SlideShare una empresa de Scribd logo
1 de 17
Presented to fulfill degree requirements for the SANS Technology Institute’s Master of Science
Detecting Malicious Activity on a Budget
Presented by Sean D. Goodwin
GSEC, GCIH, GCIA
Master’s Degree Candidate at the SANS Technology Institute
Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu
Objectives
 Identify a toolset that SMBs can implement to reduce resources
needed to detect malicious activity on hosts
 Minimize cost and time spent analyzing event logs
 Minimize time spent vetting alerts for false-positive events
Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu
Insufficient Detection Resources
 Small and Mid-sized Businesses (SMBs) typically lack detection
capabilities
 Tools
 Training & analyst skills
 Inability to detect malicious actors
 Seeking a “plug-and-play” solution for host-based detection
Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu
Reliance on Existing Tools
 Security Onion
 Syslog
 Wazuh
 Microsoft Sysmon
 SwiftOnSecurity configuration
 Malware Archeology Audit Policy
Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu
Testing for Known Attacks
 MITRE Caldera
 Simulate known attack methods
 PsExec
 Pass-the-Hash
 xCopy (file collection for exfiltration)
Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu
TestCorp Network
Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu
Adversary One: PsExec
5145: AUDIT_SUCCESS
Relative Target Name: PSEXESVC-5501-
WKSTN1-4020-stdout
Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu
Adversary Two: Pass-the-Hash
4624: AUDIT_SUCCESS
Logon Process: NtLmSsp
Logon Type: 3
Key Length: 0
Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu
Adversary Three: xCopy
5142: AUDIT_SUCCESS
Account Name: admin02
Share Name: *Documents
Share Path: C:Usersadmin02Documents
Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu
Results
 Data is available, but detection is not easy
 All three attacks could be identified after the fact
 “Living off the land” makes detection harder
Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu
Custom Alerts
Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu
Custom Alerts
Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu
Custom Alerts
Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu
Custom Alerts
Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu
Custom Alerts
Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu
Custom Alerts
Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu
Summary
 SMBs continue to struggle detecting host-based attacks
 Not a “plug and play” solution for detecting all attacks
 Custom rules will aid in automating recurring log investigations
 Additional data points (network traffic) may help

Más contenido relacionado

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Destacado

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 

Destacado (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

Detecting Malicious Activity on a Budget

  • 1. Presented to fulfill degree requirements for the SANS Technology Institute’s Master of Science Detecting Malicious Activity on a Budget Presented by Sean D. Goodwin GSEC, GCIH, GCIA Master’s Degree Candidate at the SANS Technology Institute
  • 2. Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu Objectives  Identify a toolset that SMBs can implement to reduce resources needed to detect malicious activity on hosts  Minimize cost and time spent analyzing event logs  Minimize time spent vetting alerts for false-positive events
  • 3. Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu Insufficient Detection Resources  Small and Mid-sized Businesses (SMBs) typically lack detection capabilities  Tools  Training & analyst skills  Inability to detect malicious actors  Seeking a “plug-and-play” solution for host-based detection
  • 4. Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu Reliance on Existing Tools  Security Onion  Syslog  Wazuh  Microsoft Sysmon  SwiftOnSecurity configuration  Malware Archeology Audit Policy
  • 5. Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu Testing for Known Attacks  MITRE Caldera  Simulate known attack methods  PsExec  Pass-the-Hash  xCopy (file collection for exfiltration)
  • 6. Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu TestCorp Network
  • 7. Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu Adversary One: PsExec 5145: AUDIT_SUCCESS Relative Target Name: PSEXESVC-5501- WKSTN1-4020-stdout
  • 8. Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu Adversary Two: Pass-the-Hash 4624: AUDIT_SUCCESS Logon Process: NtLmSsp Logon Type: 3 Key Length: 0
  • 9. Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu Adversary Three: xCopy 5142: AUDIT_SUCCESS Account Name: admin02 Share Name: *Documents Share Path: C:Usersadmin02Documents
  • 10. Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu Results  Data is available, but detection is not easy  All three attacks could be identified after the fact  “Living off the land” makes detection harder
  • 11. Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu Custom Alerts
  • 12. Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu Custom Alerts
  • 13. Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu Custom Alerts
  • 14. Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu Custom Alerts
  • 15. Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu Custom Alerts
  • 16. Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu Custom Alerts
  • 17. Master’s Degree Candidate7/8/2019 ‹#›Master’s Degree Candidate www.sans.edu Summary  SMBs continue to struggle detecting host-based attacks  Not a “plug and play” solution for detecting all attacks  Custom rules will aid in automating recurring log investigations  Additional data points (network traffic) may help

