SlideShare a Scribd company logo
Piotr Bazydło
Darknet traffic – what can we
learn from nooks and crannies
of the internet
Research and Academic Computer Network NASK
Work performed during SISSDEN project.

Often called as „network telescope”.

An unused (dark) space of IP addresses.

In theory, there should be no network traffic.
What is darknet?
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies of the internet? (Piotr Bazydło)
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies of the internet? (Piotr Bazydło)
In practice, we can see a lot of different packets:

Misconfiguration of network devices/applications.
What is darknet?
Misconfiguration
In practice, we can see a lot of different packets:

Misconfiguration of network devices/applications.

Scanning activities.
What is darknet?
Scanning
Scanning
In practice, we can see a lot of different packets:

Misconfiguration of network devices/applications.

Scanning activities.

Backscatter from DoS attacks.
What is darknet?
DoS backscatter
DoS backscatter
In practice, we can see a lot of different packets:

Misconfiguration of network devices/applications.

Scanning activities.

Backscatter from DoS attacks.

Exploitation attempts.
What is darknet?
Exploitation attempts
In practice, we can see a lot of different packets:

Misconfiguration of network devices/applications.

Scanning activities.

Backscatter from DoS attacks.

Exploitation attempts.

Weird and undefined stuff.
What is darknet?
Our darknet consists of more than 100 000 IP addresses.
Statistically, we:

Receive about 25 000 000 000 packets per month (80% of
packets are TCP packets).

What gives us about 800 000 000 packets per day.

And more than 500 000 of packets per minute.
Some numbers

How to group these packets?

How to analyze them?

How to classify them into events?

How to define whether event is interesting or not?

How to fingerprint responsible actors?
Problems

Detect and analyze DoS attacks.

Fingerprint actors/botnets responsible for specific attacks.

Observe massive scan campaigns and observe responsible actors.

Observe botnets actions.

Forecast exploitation campaigns and even 0-day exploits.

Detect new signatures (Packet Generation Algorithm) in network
traffic.

And other related actions.
Okay, so what can we do with this traffic?
Geographical distribution of packets
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies of the internet? (Piotr Bazydło)
Packets with
SEQ = IP_DST
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies of the internet? (Piotr Bazydło)
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies of the internet? (Piotr Bazydło)
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies of the internet? (Piotr Bazydło)
Let’s fingerprint!
In total, about 45 000 unique IP addresses were fingerprinted (IoC).
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies of the internet? (Piotr Bazydło)
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies of the internet? (Piotr Bazydło)
Change of tactics
We can see that Satori has started to exploit different ports/devices.
Memcached
Memcached
Github 1.3
Tbps DoS
Memcached
Github 1.3
Tbps DoS Reported 1.7
Tbps DoS
Memcached
Github 1.3
Tbps DoS Reported 1.7
Tbps DoS
Day 1 – 20.02 (patient zero?)

Only 3 IP addresses – all located in the UK.

All 3 IP addresses within the same host – DigitalOcean.

Whole scan lasted about 25 minutes.

Only two source ports used (34860 and 43493).

One payload used (stats slabs with some additions).
Day 4 – 23.02

Only 2 IP addresses – UK and Singapore.

UK IP – the same as on 20.02.

Singapore ASN: Alibaba (China) Technology Co., Ltd.

Only two source ports used (34765 and 45931).

Guess what – still the same payload for both IP addresses.

Conclusion – we are probably still dealing with the single
actor.
Day 5 – 24.02 (new kid on the block?)

Only 1 IP addresses – USA.

ASN: AS27176 DataWagon LLC.

Source ports seems to be randomized.

New payload has been used.

Scan lasted longer (about 3 hours).

Looks like we have a new actor.
And so on… Pre-github scanners.

About 60 IP addresses.

Several scanning patterns.
After github DoS scanners.

About 315 IP addresses.

Multiple different scanning
patterns.
How can we define patterns?

Unique payloads types.

Unique source ports generation scheme.

Pairs of characteristics eg. source ports→ payload→
timeline.

And others.
How can we defined patterns?
How can we defined patterns?
Source Port = 22122

One IP from France.

ASN: AS12876 Online S.a.s.
Source Port = 11211

56 IPs from USA.

ASN: AS10439 CariNet

Pretty well organized (scan
performed by many IPs).

