1. 2 ● In 2006 the patches for client-side vulnerabilities overcame other categories in Microsoft software. ● In 2010, Symantec’s Global Internet Security.

Slides:



Advertisements
Similar presentations
High level QA strategy for SQL Server enforcer
Advertisements

Chapter 17: WEB COMPONENTS
SIEM Based Intrusion Detection Jim Beechey May 2010 GSEC, GCIA, GCIH, GCFA, GCWN twitter: jim_beechey.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Presentation by: Peter Thomas Blue Lance, Inc Using SIEM Solutions Effectively to meet Security, Audit, and Compliance Requirements.
15 Chapter 15 Web Database Development Database Systems: Design, Implementation, and Management, Fifth Edition, Rob and Coronel.
1 CS6320 – Why Servlets? L. Grewe 2 What is a Servlet? Servlets are Java programs that can be run dynamically from a Web Server Servlets are Java programs.
Kerim KORKMAZ A. Tolga KILINÇ H. Özgür BATUR Berkan KURTOĞLU.
Leveraging User Interactions for In-Depth Testing of Web Applications Sean McAllister, Engin Kirda, and Christopher Kruegel RAID ’08 1 Seoyeon Kang November.
Microsoft SharePoint 2013 SharePoint 2013 as a Developer Platform
Computer Security and Penetration Testing
Chapter 11 ASP.NET JavaScript, Third Edition. 2 Objectives Learn about client/server architecture Study server-side scripting Create ASP.NET applications.
Using the Engaging Networks tools Ghazal Vaghedi Toronto February 21, 2012 #12ENCONF.
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
 Distributed Software Chapter 18 - Distributed Software1.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Windows.Net Programming Series Preview. Course Schedule CourseDate Microsoft.Net Fundamentals 01/13/2014 Microsoft Windows/Web Fundamentals 01/20/2014.
UC Security with Microsoft Office Communication Server R1/R2 FRHACK Sept 8, 2009 Abhijeet Hatekar Vulnerability Research Engineer.
Penetration Testing Security Analysis and Advanced Tools: Snort.
Architecture Of ASP.NET. What is ASP?  Server-side scripting technology.  Files containing HTML and scripting code.  Access via HTTP requests.  Scripting.
AJAX Chat Analysis and Design Rui Zhao CS SPG UCCS.
SANS Technology Institute - Candidate for Master of Science Degree
XForms: A case study Rajiv Shivane & Pavitar Singh.
Databases and the Internet. Lecture Objectives Databases and the Internet Characteristics and Benefits of Internet Server-Side vs. Client-Side Special.
Web Application Firewall (WAF) RSA ® Conference 2013.
Fundamentals of Database Chapter 7 Database Technologies.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
ASP.NET.. ASP.NET Environment ASP.NET is Microsoft's programming framework that enables the development of Web applications and services. It is an easy.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Computer Emergency Notification System (CENS)
1 Welcome to CSC 301 Web Programming Charles Frank.
Chapter 5: Implementing Intrusion Prevention
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
1 CS122B: Projects in Databases and Web Applications Spring 2015 Notes 03: Web-App Architectures Professor Chen Li Department of Computer Science CS122B.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 14 Database Connectivity and Web Technologies.
Network Perimeter Defense Josef Pojsl, Martin Macháček, Trusted Network Solutions, Inc.
Module 7: Advanced Application and Web Filtering.
ECI – electronic Commerce Infrastructure “ An application to the Shares Market ” Demetris Zeinalipour ( Melinos Kyriacou
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Abstract A Structured Approach for Modular Design: A Plug and Play Middleware for Sensory Modules, Actuation Platforms, Task Descriptions and Implementations.
© 2013, published by Flat World Knowledge Chapter 10 Understanding Software: A Primer for Managers 10-1.
14 1 Chapter 14 Web Database Development Database Systems: Design, Implementation, and Management, Sixth Edition, Rob and Coronel.
Sky Advanced Threat Prevention
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 JSP Application Models.
 Web pages originally static  Page is delivered exactly as stored on server  Same information displayed for all users, from all contexts  Dynamic.
Module 1: Overview of Microsoft Office SharePoint Server 2007.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 14 Database Connectivity and Web Technologies.
Plug-In Architecture Pattern. Problem The functionality of a system needs to be extended after the software is shipped The set of possible post-shipment.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
What would you do with a pointer and a size?. Why do we need a new detection framework?
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
CompTIA Security+ Study Guide (SY0-401)
TMG Client Protection 6NPS – Session 7.
C IBM Security QRadar SIEM V7.2.6 Associate Analyst
CONNECTING TO THE INTERNET
Threat Management Gateway
CompTIA Security+ Study Guide (SY0-401)
Housing application Presented by Phil Callaghan MD Caltech CRM
Shifting from “Incident” to “Continuous” Response
Introduction of Week 11 Return assignment 9-1 Collect assignment 10-1
Internet Protocols IP: Internet Protocol
Autonomous Network Alerting Systems and Programmable Networks
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

1

2 ● In 2006 the patches for client-side vulnerabilities overcame other categories in Microsoft software. ● In 2010, Symantec’s Global Internet Security Threat Report indicated that over 93% vulnerabilities exploited worldwide are now client-side Vulnerability Landscape Source:

