introduction
Distributed Denial Of Service Introductionwremes
 
AusCERT - Mikko Hypponen
AusCERT - Mikko HypponenAusCERT - Mikko Hypponen
AusCERT - Mikko HypponenMikko Hypponen
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Scott Carlson
 
Yet Another Dan Kaminsky Talk (Black Ops 2014)
Yet Another Dan Kaminsky Talk (Black Ops 2014)Yet Another Dan Kaminsky Talk (Black Ops 2014)
Yet Another Dan Kaminsky Talk (Black Ops 2014)Dan Kaminsky
 
The InfoSec Avengers
The InfoSec AvengersThe InfoSec Avengers
The InfoSec AvengersTripwire
 
Security Configuration Management for Dummies
Security Configuration Management for DummiesSecurity Configuration Management for Dummies
Security Configuration Management for DummiesTripwire
 
My Bro The ELK
My Bro The ELKMy Bro The ELK
My Bro The ELKTripwire
 
Malware Detection with OSSEC HIDS - OSSECCON 2014
Malware Detection with OSSEC HIDS - OSSECCON 2014Malware Detection with OSSEC HIDS - OSSECCON 2014
Malware Detection with OSSEC HIDS - OSSECCON 2014Santiago Bassett
 
Advanced OSSEC Training: Integration Strategies for Open Source Security
Advanced OSSEC Training: Integration Strategies for Open Source SecurityAdvanced OSSEC Training: Integration Strategies for Open Source Security
Advanced OSSEC Training: Integration Strategies for Open Source SecurityAlienVault
 
RDF and other linked data standards — how to make use of big localization data
RDF and other linked data standards — how to make use of big localization dataRDF and other linked data standards — how to make use of big localization data
RDF and other linked data standards — how to make use of big localization dataDave Lewis
 
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014Santiago Bassett
 

Destacado (19)

Alienvault 4 Seguridad y riesgo
Alienvault 4 Seguridad y riesgoAlienvault 4 Seguridad y riesgo
Alienvault 4 Seguridad y riesgo
 
Solución SIM - SIEM MANQIT
Solución SIM - SIEM MANQITSolución SIM - SIEM MANQIT
Solución SIM - SIEM MANQIT
 
RSA 2015 Realities of Private Cloud Security
RSA 2015 Realities of Private Cloud SecurityRSA 2015 Realities of Private Cloud Security
RSA 2015 Realities of Private Cloud Security
 
Neira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf readyNeira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf ready
 
Tactical Edge - How Much Security Do You Really Need?
Tactical Edge - How Much Security Do You Really Need?Tactical Edge - How Much Security Do You Really Need?
Tactical Edge - How Much Security Do You Really Need?
 
How to Make a Decent PowerPoint
How to Make a Decent PowerPointHow to Make a Decent PowerPoint
How to Make a Decent PowerPoint
 
Break it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure softwareBreak it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure software
 
Distributed Denial Of Service Introduction
Distributed Denial Of Service IntroductionDistributed Denial Of Service Introduction
Distributed Denial Of Service Introduction
 
AusCERT - Mikko Hypponen
AusCERT - Mikko HypponenAusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?
 
Yet Another Dan Kaminsky Talk (Black Ops 2014)
Yet Another Dan Kaminsky Talk (Black Ops 2014)Yet Another Dan Kaminsky Talk (Black Ops 2014)
Yet Another Dan Kaminsky Talk (Black Ops 2014)
 
The InfoSec Avengers
The InfoSec AvengersThe InfoSec Avengers
The InfoSec Avengers
 
Security Configuration Management for Dummies
Security Configuration Management for DummiesSecurity Configuration Management for Dummies
Security Configuration Management for Dummies
 
My Bro The ELK
My Bro The ELKMy Bro The ELK
My Bro The ELK
 
Malware Detection with OSSEC HIDS - OSSECCON 2014
Malware Detection with OSSEC HIDS - OSSECCON 2014Malware Detection with OSSEC HIDS - OSSECCON 2014
Malware Detection with OSSEC HIDS - OSSECCON 2014
 
Advanced OSSEC Training: Integration Strategies for Open Source Security
Advanced OSSEC Training: Integration Strategies for Open Source SecurityAdvanced OSSEC Training: Integration Strategies for Open Source Security
Advanced OSSEC Training: Integration Strategies for Open Source Security
 
RDF and other linked data standards — how to make use of big localization data
RDF and other linked data standards — how to make use of big localization dataRDF and other linked data standards — how to make use of big localization data
RDF and other linked data standards — how to make use of big localization data
 
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
 
SAP Mobile Platform Architecture and Strategy
SAP Mobile Platform Architecture and StrategySAP Mobile Platform Architecture and Strategy
SAP Mobile Platform Architecture and Strategy
 