The same payload.
Telegram ban in Russia
Indeed – it’s a hit - source port 443
ACK mitigation technique?
Russian watchodg - another attack

On 19.04 – another attack.

Still SYN FLOOD and ACK mitigation technique.

However, we have received ICMP packets signalizing ACK
FLOOD.

Destination Port = 0

SEQ[3:4] = 0 AND ACK[3:4] = 0
PGA

Packet Generation Algorithm (firstly mentioned by 360Netlab).

Tools and malware often utilize different PGA in order to
simplify/fasten packet generation procedure.

We have developed tool for the automatic detection of various
PGA signatures.

Usually, based on some simple operations (bytes swaping,
incrementation, values hardcoding and others).

Usually seen during scanning or DoSing actions. However, PGA was
also spotted during C2 communication.
PGA
Why even bother?

Let’s compare SYN FLOOD packet
generation, while using legit PGA
and XoR.DDoS botnet PGA.

XoR.DDoS PGA:

IP_ID = SPORT,

SEQ[1:2] = IP_ID.
Why even bother?

Let’s compare SYN FLOOD packet
generation, while using legit PGA
and XoR.DDoS botnet PGA.

XoR.DDoS PGA:

IP_ID = SPORT,

SEQ[1:2] = IP_ID.
Assuming botnet with 100 000 machines:
2 400 000 more packets per second!
Mirai – ingenious scanning

SEQ = DST_IP

Faster.

Doesn’t have to store information about sent packets, as it can
only compare IP and ACK of incoming packet.
Is XoR.DDoS easily traceable?

Not really, as in SYN-ACK packets we lose information about
IP_ID used in PGA.

We can compare DPORT and ACK in SYN-ACK packets.

However, we sometimes receive ICMP packets with spoofed
packet included in the payload – in this case, we can identify
whole signature.
Signatures everywhere
SYN FLOOD on IP belonging to Google – full of PGA signatures.
Signatures everywhere
SYN FLOOD on IP belonging to Google – full of PGA signatures.
1. SPORT = SEQ[1:2]
2. SEQ[3:4] = 0xFFFF
3. SPORT = IP_SRC[3:4]
1
2 3
Summary

Darknet is great, but it has its limitations.

We are observing a lot of different attacks, malicious activities
and botnets.

We are especially interested in linking PGA signatures to
particular malware or tools.

Results from darknet traffic analysis + data from other sources
(sandboxes, honeypots and others) = a lot of operational info!
Other people involved in the presented work:
Adrian Korczak (NASK) - development.
Mateusz Goniprowski (NASK) – development.
Krzysztof Lasota – consultations.
Paweł Pawliński (CERT PL/NASK) – consultations.
360Netlab – PGA idea and intelligence.
This project has received funding from the European Union’s Horizon 2020 research and
innovation programme under grant agreement No 700176.
Thank you for your attention.
Twitter: @chudyPB
https://sissden.eu/blog
SISSDEN

More Related Content

PDF
CONFidence 2018: XSS is dead. We just don't get it (Mario Heiderich)
PROIDEA
 
PDF
"Revenge of The Script Kiddies: Current Day Uses of Automated Scripts by Top ...
PROIDEA
 
ODP
BSides Algiers - Nmap Scripting Engine - Hani Benhabiles
Shellmates
 
PDF
Violent python
Xatierlike Lee
 
PDF
"A rootkits writer’s guide to defense" - Michal Purzynski
PROIDEA
 
PDF
"Powershell kung-fu" - Paweł Maziarz
PROIDEA
 
PDF
Lisa14
Dan Lambright
 
PPTX
Эксплуатируем неэксплуатируемые уязвимости SAP
Positive Hack Days
 
CONFidence 2018: XSS is dead. We just don't get it (Mario Heiderich)
PROIDEA
 
"Revenge of The Script Kiddies: Current Day Uses of Automated Scripts by Top ...
PROIDEA
 
BSides Algiers - Nmap Scripting Engine - Hani Benhabiles
Shellmates
 
Violent python
Xatierlike Lee
 
"A rootkits writer’s guide to defense" - Michal Purzynski
PROIDEA
 
"Powershell kung-fu" - Paweł Maziarz
PROIDEA
 
Эксплуатируем неэксплуатируемые уязвимости SAP
Positive Hack Days
 

What's hot (20)

