Baanboard.com

Go Back   Baanboard.com > News > RSS Newsfeeds > Categories

User login

Frontpage Sponsor

Main

Poll
For ERP LN feature pack upgrade, what method of install are you using?
Installation Wizard into existing VRC
44%
Installation Wizard into new VRC
25%
Manual into existing VRC
6%
Manual into new VRC
25%
Total votes: 16

Baanboard at LinkedIn


Reference Content

 
Security

Gunter Ollmann: Time to Squish SQL Injection

Security Focus - 1 hour 5 min ago
Time to Squish SQL Injection
Categories: Security

Mark Rasch: Lazy Workers May Be Deemed Hackers

Security Focus - 1 hour 5 min ago
Lazy Workers May Be Deemed Hackers

>> Advertisement <<
Can you answer the ERP quiz?
These 10 questions determine if your Enterprise RP rollout gets an A+.
http://www.findtechinfo.com/as/acs?pl=781&ca=909
Categories: Security

Adam O'Donnell: The Scale of Security

Security Focus - 1 hour 5 min ago
The Scale of Security
Categories: Security

Mark Rasch: Hacker-Tool Law Still Does Little

Security Focus - 1 hour 5 min ago
Hacker-Tool Law Still Does Little
Categories: Security

Infocus: Enterprise Intrusion Analysis, Part One

Security Focus - 1 hour 5 min ago
Enterprise Intrusion Analysis, Part One
Categories: Security

Infocus: Responding to a Brute Force SSH Attack

Security Focus - 1 hour 5 min ago
Responding to a Brute Force SSH Attack
Categories: Security

Infocus: Data Recovery on Linux and <i>ext3</i>

Security Focus - 1 hour 5 min ago
Data Recovery on Linux and <i>ext3</i>

>> Advertisement <<
Can you answer the ERP quiz?
These 10 questions determine if your Enterprise RP rollout gets an A+.
http://www.findtechinfo.com/as/acs?pl=781&ca=909
Categories: Security

Infocus: WiMax: Just Another Security Challenge?

Security Focus - 1 hour 5 min ago
WiMax: Just Another Security Challenge?
Categories: Security

More rss feeds from SecurityFocus

Security Focus - 1 hour 5 min ago
News, Infocus, Columns, Vulnerabilities, Bugtraq ...
Categories: Security

ISC Stormcast For Thursday, June 22nd 2017 https://isc.sans.edu/podcastdetail.html?id=5554, (Thu, Jun 22nd)

SANS Internet Storm Center - 2 hours 49 min ago
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Categories: Security

Obfuscating without XOR, (Thu, Jun 22nd)

SANS Internet Storm Center - 7 hours 18 min ago

Malicious files are generated and spread over the wild Internet daily (read: hourly). The goal of the attackers is to use files that are:

  • not know by signature-based solutions
  • not easy to read for the human eye

Thats why many obfuscation techniques existto lure automated tools and security analysts. In most cases, its just a question of time to decode the obfuscated data. A classic technique is to use the XOR cypher[1]. This is definitively not a new technique(see a previous diary[2] from 2012) but it still heavily used. And many tools can automate the search for XORd string. Viper, the binary analysis and management framework, is a good example. It can scan for XOR padding:5px 10px"> viper tmpnYaBJs xor -a [*] Searching for the following strings: - This Program - GetSystemDirectory - CreateFile - IsBadReadPtr - IsBadWritePtrGetProcAddress - LoadLibrary - WinExec - CreateFileShellExecute - CloseHandle - UrlDownloadToFile - GetTempPath - ReadFile - WriteFile - SetFilePointer - GetProcAddr - VirtualAlloc - http [*] Hold on, this might take a while... [*] Searching XOR [!] Matched: http with key: 0x74 [*] Searching ROT viper tmpnYaBJs padding:5px 10px"> var bcacfdfaebbbfDeck = new ActiveXObject(dbdbfaeefccaee(+L+^%^LK%,LpL(KeL^%z%+%u%u

I took some time to check how the obfuscation was performed. How does it work?