3 ● Client-side attacks have special properties compared to traditional server-side attacks ▸ Extremely complex structures for document formats ▸ Embedding of interpreters and scripting languages ▸ Embedding of arbitrary formats within other container formats ▸ Obsfucation techniques ▸ Multiple delivery channels for the same vulnerability Protecting the Client

4 ● Intrusion prevention platforms are evaluated by market analysis firms according to two criteria ▸ Throughput ▸ Coverage ● A key term in modern IPS is deep packet inspection but implementation is practically limited by the main two evaluation criteria ● A supplemental system is required to defend against client side attacks Network Intrusion Prevention Systems

5 ● Razorback is a distributed data collection and analysis framework ● Modular architecture allows for collection and analysis modules to be distributed over a network in arbitrary configurations ▸ Retrieval of data over the wire or from server software after delivery ▸ Analysis of complex file formats distributed over a server farm Razorback Framework

6 ● A collection of elements working together ● Each element performs a discrete task ● Elements are tied together via the Dispatcher ● Nugget types: Razorback Framework  Correlation  Defense Update  Workstation  Data Collection  Data Detection/Analysis  Output  Intelligence

7 Razorback Framework Architecture Dispatcher Collection Nugget Detection Nugget Detection Nuggets Database Output Nugget Output Nuggets Collection Nugget Collection Nuggets Other Types of Nuggets

8 Database ● Configuration information ● Event information ● Contextual information ● Metadata ● Provides a wealth of information for correlating events and activities

9 Nuggets ● Dispatcher Registration ▸ Types of data handled ▸ Types of output generated ● UUIDs ▸ Identifier of nuggets ▸ Type of nugget ▸ Types of data handled and/or provided ▸ Allows for easy addition and removal of elements

10 Nugget Registration Dispatcher Detection Nugget Collection Nugget Output Nugget registerNugget()

11 Collection Nugget ● Capture data ▸ From the network ▸ From a network device directly ▸ From log files ● Contact dispatcher for handling ▸ Has this data been evaluated before? ▸ Send the data to the Dispatcher

12 ● Snort-as-a-Collector (SaaC) ▸ SMTP mail stream capture ▸ Web capture ▸ DNS capture ● Custom post-mortem debugger ▸ Traps applications as they crash ▸ Sends the file that triggered the crash to Dispatcher ▸ Sends the metadata of the crash to the Dispatcher Collection Nuggets

13 Detection Nugget ● Handles incoming data from Collection Nuggets ● Splits incoming data into logical sub-blocks ▸ Requests additional processing of sub-blocks ● Provides alerting feedback to the Dispatcher

14 Detection Nuggets ● Zynamics PDF Dissector ▸ Deobfuscation and normalization of objects ▸ Target known JavaScript attacks ● JavaScript Analyzer (w/ Zynamics) ▸ Search for shellcode in unescaped blocks ▸ Look for heap spray ▸ Look for obvious obfuscation possibilities

15 Detection Nuggets ● Shellcode Analyzer (w/ libemu) ▸ Detection and execution of shellcode ▸ Look for code blocks that unwrap shellcode ▸ Win32 api hooking ● Determine the function call ● Capture the arguments ▸ Provide alerts that include shellcode action libemu.carnivore.it

16 Detection Nuggets ● Office Cat Nugget ▸ Full Office file parsing ▸ Vuln-centric detection against known threats ● SWF Nugget ▸ Decompresses and analyzes flash ▸ Detects known flash threats

17 Detection Nuggets ● ClamAV Nugget ▸ Analyze any format ▸ Signature- and pattern-based detection ▸ Updatable signature DB ▸ Can further serve as a collector ▸ Can issue defense updates

18 Output Nugget ● Receives alert notification from Dispatcher ● If alert is of a handled type, additional information is requested: ▸ Short Data ▸ Long Data ▸ Complete Data Block ▸ Normalized Data Block ● Sends output data to relevant system

19 Output Nuggets ● Deep Alerting System ▸ Provide full logging output of all alerts ▸ Write out each component block ▸ Include normalized view of documents as well ● Maltego Interface ▸ Provide data transformations targeting the Razorback database

20 Analysis Nuggets ● Intelligence Nugget ▸ Generate metadata for correlation ● Correlation Nugget ▸ Compare results of various intelligence nuggets

21 Defense Update Nugget ● Receives update instructions from dispatcher ● Performs dynamic updates of network device(s) ● Update multiple devices ● Update multiple devices of different types! ● Notifies dispatcher of defense update actions

22 Workstation Nugget ● Authenticates on a per-analyst basis ● Provides analyst with ability to: ▸ Manage nugget components ▸ Manage alerts and events ● Consolidate events ● Add custom notes ● Set review flags ● Delete events ▸ Review system logs

23 Dispatcher Operation Dispatcher Detection Nugget Javascript Analysis PDF Analysis Database Alert/Event data Collected data Detection results Embedded sub-component data Detection results Detection Nugget

24 DEMO

25

26

27

28

29

30 Contact ● Richard Johnson ▸ ▸ ● Sourcefire VRT ▸ labs.snort.org ▸ vrt-sourcefire.blogspot.com Razorback Team: Alex Kambis Alex Kirk Alain Zidouemba Christopher McBee Kevin Miklavcic Lurene Grenier Matt Olney Matt Watchinski Nigel Houghton Patrick Mullen Ryan Pentney Sojeong Hong