PDF
"Into the Fog The Return of ICEFOG APT" - Chi en (Ashley) Shen
PROIDEA
 
PDF
Code Vulnerabilities & Attacks
Marcus Botacin
 
PDF
Velocity 2011 - Our first DDoS attack
Cosimo Streppone
 
PDF
Laura Garcia - Shodan API and Coding Skills [rooted2019]
RootedCON
 
PDF
[Blackhat EU'14] Attacking the Linux PRNG on Android and Embedded Devices
srkedmi
 
PDF
Использование KASan для автономного гипервизора
Positive Hack Days
 
PDF
Camping: Going off the Rails with Ruby
Eleanor McHugh
 
PDF
Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у...
Positive Hack Days
 
PDF
Nmap for Scriptors
n|u - The Open Security Community
 
PDF
Wtf is happening_inside_my_android_phone_public
Jaime Blasco
 
PDF
DIY Internet: Snappy, Secure Networking with MinimaLT (JSConf EU 2013)
Igalia
 
PPT
Dynamic Port Scanning
amiable_indian
 
PDF
Nmap scripting engine
n|u - The Open Security Community
 
PDF
Beginner's Guide to the nmap Scripting Engine - Redspin Engineer, David Shaw
Redspin, Inc.
 
PDF
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
CanSecWest
 
PPTX
Nmap not only a port scanner by ravi rajput comexpo security awareness meet
Ravi Rajput
 
PDF
HTTP/3 in curl
Daniel Stenberg
 
PDF
Can We Prevent Use-after-free Attacks?
inaz2
 
PDF
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Bishop Fox
 
"Into the Fog The Return of ICEFOG APT" - Chi en (Ashley) Shen
PROIDEA
 
Code Vulnerabilities & Attacks
Marcus Botacin
 
Velocity 2011 - Our first DDoS attack
Cosimo Streppone
 
Laura Garcia - Shodan API and Coding Skills [rooted2019]
RootedCON
 
[Blackhat EU'14] Attacking the Linux PRNG on Android and Embedded Devices
srkedmi
 
Использование KASan для автономного гипервизора
Positive Hack Days
 
Camping: Going off the Rails with Ruby
Eleanor McHugh
 
Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у...
Positive Hack Days
 
Wtf is happening_inside_my_android_phone_public
Jaime Blasco
 
DIY Internet: Snappy, Secure Networking with MinimaLT (JSConf EU 2013)
Igalia
 
Dynamic Port Scanning
amiable_indian
 
Nmap scripting engine
n|u - The Open Security Community
 
Beginner's Guide to the nmap Scripting Engine - Redspin Engineer, David Shaw
Redspin, Inc.
 
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
CanSecWest
 
Nmap not only a port scanner by ravi rajput comexpo security awareness meet
Ravi Rajput
 
HTTP/3 in curl
Daniel Stenberg
 
Can We Prevent Use-after-free Attacks?
inaz2
 
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Bishop Fox
 
Ad

Similar to CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies of the internet? (Piotr Bazydło) (20)

PPTX
Asegúr@IT 7: Playing with Satellites 1.2
Chema Alonso
 
PPT
Ip Spoofing
arpit.arp
 
PDF
Internet census 2012
Giuliano Tavaroli
 
PDF
modul2-footprintingscanningenumeration.pdf
tehkotak4
 
PPT
Modul 2 - Footprinting Scanning Enumeration.ppt
cemporku
 
PPT
Black ops of tcp2005 japan
Dan Kaminsky
 
PPT
Network Security
DURYODHAN MAHAPATRA
 
PPTX
Cyber_Threat_Intelligent_Cyber_Operation_Contest
nkrafacyberclub
 
PDF
Adversary Pattern Analysis - A Journey with APNIC Honeypot
A. S. M. Shamim Reza
 
PPSX
Network security
syed mehdi raza
 
PPT
Network Security fundamentals
Tariq kanher
 
PDF
(130511) #fitalk network forensics and its role and scope
INSIGHT FORENSIC
 
PPT
cyber forensics Footprinting and Scanning.ppt
mcjaya2024
 
PDF
Detection and analysis_of_syn_flood_ddos
Oleh Stupak
 
PDF
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam tests
📡 Sebastien Dudek
 
PDF
SREcon Europe 2016 - Full-mesh IPsec network at Hosted Graphite
HostedGraphite
 