The position of each character is searched in the $data variable and decreased by one. Then the character at this position is returned to build a string of hexcodes. Finally, the hex codes are converted into the final string. Example with the two first characters of the example above:

$data =SYOm7L-3^ojXtMA2Kbk_FN)GB.$1PJgR

  • + is located at pos 20, search the character at position 19 (20 - 1): 5
  • L is located at pos 5, search the character at position 4 (5 - 1): 7
  • 57 is the hex code for W padding:5px 10px"> // Convert a string from hex chars to string. // In: 575363726970742E7368656C6C // Out: WScript.shell var bufferout = i } // Convert the obfuscate string by shifting by 1 char function deobfuscate(string,step){ var data = SYOm7L-3^ojXtMA2Kbk_FN)GB.$1PJgR var bufferout = i if (p2 padding:5px 10px"> var s = deobfuscate(%zL(L(Lp^2KNKN^P^z^+Ke^P^+^(Ke^+^KKe^P^p^PKN%u%N%L%NKe%,%0%L padding:5px 10px"> hxxp://185.154.52.101/logo.img

    And when you understand how to deobfuscate, it padding:5px 10px"> function obfuscate(string,step){ var data = SYOm7L-3^ojXtMA2Kbk_FN)GB.$1PJgR var bufferout = i j if (p2 if (p2==l2) padding:5px 10px"> var foo = obfuscate(https://isc.sans.edu padding:5px 10px"> %zL(L(LpL^^2KNKN%,L^%^KeL^%P%eL^Ke%+%(L+

    Of course, the method analyzedhere is a one shot! The number of ways to obfuscate data is unlimited...

    [1]https://en.wikipedia.org/wiki/XOR_cipher
    [2]https://isc.sans.edu/forums/diary/Decoding+Common+XOR+Obfuscation+in+Malicious+Code/13354

    Xavier Mertens (@xme)
    ISC Handler - Freelance Security Consultant
    PGP Key

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Categories: Security

It has been a month and a bit how is your new patching program holding up?, (Wed, Jun 21st)

SANS Internet Storm Center - June 21, 2017 - 2:57pm

Last months entertainment for many of us was of course the wannacray ms17-010 update. For some of you it was a relaxing time just like any other month. Unfortunately for the rest of us it was a rather busy period trying to patch systems that in some cases had not been patched in months or even years. Others discovered that whilst security teams have been saying you want to open what port to the internet? firewall rules were approved allowing port 445 and in other cases even 139. Another group of users discovered that the firewall that used to be enabled on their laptop was no longer enabled whilst connected to the internet. Anyway, that was last month. On the back of it we all made improvements to our vulnerability management processes. You did, right?

Ok, maybe not yet, people are still hurting. However, when an event like this happens it is a good opportunity to revisit the process that has failed, identify why it went wrong for you and make improvements. Not the sexy part of security, but we cant all be threathunting 24/7.

If you havent started yet or the new process isnt quite where it needs to be where do you start?
Maybe start with how fast or slow should you patch? Various standards suggest that you must be able to patch critical and high risk issues within 48 hours. Not impossible if you approach it the right way, but you do need to have the right things in place to make this happen.
You will need:

  • Asset information - you need to know what you have, how critical it is and of course what is installed on it. Look at each system you have, evaluate the confidentiality, integrity and availability requirements of the system and categorise the systems into critical and less critical systems to the organisation.
  • Vulnerability/Patch information - you need information from vendors, open source and commercial alike. Subscribe to the various lists, get a local RSS feed, etc. Vendors are generally quite keen to let you known once they have a patch.
  • Assessment method The information received needs to be evaluated. Review the issue. Are the systems you have vulnerable? Are those systems that are vulnerable flagged as important to the business? If the answer is yes to both questions (you may have more), then they go on the must patch now list. The assessment method should contain a step to document your decision. This will keep auditors happy, but also allows you to better manage risk.
  • Testing Regime Speed in patching processes comes from the ability to test the required functionality quickly and the reliability of those tests. Having standard tests or even better automated tests can speed up the validation process allowing patching to continue.