Notas del editor

  1. Limited resources means many SMBs cannot afford high-end commercial systems to analyze event logs and provide high quality alerts. Often, the free or low cost solutions do little analysis, leading to hours spent reviewing event logs and chasing down events that are determined to be false positives in the end. This case study sought to use no-cost software, configured with industry-accepted settings to reliably alert on malicious activity via host-based event logs. The alert dashboard should flag suspicious activity worthy of investigation, without overburdening the analyst with false-positives.
  2. According to the 2018 Verizon Data Breach Investigations Report, 50% of breach victims were categorized as small businesses 68% of breaches took “months or longer to discover” To make matters worse, a large percentage of small and medium-sized businesses (SMBs) identify restricted budgets as the greatest challenge to security (Untangle, n.d.). Another significant concern identified in the survey was not having enough staff to “monitor and manage security”. Identifying a toolset that minimizes cost and complexity while providing actionable alerts will enable an SMB to reduce the time required to identify a breach. 2018 Data Breach Investigations Report (Rep.). (n.d.). Verizon. Untangle. (n.d.). 2018 SMB It Security Report. Retrieved from https://www.untangle.com/2018-smb-it-security-report/
  3. This research focused on using existing tools and “best-practice” configurations in the spirt of getting as close as possible to a “plug-and-play” configuration. This would allow an SMB to devote minimal resources to getting a solution implemented and operational, and hopefully providing useful detection data. Security Onion was installed with the default detection rules. To provide the event log data for analysis, Windows Audit Policy was configured following the guidance of Malware Archaeology. To support these event logs, Microsoft Sysinternals Sysmon was also installed, and the SwiftOnSecurity configuration file was used. Security Onion. (n.d.). Retrieved from https://securityonion.net/ Sysmon-Config [Brochure]. (n.d.). Retrieved from https://github.com/SwiftOnSecurity/sysmon-config Sysmon - Windows Sysinternals. (2019, February 18). Retrieved from Wazuh - The Open Source Security Platform. (n.d.). Retrieved from https://wazuh.com/ WINDOWS ATT&CK LOGGING CHEAT SHEET - Win 7 - Win 2012 [Brochure]. (n.d.). Retrieved from https://www.malwarearchaeology.com/cheat-sheets Version 1.0 WINDOWS LOGGING CHEAT SHEET - Win 7 thru Win 2019 [Brochure]. (n.d.). Retrieved from https://www.malwarearchaeology.com/cheat-sheets Version 2.3
  4. Caldera was used to simulate attacks due to the automated nature and ability to test different detection capabilities without significant effort in launching each attack. Three (3) different attacks were chosen for testing, each of which represents real-world attacks as documented in the MITRE ATT&CK Framework. Mitre. (n.d.). Mitre/caldera. Retrieved from https://github.com/mitre/caldera PsExec MITRE ATT&CK: https://attack.mitre.org/software/S0029/ Pass-the-Hash MITRE ATT&CK: https://attack.mitre.org/techniques/T1075/ xCopy (file collection) MITRE ATT&CK: https://attack.mitre.org/techniques/T1039/
  5. The Test Corp network was designed to be a fair representation of a “typical” SMB network. This was a Windows domain network, using Server 2016 and Windows 10 workstations. Important Considerations: Some users ran a low-privilege domain user account with local admin rights to their workstation A Domain Admin had left their account logged in to the DC to simulate a user that closes an RDP connection instead of logging out Network monitoring was not used
  6. This Caldera campaign: Enumerates the domain to which the initial system is connected. Enumerates the privileged accounts of the domain to which the initial system is connected. Checks the system for credentials stored in memory. Executes PsExec using privileged credentials to start a RAT on another domain-joined machine. The details of this event log show that this is classified as priority “notice” by syslog, as this event is a legitimate administration tool being used by a legitimate user. Due to the Audit Policy, events that fall under Object Access – Detailed File Share (Success) (Event ID 5145) will be recorded. This will log any successful mapping of file shares. This can capture plenty of legitimate uses, so to filter this down, an analyst should look for instances of the inclusion of “PSEXECSVC” in the log data. This data can be parsed by user, to aid in identifying suspicious uses. An example of this would be looking for instances of an administrator (admin02) using PsExec on non-typical machines or at non-standard times.