Más de wremes

Intro to Malware Analysis
Intro to Malware AnalysisIntro to Malware Analysis
Intro to Malware Analysiswremes
 
Crème Brulée :-)
Crème Brulée :-)Crème Brulée :-)
Crème Brulée :-)wremes
 
Vinnes jayson koken
Vinnes jayson kokenVinnes jayson koken
Vinnes jayson kokenwremes
 
Build Your Own Incident Response
Build Your Own Incident ResponseBuild Your Own Incident Response
Build Your Own Incident Responsewremes
 
Secure Abu Dhabi talk
Secure Abu Dhabi talkSecure Abu Dhabi talk
Secure Abu Dhabi talkwremes
 
Collaborate, Innovate, Secure
Collaborate, Innovate, SecureCollaborate, Innovate, Secure
Collaborate, Innovate, Securewremes
 
Data Driven Infosec Services
Data Driven Infosec ServicesData Driven Infosec Services
Data Driven Infosec Serviceswremes
 
SOPA 4 dummies
SOPA 4 dummiesSOPA 4 dummies
SOPA 4 dummieswremes
 
In the land of the blind the squinter rules
In the land of the blind the squinter rulesIn the land of the blind the squinter rules
In the land of the blind the squinter ruleswremes
 
And suddenly I see ... IDC IT Security Brussels 2011
And suddenly I see ... IDC IT Security Brussels 2011And suddenly I see ... IDC IT Security Brussels 2011
And suddenly I see ... IDC IT Security Brussels 2011wremes
 
Blackhat Workshop
Blackhat WorkshopBlackhat Workshop
Blackhat Workshopwremes
 
SIEM brown-bag presentation
SIEM brown-bag presentationSIEM brown-bag presentation
SIEM brown-bag presentationwremes
 
10 things we're doing wrong with SIEM
10 things we're doing wrong with SIEM10 things we're doing wrong with SIEM
10 things we're doing wrong with SIEMwremes
 
Fosdem10
Fosdem10Fosdem10
Fosdem10wremes
 
OSSEC @ ISSA Jan 21st 2010
OSSEC @ ISSA Jan 21st 2010OSSEC @ ISSA Jan 21st 2010
OSSEC @ ISSA Jan 21st 2010wremes
 
Open Source Security
Open Source SecurityOpen Source Security
Open Source Securitywremes
 
Teaser
TeaserTeaser
Teaserwremes
 
Ossec Lightning
Ossec LightningOssec Lightning
Ossec Lightningwremes
 
Brucon presentation
Brucon presentationBrucon presentation
Brucon presentationwremes
 
Pareto chart using Openoffice.org
Pareto chart using Openoffice.orgPareto chart using Openoffice.org
Pareto chart using Openoffice.orgwremes
 

Más de wremes (20)

Intro to Malware Analysis
Intro to Malware AnalysisIntro to Malware Analysis
Intro to Malware Analysis
 
Crème Brulée :-)
Crème Brulée :-)Crème Brulée :-)
Crème Brulée :-)
 
Vinnes jayson koken
Vinnes jayson kokenVinnes jayson koken
Vinnes jayson koken
 
Build Your Own Incident Response
Build Your Own Incident ResponseBuild Your Own Incident Response
Build Your Own Incident Response
 
Secure Abu Dhabi talk
Secure Abu Dhabi talkSecure Abu Dhabi talk
Secure Abu Dhabi talk
 
Collaborate, Innovate, Secure
Collaborate, Innovate, SecureCollaborate, Innovate, Secure
Collaborate, Innovate, Secure
 
Data Driven Infosec Services
Data Driven Infosec ServicesData Driven Infosec Services
Data Driven Infosec Services
 
SOPA 4 dummies
SOPA 4 dummiesSOPA 4 dummies
SOPA 4 dummies
 
In the land of the blind the squinter rules
In the land of the blind the squinter rulesIn the land of the blind the squinter rules
In the land of the blind the squinter rules
 
And suddenly I see ... IDC IT Security Brussels 2011
And suddenly I see ... IDC IT Security Brussels 2011And suddenly I see ... IDC IT Security Brussels 2011
And suddenly I see ... IDC IT Security Brussels 2011
 
Blackhat Workshop
Blackhat WorkshopBlackhat Workshop
Blackhat Workshop
 
SIEM brown-bag presentation
SIEM brown-bag presentationSIEM brown-bag presentation
SIEM brown-bag presentation
 
10 things we're doing wrong with SIEM
10 things we're doing wrong with SIEM10 things we're doing wrong with SIEM
10 things we're doing wrong with SIEM
 