Once you have the four core ingredients you are now in a position to know what vulnerabilities are present and hopefully patchable. You know the systems that are most affected by them and have the highest level of risk to the organisation.

The actual mechanics of patching is individual to each organisation. Most of us however will be using something like WSUS, SCCM or Third-party patching products and/or their linux equivalents like satellite, puppet, chef, etc. In the tool used, define the various categories of systems you have, reflecting their criticality. Ideally have a test group for each, Dev or UAT environments if you have them can be great for this. I also often create a The Rest group. This category contains servers that have a low criticality and can be rebooted without much notice. For desktops, I often create a test group, a pilot group and a group for all remaining desktops. The pilot group has representative of most if not all types of desktops/notebooks used in the organisation.

When patches are released they are evaluated and if they are to be pushed they are released to the test groups as soon as possible. Basic functionality and security testing is completed to make sure that patches are not causing issues. Depending on the organisation we often push DEV environments first, then UAT after a cycle of testing. Within a few hours of being released you should have some level of confidence that the patches are not going to cause issues. Your timezone may even help you here. In AU for example patches are often released during the middle of our night. Which means in other countries they may already have encountered issues and reported them (keep an eye the ISC site) before we start patching.
The next step is to release the patch to The Rest group and for desktops to the pilot group. Again, testing is conducted to get confidence the patch is not causing issues. Remember these are low criticality servers and desktops. Once happy start scheduling the production releases. Post reboot run the various tests to restore confidence in the system and you are done.

The biggest challenge in the process is getting a maintenance window to reboot. The best defence against having your window denied is to schedule them in advance and get the various business areas to agree to them. Patch releases are pretty regular so they can be scheduled ahead of time. I like working one or even two years in advance.

The second challenge is the testing of systems post patching. This will take the most prep work. Some organisations will need to get people to test systems. Some may be able to automate tests. If you need people, organise test teams and schedule their availability ahead of time to help streamline your process. Anything that can be done to get confidence in the patched system faster will help meet the 48 hour deadline.

If going fast is too daunting, make the improvements in baby steps. If you generally patch every 3 months. Implement your own ideas, or some of the above and see if you can reduce it to two months. Once that is achieved try and reduce it further.

If you have your own thoughts on how people can improve their processes, or you have failed (we can all learn from failures) then please share. The next time there is something similar to wannacry we all want to be able to say sorted that ages ago.

Mark H - Shearwater

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Categories: Security

ISC Stormcast For Wednesday, June 21st 2017 https://isc.sans.edu/podcastdetail.html?id=5552, (Wed, Jun 21st)

SANS Internet Storm Center - June 21, 2017 - 2:40am
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Categories: Security

Windows Error Reporting: DFIR Benefits and Privacy Concerns, (Tue, Jun 20th)

SANS Internet Storm Center - June 20, 2017 - 2:00pm

This please let us know.

  1. Introduction

Recently, I was confronted with a scenario where a very suspicious Windows pop-up message was shown to a specific user on a corporate network. It was a kind of Yes/No default Windows Dialog Box that, although I cannot reveal the message content, I can assure you that it was in the context of what the user was doing on his computer at that moment.

As we were dealing with a major incident on the same network, our first assumption was that someone had compromised that machine and was controlling it remotely through a reverse connection - the type of situation that urges for a rapid response.

However, after a few hours hunting for any piece of malware on that machine, including operating system events, network connections, user Internet history, e-mail attachments, external devices and so on, nothing interesting was found. In fact, the evidence came from a source Ive never imagined could help me on an incident response. It came from Windows Error Reporting (WER), as described in this diary.