PPT
Week 10 - Packet Sssdssssssssniffers.ppt
fzbshf
 
PDF
Security Onion: Peel Back the Layers of Your Network in Minutes
Great Wide Open
 
PDF
Security Onion: peeling back the layers of your network in minutes
bsidesaugusta
 
Asegúr@IT 7: Playing with Satellites 1.2
Chema Alonso
 
Ip Spoofing
arpit.arp
 
Internet census 2012
Giuliano Tavaroli
 
modul2-footprintingscanningenumeration.pdf
tehkotak4
 
Modul 2 - Footprinting Scanning Enumeration.ppt
cemporku
 
Black ops of tcp2005 japan
Dan Kaminsky
 
Network Security
DURYODHAN MAHAPATRA
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
nkrafacyberclub
 
Adversary Pattern Analysis - A Journey with APNIC Honeypot
A. S. M. Shamim Reza
 
Network security
syed mehdi raza
 
Network Security fundamentals
Tariq kanher
 
(130511) #fitalk network forensics and its role and scope
INSIGHT FORENSIC
 
cyber forensics Footprinting and Scanning.ppt
mcjaya2024
 
Detection and analysis_of_syn_flood_ddos
Oleh Stupak
 
Security PWNing 2018 - Penthertz: The use of radio attacks during redteam tests
📡 Sebastien Dudek
 
SREcon Europe 2016 - Full-mesh IPsec network at Hosted Graphite
HostedGraphite
 
Week 10 - Packet Sssdssssssssniffers.ppt
fzbshf
 
Security Onion: Peel Back the Layers of Your Network in Minutes
Great Wide Open
 
Security Onion: peeling back the layers of your network in minutes
bsidesaugusta
 
Ad

Recently uploaded (20)

PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Doc9.....................................
SofiaCollazos
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
The Future of Artificial Intelligence (AI)
Mukul
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Software Development Methodologies in 2025
KodekX
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Doc9.....................................
SofiaCollazos
 

CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies of the internet? (Piotr Bazydło)