  7. This Caldera campaign: Enumerates the domain to which the initial system is connected. Enumerates the privileged accounts of the domain to which the initial system is connected. Checks the system for credentials stored in memory. Uses the hashed password retrieved from memory to transfer a file to a remote host. Uses the hashed password retrieved from memory to start a Windows service to transfer a file to a remote host. Pass-the-Hash is another example of a legitimate action taken by users that can be leveraged by attackers. David Kennedy provides a set of data fields and values that can be used to filter a large number of authentication logs down to a manageable set for investigation (Kennedy, 2016). Specifically: Windows Event ID 4624 Logon Type = 3 Logon Process = NtLmSsP Key Length = 0 Security ID should be null (Security ID: S-1-0-0)
  8. This Caldera campaign: Enumerates the domain to which the initial system is connected. Enumerates the privileged accounts of the domain to which the initial system is connected. Mounts a remote network share from a second machine. Transfers a CALDERA RAT. Transfers a local file to the mounted network share. This level of filtering is time-consuming, as filters must be written to only show suspicious connections, which are likely to be buried in the white noise of valid file share access on the SMB network.
  9. All of the data needed to investigate these attacks was recorded in the Security Onion device, but alerts were not always generated. This is largely due to the fact that these attacks take advantage of legitimate administrative software, which makes detection harder by “hiding” among valid activities. If your team does not use features/tools – remove them from your environment, and then create custom rules to trigger in the event they are used.
  10. A custom rule can be created to reduce the number of queries needed by an analyst to detect potential incidents. An example of one such custom rule is shown to follow the detection advice for potential abuse of Pass-the-Hash events. Note: this will also flag legitimate uses of pass-the-hash, so additional steps may need to be added to this rule based on your environment.
  11. Our initial trigger is a default rule that searches for a successful Windows logon.
  12. Step One in our custom rule checks for our target Security ID (S-1-0-0). If this string is not found, this custom rule stops processing the log. If this string is found, the log is passed onto the next step.
  13. Step Two searches for our string of “Logon Type: 3”. If this string is not found, this custom rule stops processing the log. If found, the log is passed on to the next step.
  14. Step Three searches for our string of “Logon Process: NtLmSsp”. If this string is not found, this custom rule stops processing the log. If this string is found, the log is passed onto the next step.
  15. The fourth and final step of our custom rule searches for the string “Key Length: 0”. If this string is not found, this custom rule stops processing the log. If this string is found, a level 7 alert is generated.
  16. This project did not result in finding an easy “plug and play” solution that a SMB could implement with little effort and rely on for detection of these specific attacks. This toolset did aid in the investigation efforts after an incident, but this is not enough to satisfy the thesis of this case study, as these SMBs are already struggling with resources, which includes analyst hours. Additional data points, such as those provided via Zeek or the newly implemented DNS logs in Sysmon may provide additional context for alert generation. If you’re interested in discussing this more, I can be reached at: SeanGoodwin@protonmail.ch **** Include a link to your posted research paper. ****