  1. The subtle clue

As no malware evidence was found, we decide to get back to the drawing board, and after looking carefully at the strange message, I noticed that, whatever application had been used by the attacker to present the message, it has hanging. The classic (Not Responding) width:332px" />

Figure 1 Not Responding application sample

By default, when an application hangs or crashes on a Windows system, the Windows Error Reporting (WER) mechanism [1] automatically gathers detailed debug information including the application name, loaded modules and, more important, a heap dump, which comprehends the data that was loaded in the application at the time that the memory was collected. All this data is reported to Microsoft that, in turn, may provide users with solutions for known problems.

As the application used to send the strange message has hanged, the chances are that we could find generated WER artifacts do analyze and track the supposed intrusion. Thus, our next step was looking for them.

  1. Collecting WER information

To demonstrate how we found and analyzed WER files related to that hanged application without exposing real incident information, weve created a similar scenario and used it for this analysis.

  1. Crashing an application

Using a Windows 10 default installation machine in our lab, the first thing was forcing an application to crash. For this purpose, we used the text editor application Notepad++ as the application to be crashed and Process Explorer tool [2] as the means to cause it.

For further analyses purposes, we typed a simple text on the editor, as seen in Figure 2 and, through the Process Explorer, started killing aleatory ntdll.dll width:566px" />

Figure 2 width:366px" />

Figure 3 Killing application threads

It didn width:401px" />

Figure 4 width:517px" />

Figure 5 Application event log evidence

Note that the event ID for crashed application has the value 1000 while for hangeing applications, the value is 1002.

The other evidence are the WER files themselves which, depending on the Windows version are generated in different paths and can be found through different control panel menu options. On Windows 7, for example, WER settings and reporting access can be found through Action Center and on Windows 8 through Problem Reports and Solutions.

On Windows 10, used in our demonstration scenario, the WER menu can be opened through the menu Control Panel - System and Security - Security and Maintenance - width:478px" />

Figure 6 Looking for the specific problem report

width:531px" />

Figure 7 WER problem details

Another way to find WER files is going directly path they are created on the disk. On Windows 10, WER report files can be reached through the path: %SystemDrive%\ProgramData\Microsort\Windows\WER width:567px" />

Figure 8 width:567px" />

Figure 9 WER file list

  1. Analyzing the evidence

Now, making a parallel to the real incident case, when we searched for event log evidence, we could find that an application hanged on that machine moments before the message screenshot time. Better than that, we also could find the WER files associated to that application hang!

You may be thinking right now how I could find WER files in the machine as they are deleted from disk after being sent to Microsoft. The point is: they weren

  • The WER report wasn width:523px" />

    Figure 10 Problem uploading WER during the MITM attack

    Heading back to the real scenario, with WER files in our hands, we could discover the name of the possible application that generated that suspicious pop-up message and, by inspecting the heap dump file we could confirm it. It turns out that we found exactly the pop-up message content into the memory dump file using a simple strings command although there exist an orthodox way to inspect and debug those files using Windbg [4].

    Employing the same strings width:567px" />

    Figure 11 Evidence found

    1. Final words

    As we could see, in addition to helping Windows users to deal with application crashes and hangs, this case demonstrated that WER can be extremely useful for post-mortem analysis. Depending on the scenario, its like having an application memory dump to analyze as part of your DFIR activities without having collected it during the incident.

    On the other hand, it raises some concerns regarding data leaking through the memory dump files. Considering that you have consented to send those information to Microsoft (remembering or not that you have done that [5]), there exists the possibility of those content to be accessed by third parts, like intruders that escalated the privileges on the targeted machine or simple by that new employee that is now using your machine and you thought that removing your user home directory could be enough.

    Things may get worse if we consider that the crashed or hanged application is a password manager, for example. We did experiments on a group of them and privately reported those that allowed us to recover clear text passwords from WER memory dumps. The Enpass password manager has already published a security bulletin and a new version fixing the vulnerability [6] for which the CVE 2017-9733 [7] has been associated.

