Slide - 1Dan VanBelleghemSenior Information Assurance Engineer - SRAPenetration TestingSecurity TrainingSecurity Readiness ReviewsIncident ResponseSecurity AssessmentsDirector of Security Programs - Network ForensicsSecurity Assistance Teams for US DoD - BAHSecurity Audits and Assessments for Fortune 500 - D&T
Slide - 2Network Mystery QuizDo you know:What is happening on your network?What users are doing?If users are compliant with policy?If users’ internal and external network communications affect the enterprise security posture?If anomalous behavior is detectable on the network?Why network diagrams are not enough?
Slide - 3ObjectivesThe objectives of this session are to provide an overview of the following:Examples of network activities that are often overlookedTechniques used in solving mysteriesBenefits from audit & monitoringRecommendations for performing audit & monitoring
Slide - 4ObservationsThe following observations will provide examples of network security issues that could have been discovered with good audit and monitoring practices in place
Discovery, analysis and lessons learned will be discussed for each of the following examples:
Uncovering DDOS agents
Harassing e-mails
Rogue servers and applications
System administrator misuseSlide - 5DDOS Agent DiscoveryBackgroundEnterprise network solution company
Firewall policy allowed DNS traffic
Firewalls managed in Colorado
DNS servers managed locally at other national officesSlide - 6DDOSvictim.comLocal OfficesINTERNETFPermit DNSvictim.comHQManaged by local office staffManaged by network operationsSecondary DNSPrimary DNSLocal DNS
Slide - 7DDOS victim.comLocal OfficesAttackerINTERNETFvictim.comHQDNS service exploited
Root access gained
Trust relationships exploited
DDOS agent plantedSecondary DNSPrimary DNSLocal DNS
Slide - 8DDOS Agent DiscoveryTechniques used for discoveryNetwork traffic analysis
“unusual traffic”
Firewall logs reviewed
DNS server and OS logs reviewedSlide - 9DDOS Agent DiscoveryLessons learnedFirewall logs not reviewed
DNS server (OS and application) logs not reviewed
IP spoofing not monitored internally
Integrity checking not performedSlide - 10DDOS Agent DiscoveryRecommendationsPerform regular log review of network service systems (DNS, Firewall, Mail, etc)
Automate
Outsource
Monitor and review network traffic patterns and trends
Network monitors
Network device logs
Perform host integrity checking for critical assets
Tripwire
System profile checkersSlide - 11Harassing E-mailsBackgroundEmployee was receiving harassing e-mails from an anonymous external source (e.g., hotmail)
An internal employee was suspected but could not be confirmedSlide - 12Harassing E-mailsTechniques used for discoveryCollected network traffic using a packet snifferSearched traffic for hosts going to and from hotmail.comOnce an originating IP address was found, then searched for user name that sent anonymous e-mailSpecifically looked for CGI postings of the message - this was the proof to determine the person who sent it
Slide - 13
Slide - 14
Slide - 15
Slide - 16Harassing E-mails (cont.)
Slide - 17
Slide - 18
Slide - 19
Slide - 20
Slide - 21
Slide - 22Harassing E-mailsRecommendationsImplement e-mail policy
Monitor for non-production e-mail traffic
Develop monitoring scripts or procure commercial toolsSlide - 23BackgroundUsers install unauthorized devices, “stowaways,” on the production network
Enabling write access on anonymous ftp services for convenience
Users installing unauthorized services (e.g., web servers) to the production networkRogue Servers/Applications

More Related Content

PDF
Cissp cbk final_exam-answers_v5.5
PDF
Slide Deck CISSP Class Session 4
PPTX
Slide Deck – Session 11 – FRSecure CISSP Mentor Program 2017
PPTX
Ethical Hacking n VAPT presentation by Suvrat jain
PDF
Slide Deck Class Session 11 – FRSecure CISSP Mentor Program
PDF
Penetration Testing Execution Phases
PDF
Slide Deck CISSP Class Session 6
PPTX
Slide Deck CISSP Class Session 5
Cissp cbk final_exam-answers_v5.5
Slide Deck CISSP Class Session 4
Slide Deck – Session 11 – FRSecure CISSP Mentor Program 2017
Ethical Hacking n VAPT presentation by Suvrat jain
Slide Deck Class Session 11 – FRSecure CISSP Mentor Program
Penetration Testing Execution Phases
Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 5

What's hot (20)

PPTX
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
PDF
Slide Deck CISSP Class Session 7
PPTX
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
PPTX
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
PDF
Trustport - Roman Veleba
PPTX
Incident response
PPTX
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017
PDF
Slide Deck Class Session 10 – FRSecure CISSP Mentor Program
PPTX
How to Prepare for the CISSP Exam
PPT
Data Mining and Intrusion Detection
PDF
Ciss previsionnotes
PDF
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
PDF
AI & ML in Cyber Security - Why Algorithms are Dangerous
PDF
The Finest Penetration Testing Framework for Software-Defined Networks
PDF
Fundamentals of-information-security
PPTX
Purple Teaming - The Collaborative Future of Penetration Testing
PDF
call for papers, research paper publishing, where to publish research paper, ...
PPTX
Intro to Network Vapt
PDF
Optimized Intrusion Detection System using Deep Learning Algorithm
PDF
Introduction to penetration testing
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck CISSP Class Session 7
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Trustport - Roman Veleba
Incident response
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017
Slide Deck Class Session 10 – FRSecure CISSP Mentor Program
How to Prepare for the CISSP Exam
Data Mining and Intrusion Detection
Ciss previsionnotes
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
AI & ML in Cyber Security - Why Algorithms are Dangerous
The Finest Penetration Testing Framework for Software-Defined Networks
Fundamentals of-information-security
Purple Teaming - The Collaborative Future of Penetration Testing
call for papers, research paper publishing, where to publish research paper, ...
Intro to Network Vapt
Optimized Intrusion Detection System using Deep Learning Algorithm
Introduction to penetration testing
Ad

Similar to Network Security Forensics (20)

PDF
Preventing The Next Data Breach Through Log Management
PPTX
Intrusion detection system
PPTX
Information Security: Advanced SIEM Techniques
PDF
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
ODP
Unlock Security Insight from Machine Data
PDF
Advanced Threats and Lateral Movement Detection
PPT
Identifying and Using Network Hand Tools
PDF
Lecture26 cc-security1
PPTX
MAD: A Middleware Framework for Multi-Step Attack Detection
PDF
How to Spot Intruders in Network Security.pptx (1).pdf
PPT
Security Capability Model - InfoSec Forum VIII
PDF
Break IT Down by Josh Smith
PDF
CNIT 50: 1. Network Security Monitoring Rationale
PPTX
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
PPTX
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
PDF
Network Security Through Data Analysis From Data To Action 2nd Edition Michae...
PPTX
Blitzing with your defense bea con
PPTX
Insider Threat
PDF
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
PPTX
Janitor vs cleaner
Preventing The Next Data Breach Through Log Management
Intrusion detection system
Information Security: Advanced SIEM Techniques
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
Unlock Security Insight from Machine Data
Advanced Threats and Lateral Movement Detection
Identifying and Using Network Hand Tools
Lecture26 cc-security1
MAD: A Middleware Framework for Multi-Step Attack Detection
How to Spot Intruders in Network Security.pptx (1).pdf
Security Capability Model - InfoSec Forum VIII
Break IT Down by Josh Smith
CNIT 50: 1. Network Security Monitoring Rationale
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
Network Security Through Data Analysis From Data To Action 2nd Edition Michae...
Blitzing with your defense bea con
Insider Threat
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
Janitor vs cleaner
Ad

Network Security Forensics