  • 1. Piotr Bazydło Darknet traffic – what can we learn from nooks and crannies of the internet Research and Academic Computer Network NASK Work performed during SISSDEN project.
  • 2.  Often called as „network telescope”.  An unused (dark) space of IP addresses.  In theory, there should be no network traffic. What is darknet?
  • 5. In practice, we can see a lot of different packets:  Misconfiguration of network devices/applications. What is darknet?
  • 7. In practice, we can see a lot of different packets:  Misconfiguration of network devices/applications.  Scanning activities. What is darknet?
  • 10. In practice, we can see a lot of different packets:  Misconfiguration of network devices/applications.  Scanning activities.  Backscatter from DoS attacks. What is darknet?
  • 13. In practice, we can see a lot of different packets:  Misconfiguration of network devices/applications.  Scanning activities.  Backscatter from DoS attacks.  Exploitation attempts. What is darknet?
  • 15. In practice, we can see a lot of different packets:  Misconfiguration of network devices/applications.  Scanning activities.  Backscatter from DoS attacks.  Exploitation attempts.  Weird and undefined stuff. What is darknet?
  • 16. Our darknet consists of more than 100 000 IP addresses. Statistically, we:  Receive about 25 000 000 000 packets per month (80% of packets are TCP packets).  What gives us about 800 000 000 packets per day.  And more than 500 000 of packets per minute. Some numbers
  • 17.  How to group these packets?  How to analyze them?  How to classify them into events?  How to define whether event is interesting or not?  How to fingerprint responsible actors? Problems
  • 18.  Detect and analyze DoS attacks.  Fingerprint actors/botnets responsible for specific attacks.  Observe massive scan campaigns and observe responsible actors.  Observe botnets actions.  Forecast exploitation campaigns and even 0-day exploits.  Detect new signatures (Packet Generation Algorithm) in network traffic.  And other related actions. Okay, so what can we do with this traffic?
  • 25. Let’s fingerprint! In total, about 45 000 unique IP addresses were fingerprinted (IoC).
  • 28. Change of tactics We can see that Satori has started to exploit different ports/devices.
  • 31. Memcached Github 1.3 Tbps DoS Reported 1.7 Tbps DoS
  • 32. Memcached Github 1.3 Tbps DoS Reported 1.7 Tbps DoS
  • 33. Day 1 – 20.02 (patient zero?)  Only 3 IP addresses – all located in the UK.  All 3 IP addresses within the same host – DigitalOcean.  Whole scan lasted about 25 minutes.  Only two source ports used (34860 and 43493).  One payload used (stats slabs with some additions).
  • 34. Day 4 – 23.02  Only 2 IP addresses – UK and Singapore.  UK IP – the same as on 20.02.  Singapore ASN: Alibaba (China) Technology Co., Ltd.  Only two source ports used (34765 and 45931).  Guess what – still the same payload for both IP addresses.  Conclusion – we are probably still dealing with the single actor.
  • 35. Day 5 – 24.02 (new kid on the block?)  Only 1 IP addresses – USA.  ASN: AS27176 DataWagon LLC.  Source ports seems to be randomized.  New payload has been used.  Scan lasted longer (about 3 hours).  Looks like we have a new actor.
  • 36. And so on… Pre-github scanners.  About 60 IP addresses.  Several scanning patterns.
  • 37. After github DoS scanners.  About 315 IP addresses.  Multiple different scanning patterns.
  • 38. How can we define patterns?  Unique payloads types.  Unique source ports generation scheme.  Pairs of characteristics eg. source ports→ payload→ timeline.  And others.
  • 39. How can we defined patterns?
  • 40. How can we defined patterns?
  • 41. Source Port = 22122  One IP from France.  ASN: AS12876 Online S.a.s.
  • 42. Source Port = 11211  56 IPs from USA.  ASN: AS10439 CariNet  Pretty well organized (scan performed by many IPs).  The same payload.
  • 43. Telegram ban in Russia
  • 44. Indeed – it’s a hit - source port 443
  • 46. Russian watchodg - another attack  On 19.04 – another attack.  Still SYN FLOOD and ACK mitigation technique.  However, we have received ICMP packets signalizing ACK FLOOD.  Destination Port = 0  SEQ[3:4] = 0 AND ACK[3:4] = 0
  • 47. PGA  Packet Generation Algorithm (firstly mentioned by 360Netlab).  Tools and malware often utilize different PGA in order to simplify/fasten packet generation procedure.  We have developed tool for the automatic detection of various PGA signatures.  Usually, based on some simple operations (bytes swaping, incrementation, values hardcoding and others).  Usually seen during scanning or DoSing actions. However, PGA was also spotted during C2 communication.
  • 48. PGA
  • 49. Why even bother?  Let’s compare SYN FLOOD packet generation, while using legit PGA and XoR.DDoS botnet PGA.  XoR.DDoS PGA:  IP_ID = SPORT,  SEQ[1:2] = IP_ID.
  • 50. Why even bother?  Let’s compare SYN FLOOD packet generation, while using legit PGA and XoR.DDoS botnet PGA.  XoR.DDoS PGA:  IP_ID = SPORT,  SEQ[1:2] = IP_ID. Assuming botnet with 100 000 machines: 2 400 000 more packets per second!
  • 51. Mirai – ingenious scanning  SEQ = DST_IP  Faster.  Doesn’t have to store information about sent packets, as it can only compare IP and ACK of incoming packet.
  • 52. Is XoR.DDoS easily traceable?  Not really, as in SYN-ACK packets we lose information about IP_ID used in PGA.  We can compare DPORT and ACK in SYN-ACK packets.  However, we sometimes receive ICMP packets with spoofed packet included in the payload – in this case, we can identify whole signature.
  • 53. Signatures everywhere SYN FLOOD on IP belonging to Google – full of PGA signatures.
  • 54. Signatures everywhere SYN FLOOD on IP belonging to Google – full of PGA signatures. 1. SPORT = SEQ[1:2] 2. SEQ[3:4] = 0xFFFF 3. SPORT = IP_SRC[3:4] 1 2 3
  • 55. Summary  Darknet is great, but it has its limitations.  We are observing a lot of different attacks, malicious activities and botnets.  We are especially interested in linking PGA signatures to particular malware or tools.  Results from darknet traffic analysis + data from other sources (sandboxes, honeypots and others) = a lot of operational info!
  • 56. Other people involved in the presented work: Adrian Korczak (NASK) - development. Mateusz Goniprowski (NASK) – development. Krzysztof Lasota – consultations. Paweł Pawliński (CERT PL/NASK) – consultations. 360Netlab – PGA idea and intelligence.
  • 57. This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 700176. Thank you for your attention. Twitter: @chudyPB https://sissden.eu/blog SISSDEN