    For Windows application developers in general, to prevent sensitive information exfiltration from crash dumps, we recommend either completely disabling WER triggering by using AddERExcludedApplication or WerAddExcludedApplication functions [8] or by excluding the memory region that may contain sensitive information using the function WerRegisterExcludedMemoryBlock [9] (available only on Windows 10 and later).

    A more comprehensive solution should be provided by Windows itself that could protect report files by encrypting them - at least the memory dumps. Interestingly, there is a patent from IBM exactly about protecting application core dump files [10]. Today, the encryption is employed only while sending WER report files to Microsoft through SSL connections.

    Regarding our case, in the end, fortunately realized that there was no violation or intrusion on that machine. It was, indeed, a misuse of a legitimate tool by an internal employee that made us learn a bit more the importance of WER files to digital forensics and users privacy.

    1. References

    [1] https://msdn.microsoft.com/en-us/library/windows/desktop/bb513613(v=vs.85).aspx

    [2] https://technet.microsoft.com/en-us/sysinternals/processexplorer.aspx

    [3] https://msdn.microsoft.com/pt-br/library/windows/desktop/bb513638(v=vs.85).aspx

    [4] https://blogs.msdn.microsoft.com/johan/2007/11/13/getting-started-with-windbg-part-i/

    [5] https://privacy.microsoft.com/en-US/windows-10-feedback-diagnostics-and-privacy

    [6] https://www.enpass.io/blog/an-update-on-the-reported-vulnerability-regarding-wer-in-enpass-for-windows-pc/

    [7] https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9733

    [8] https://msdn.microsoft.com/en-us/library/windows/desktop/bb513635(v=vs.85).aspx

    [9] https://msdn.microsoft.com/en-us/library/windows/desktop/mt492587(v=vs.85).aspx

    [10] https://www.google.com/patents/US20090172409?lipi=urn%3Ali%3Apage%3Ad_flagship3_messaging%3BELSwd1O0TB2NSjH9aPn1BA%3D%3D

    Renato Marinho

    Morphus Labs | linkedin.com/in/renatomarinho | @renato_marinho

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
  • Categories: Security

    ISC Stormcast For Tuesday, June 20th 2017 https://isc.sans.edu/podcastdetail.html?id=5550, (Tue, Jun 20th)

    SANS Internet Storm Center - June 20, 2017 - 1:45am
    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
    Categories: Security

    As Your Admin Walks Out the Door .., (Mon, Jun 19th)

    SANS Internet Storm Center - June 20, 2017 - 1:40am

    One of our readers (thanks Gebhard) mailed us a link to an article on what the press is apparently now calling a Revenge Wipe - a system administrator who has left the organization, and as a last hurrah, deletes or locks out various system or infrastructure components.

    In this case, the organization was a hosting company in the Netherlands (Verelox). In the case of cloud providers, a disgruntled admin may have access to delete entire networks, hosts, and associated infrastructure. In the case where its a smaller CSP, the administrator may also have access to delete customer servers and infrastructure as well. In Vereloxs situation, that seems to have been the case (from their press release at least)

    The classic example of this is the City of San Francisco in 2008), where their main administrator (Terry Childs) refused to give up the credentials to their FiberWAN Network Infrastructure, even after being detained by law enforcement (he eventually did give the credentials directly to the Mayor). Ive listed several other examples in the references below - note that this was not a new thing even in 2008 - this has been a serious consideration for as long as weve had computers.

    So, how should an organization protect themselves from a situation like this?

    Back up Job Responsibilities:

    Know who has access to what. Have multiple people with access to each system. Having any system with only a single administrator can turn into a real problem in the future. DOCUMENT things. BACKUP your configurations in addition to your data.

    Use Authorization:

    It can be difficult, but wherever possible use Admin accounts with only the rights required. Its very easy to build an every Admin has all rights infrastructure. Its likely more difficult to build a why does the VMware admin need the rights to delete an entire LUN on the San config but its important to think along those lines wherever you can.