Fosdem10
Fosdem10Fosdem10
Fosdem10
 
OSSEC @ ISSA Jan 21st 2010
OSSEC @ ISSA Jan 21st 2010OSSEC @ ISSA Jan 21st 2010
OSSEC @ ISSA Jan 21st 2010
 
Open Source Security
Open Source SecurityOpen Source Security
Open Source Security
 
Teaser
TeaserTeaser
Teaser
 
Ossec Lightning
Ossec LightningOssec Lightning
Ossec Lightning
 
Brucon presentation
Brucon presentationBrucon presentation
Brucon presentation
 
Pareto chart using Openoffice.org
Pareto chart using Openoffice.orgPareto chart using Openoffice.org
Pareto chart using Openoffice.org
 

Último

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Último (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

McGyver's SIEM -- Building the best free HUD

  • 1. McGyver’s SIEM Building the best free HUD Wim Remes Thursday 21 October 2010
  • 2. What we won’t need today ... Thursday 21 October 2010
  • 3. The views and opinions expressed in this presentation are those of the presenter and do not reflect those of past, current or future employers, associates or clients. Thursday 21 October 2010
  • 4. FOSS will never ever provide you with a complete SIEM solution. Implementing SIEM is hard work and requires dedication and vision. The premise of this talk is to enable you to build the skillset required to implement a SIEM solution and for you to understand your needs using free and open source software. With that skillset you will then be enabled to to make an informed choice, lower the actual implementation cost and improve ROI. More importantly, it will teach your technical people how to interpret data, build use cases and apply a common-sensical methodology. Instead of making them button-clicking drones (again), here’s your chance to make your people the strongest link not the weakest. Thursday 21 October 2010
  • 5. Who am I ? Wim Remes Ernst & Young (Belgium) infosecmentors.com eurotrashsecurity.eu Thursday 21 October 2010
  • 6. What is this about ? 1. What is SIEM ? 2. A common-sensical approach. 3. Let’s get it on ! 4. Ask away ... Thursday 21 October 2010
  • 7. 1 What is SIEM ? (Definition) Thursday 21 October 2010
  • 8. Security Information & Event Management Software/Hardware that gathers, analyzes and presents information from multiple sources of security-relevant data. (thanks to wikipedia) Thursday 21 October 2010
  • 9. SIEM Log Management Security Information & Event Management SEM SIM ESIM (+ everything your vendor wants it or it’s name to be) Thursday 21 October 2010
  • 10. DATA INFORMATION Thursday 21 October 2010
  • 11. Information Knowledge Understanding Wisdom Thursday 21 October 2010
  • 12. 1 What is SIEM ? (Functionality we want) Thursday 21 October 2010
  • 13. Collection syslog scp ftp Thursday 21 October 2010
  • 14. Normalization FW_1 I dropped a packet from x to z on port 80 at 13:22 time : 13:22 action : dropped source: x destination : z port : 80 FW_2 rejected x:1234 to z:22 at 1:23pm time : 13:23 action : dropped source: x destination : z port : 22 Thursday 21 October 2010
  • 15. Correlation time : 04:22 time : 04:23 time : 04:24 time : 04:25 action : failed action : failed action : failed action : success src_ip : a.b.c.d src_ip : a.b.c.d src_ip : a.b.c.d src_ip : a.b.c.d user : craig user : craig user : craig user : craig Brute-force attack ? Brute-force (look at this in the morning) attack ? (wake the f* up now !) Thursday 21 October 2010
  • 16. 3 base use cases React Faster Improve Efficiency Automate Compliance Securosis : Understanding and Selecting SIEM/Log Management Thursday 21 October 2010
  • 18. 2 common-sensical approach Thursday 21 October 2010
  • 19. Architecture FLAT Thursday 21 October 2010
  • 20. Architecture HIERARCHICAL Thursday 21 October 2010
  • 21. Architecture MESH Thursday 21 October 2010
  • 22. integrating SIEM Data Sources Data Points Use Cases Thursday 21 October 2010
  • 23. 3 Let’s get it on ! Thursday 21 October 2010
  • 24. Our arsenal ossec http://www.ossec.net ossim http://www.alienvault.com syslog-ng http://www.balabit.com/network-security/syslog-ng davix http://www.secviz.org (+ some golden nuggets) Thursday 21 October 2010
  • 25. OSSEC Host Based Intrusion Detection/Prevention - Log Monitoring - Integrity Control & Host Checking - Policy Monitoring - Real-time alerting & Active Response Running on : Windows, AIX,Solaris,HP-UX,MacOS & Linux Thursday 21 October 2010