    Use a back-end directory for authentication to network infrastructure:

    What this often means is that folks implement NPS (RADIUS) services in Active Directory. This allows you to audit access and changes during regular production, and also allows you to deactivate network administrator accounts in one place

    Where you can, use Two Factor Authentication

    Use 2FA whereever possible, this makes password attacks much less of a threat. 2FA is a definite easy implement for VPN and other remote access, also for administration of almost all Cloud Services for your organization.

    Just as a side note - I am still seeing that many smaller CSPs have not gone forward with 2FA - if you are looking at any new Cloud services, adding Two Factor Authentication as a must-have is a good way to go.

    Deal with Stale Accounts:

    Keep track of accounts that are not in use. I posted a powershell script for this (targeting AD) in a previous story == https://isc.sans.edu/diary/The+Powershell+Diaries+-+Finding+Problem+User+Accounts+in+AD/19833

    Deal with Service Accounts:

    Service accounts are used in Windows and other operating system to run things like Windows Services, or to allow scripts to login to various systems as they run. The common situation is that these service accounts have Domain Administrator or local Root access (depending on the OS).

    Know in your heart that the person you are protecting the organization from is the same person who likely created one or all of these accounts.

    Be sure that these service accounts are documented as they are created, so that if a mass change is required it can be done quickly.

    Know that these use a central directory (such as AD or LDAP), so that if you need to change them or disable them, there is one place to go.

    I posted a PowerShell script in a previous story to inventory service accounts in AD == https://isc.sans.edu/forums/diary/Windows+Service+Accounts+Why+Theyre+Evil+and+Why+Pentesters+Love+them/20029/

    Restrict Remote Access:

    Be sure that your administrative accounts dont have remote access (VPN, RDP Gateway, Citrix CAG etc). This falls into the same category as dont allow Administrators to check mail or browse the internet while logged in as a Domain Admin or root privileges.

    On the day:

    On the day of termination, be sure that all user accounts available to our administrator are deactivated during the HR interview. If youve used a central authentication store this should be easy (or at least easier)

    Also force a global password change for all users (your departing admin has probably done password resets for many of your users), and if you have any stale accounts simply deactivate those.

    For Service accounts, update the passwords for all of these. This is a good time to be sure that you arent following a pattern for these passwrods - use long random strings for these (L33t speak versions of your company or product name are not good choices here).

    Im sure that Ive missed some important things - please, use our comment for to fill out the picture. This is a difficult topic, since many of us are admins for one thing or another this really hits close to home. But for the same reason, its important that we deal with it correctly, or as correctly as the situation allows.

    References:

    https://www.heise.de/newsticker/meldung/Revenge-Wipe-Ex-Admin-loescht-Daten-bei-niederlaendischem-Provider-3740243.html?view=print

    https://translate.google.com/translate?sl=autotl=enu=https%3A//www.heise.de/newsticker/meldung/Revenge-Wipe-Ex-Admin-loescht-Daten-bei-niederlaendischem-Provider-3740243.html%3Fview%3Dprint

    https://www.schneier.com/blog/archives/2008/07/disgruntled_emp.html

    http://www.infoworld.com/article/2653004/misadventures/why-san-francisco-s-network-admin-went-rogue.html

    https://www.scmagazine.com/former-system-admin-sentenced-to-34-mo-for-hacking-former-employer/article/640254/

    https://www.wired.com/2016/06/admin-faces-felony-deleting-files-flawed-hacking-law/

    http://www.independent.co.uk/news/business/news/disgruntled-worker-tried-to-cripple-ubs-in-protest-over-32000-bonus-481515.html

    ===============
    Rob VandenBrink
    Compugen

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
    Categories: Security

    Sysinternals 6.03 is out. Bug fixes only, no new features https://blogs.technet.microsoft.com/sysinternals/2017/06/17/sysinternals-update-sysmon-v6-03/, (Mon, Jun 19th)

    SANS Internet Storm Center - June 19, 2017 - 11:19pm

    =============== Rob VandenBrink Metafore

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
    Categories: Security

    ISC Stormcast For Monday, June 19th 2017 https://isc.sans.edu/podcastdetail.html?id=5548, (Mon, Jun 19th)

    SANS Internet Storm Center - June 19, 2017 - 3:10am
    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
    Categories: Security

    Mapping Use Cases to Logs. Which Logs are the Most Important to Collect?, (Sat, Jun 17th)

    SANS Internet Storm Center - June 17, 2017 - 2:10am

    When it comes to log collection, it is always difficult to figure out what to to capture. The primary reasons are cost and value. Of course you can capture every logs flowing in your network but if you dont have a use case to attach to its value, that equals to wasted storage and money. Really not ideal since most Security Information Management (SIM) also referred to Security Information and Event Management (SIEM) have a daily cost associate with log capture. Before purchasing a SIM, the first task that is often difficult is, what do I collect and why? We want quality over quantity. Again, what you collect has a cost, the minimum amount of time logs are retained (how many years) must be calculated because it directly related to the number of events per second (EPS) collected daily [1], how many log collector are necessary to capture what you need, etc.

    Next, it is important to identify your top five use cases, based on value that can have an immediate impact with the security team. This part is often difficult to pin point because it usually isn identify the log source (firewall, IPS, VPN, etc.), its category (user activity, email, proxy, etc.) , its priority (high, medium, low), information type (IP, hostname, username, etc.) and matching use case (authentication, suspicious outbound activity, web application attack, etc.)[4]. The last step is to identify the SIM that will meet your goals.

    [1] http://www.buzzcircuit.com/tag/siem-storage-calculator/
    [2] http://blogs.gartner.com/anton-chuvakin/2014/05/14/popular-siem-starter-use-cases/
    [3] http://blogs.gartner.com/anton-chuvakin/2013/09/24/detailed-siem-use-case-example/
    [4] http://journeyintoir.blogspot.ca/2014/09/siem-use-case-implementation-mind-map.html
    [5] https://isc.sans.edu/forums/diary/SIEM+is+not+a+product+its+a+process/20399

    -----------
    Guy Bruneau IPSS Inc.
    Twitter: GuyBruneau
    gbruneau at isc dot sans dot edu

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
    Categories: Security

    What is going on with Port 83?, (Fri, Jun 16th)

    SANS Internet Storm Center - June 16, 2017 - 6:44pm

    When Im on shift, I really like to look at the port trends and see what the changes are. Looking at shifts in the network traffic is a great way to provide early warning that something new is out there. So today, port 83 caught my eye because its just not a common port you run into. width:748px" />

    First step, what normally lives as a service on this port? width:326px" />

    However, I cant find any documentation about this. This step can sometimes be one of the most frustrating. Its not the research part, but finding GOOD documentation that lays out the service or protocol that normally listens on a port. Its finding sample traffic, logs etc. that can help you understand what you are seeing. That, however, is a completely different topic, but might be a fun rabbit hole to go down later.

    Now, the fun part...getting packets to see what we can figure out what is going here. Normally that helps, but today, not so much. It actually has made it a little more confusing only because there are a lot of disparate items (so it seems) in the traffic and some very curious. Johannes got a sample of traffic off our honeypot by setting up a netcat listener. Here are a few of the interesting tidbits from the packets, but I havent figured out how to put it all together or if any of it even fits together.

    • There was a successful three-way handshake, then one packet with the PSH and ACK flags set and that was followed by a graceful teardown. width:710px" />

      Who knew there was so much action on a port that I really hadnt looked at till today. If you have any packet captures for this or any ideas how this fits together or if its just random, please let us know!!

      (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
    Categories: Security

    All times are GMT +2. The time now is 16:07.


    ©2001-2017 - Baanboard.com - Baanforums.com