  • 26. OSSEC ossec-logcollector agentd remoted analysisd Client maild execd Server Thursday 21 October 2010
  • 27. OSSEC SIEM OSSEC OSSEC agentless ! syslog = OSSEC agent * observation : none of the leading SIEM solutions support OSSEC as an event source out of the box, why ? Thursday 21 October 2010
  • 28. OSSEC pre-decoding decoding signatures Thursday 21 October 2010
  • 29. OSSEC palo alto threat detection Aug 26 13:56:07 192.168.0.5 1,2010/08/26 13:56:07,0003A100245,THREAT,   vulnerability,8,2010/08/26 13:56:01,10.0.0.1,10.0.0.2,0.0.0.0,   0.0.0.0,rule2,domainuser,,netbios-ns,vsys1,TAP-ZONE,TAP-ZONE,ethernet1/1,   ethernet1/1,Logger,2010/08/26 13:56:07,136674,3,137,137,0,0,0x8000,udp,   alert,"",NetBIOS nbtstat query(31707),any,low,client-to-server thanks to Xavier Mertens (@xme) Thursday 21 October 2010
  • 30. OSSEC palo alto threat detection (decoder) <-- Custom decoder for PaloAlto Firewalls Threat Events --> <decoder name="paloalto-threat">     <prematch>^d,dddd/dd/dd dd:dd:dd,.+,THREAT,</prematch>    <regex>(d+.d+.d+.d+),(d+.d+.d+.d+),d+.d+.d+.d+,d+.d+.d+.d+,.+,(.*),(.*),.+,alert,.+,(.+),. +$</regex>   <order>srcip,dstip,srcuser,dstuser,extra_data</order> </decoder> thanks to Xavier Mertens (@xme) Thursday 21 October 2010
  • 31. OSSEC palo alto threat detection (rules) <group name="syslog,paloalto-threat,"> <rule id="150000" level="0"> <decoded_as>paloalto-threat</decoded_as> <description>PaloAlto Firewalls Threat Events</description> </rule> <rule id="150001" level="10"> <if_sid>150000</if_sid>     <match>NetBIOs</match> <description>Possible NetBIOS attack detected!</description> </rule>   <rule id="150002" level="10"> <if_sid>150000</if_sid>     <user>domainadministrator</user> <description>Possible attack detected against Administrator!</description> </rule> </group> thanks to Xavier Mertens (@xme) Thursday 21 October 2010
  • 32. OSSEC rules login failed success 100 times in from unauthorized the last 10 ip address ! minutes on critical server wake the f* up ! Thursday 21 October 2010
  • 33. OSSEC rules login failed success 100 times in from unauthorized the last 10 AR ip address ! minutes on critical server AR don’t bother, everything is under control Thursday 21 October 2010
  • 34. OSSIM (includes OSSEC) front < you are here ! end normalization, prioritization, DB server collection, risk assessment, correlation, ... snort, nessus, Spade, p0f, Ntop, arpwatch, OSSEC, ... sensor sensor sensor Thursday 21 October 2010
  • 35. OSSIM risk maps Thursday 21 October 2010
  • 36. OSSIM compliance reporting Thursday 21 October 2010
  • 37. OSSIM event analysis Thursday 21 October 2010
  • 38. OSSIM incident response Thursday 21 October 2010
  • 39. 3 Let’s get it on ! a few words on data visualization (because it’s important !) Thursday 21 October 2010
  • 40. Choosing the right chart ! http://ebiquity.umbc.edu/blogger/2009/01/25/how-to-choose-the-right-chart-for-your-data/ Thursday 21 October 2010
  • 41. DAVIX Data visualization Live CD - free data processing and visualization tools - Bootable CD - available from http://www.secviz.org - part of “Applied Security Visualization” by Raffael Marty Thursday 21 October 2010
  • 42. a firewall log treemap source : http://www.secviz.org Thursday 21 October 2010
  • 43. radial firewall visualization source : http://www.secviz.org Thursday 21 October 2010
  • 44. windows event log types source : http://www.secviz.org Thursday 21 October 2010
  • 45. 1 day of firewall logs source : http://www.secviz.org Thursday 21 October 2010
  • 46. gl-tail http://www.fudgie.org/ Thursday 21 October 2010
  • 47. gl-tail http://www.fudgie.org/ Thursday 21 October 2010
  • 48. Recap Focus on approach, not tools Use open source to facilitate & learn Integrate in architecture later Thursday 21 October 2010
  • 49. Thank you ! interesting people to follow : @andrewsmhay @zrlram @anton_chuvakin @rockyd @xme podcast : wremes@gmail.com LogChat (see Anton’s blog or iTunes) @wimremes websites : http://www.securosis.com http://www.secviz.org http://www.ossec.net http://www.alienvault.com http://chuvakin.blogspot.com/ http://blog.rootshell.be http://www.decurity.com Thursday 21 October 2010