practical network defense at scale or: protecting the “eierlegende wollmichsau“ by travis...

68
Practical Network Defense at Scale Or Defending the Eierlegende Wollmilchsau

Upload: code-blue

Post on 15-Apr-2017

423 views

Category:

Internet


0 download

TRANSCRIPT

Page 1: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

Practical Network Defense at Scale

Or Defending the

Eierlegende Wollmilchsau

Page 2: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

whoami?

Name: Travis Carelock

Occupation: Engineer at

15+ years experience in the IT and security fields… wow, I’m old……

Page 3: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015
Page 4: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015
Page 5: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

BuildingDefense

Page 6: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015
Page 7: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015
Page 8: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

What are we trying to Accomplish?

Page 9: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

Stop the HACK4RS!!

Page 10: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

not realistic

Page 11: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015
Page 12: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015
Page 13: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

node

Page 14: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

our servers

Page 15: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

our servers

Page 16: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

/ˌaɪ̯ɐ.leːɡəndə ˈvɔl.mɪlç.zaʊ̯/Eierlegende Wollmilchsau

Page 17: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015
Page 18: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

Don’t Panic. Start Simple.

Page 19: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

Goals

• Investigate Network Traffic

• Network Traffic Rules with Alerts

• Forensic evidence and long term analysis

Page 20: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

IPs? Rx/Tx?Ports?

Investigate Network Traffic

Page 21: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

Traffic Rules

Page 22: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

Forensics and Analysis

Page 23: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

What are the Sources of Truth?

Page 24: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015
Page 25: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

• How Consistent?

• How Independent?

• Ease of Corruption?

• Confidence Score?

• Retention Policy?

Data Integrity

Page 26: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

Normalize Logs

timestamp

Page 27: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

Normalize Logs

data transfer

Page 28: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

Tag Logs

“src_ip”

Page 29: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

Tag Logs

“’dst_ip”

Page 30: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

Type Logs

Integer

Page 31: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

Type Logs

IP

Page 32: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

What is in the

toolbo

x?

Page 33: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015
Page 34: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015
Page 35: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

Shoulder of Giants.• Animate of me on should of ES.

me

elasticsearch

Page 36: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015
Page 37: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

Your hands will get

dirtywrite !!

Page 38: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

is

Whatthe

target?

Page 39: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

What connects?

To what?

Page 40: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015
Page 41: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

SD

Page 42: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

Dependency

Page 43: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

Automate

Page 44: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015
Page 45: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

10.0.0.50:23463 -> 10.1.1.255:3306

Page 46: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015
Page 47: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

Current View of the World

Page 48: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

False Positives-Better Query Design

-Blocking-Policy and Guidelines-Additional Services

Page 49: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

Not all anomalies are created equal

Page 50: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

What about Alert: Actions?

Page 51: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015
Page 52: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

Create Feedback Cycle

Page 53: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

Query External Services

Page 54: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

ALERT!

Fatigue!

Page 55: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

User Interface?

Page 56: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015
Page 57: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

Query Tools

HistoryAlert Management &

Search Help

Dashboard Generation

Page 58: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

….but how well is it working??

Page 59: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

Automated

Tests

Page 60: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

System Security

Page 61: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015
Page 62: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015
Page 63: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

Network and Dependency Investigations

Page 64: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015
Page 65: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

QuestionsWhat goals am I trying to accomplish?

What are the sources of truth?

What tools would work best?

What is an anomaly?

Am I correlating the alerts?

What about user experience?

Is the system robust and secure?

What else can I do with all the data?

Page 66: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

you!

Page 67: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

KeepFighting!!!

Page 68: Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsau“ by Travis Carelock - CODE BLUE 2015

name: travis carelock twitter: @l3d email: [email protected] pgp: 463E B548 F3B1 F879 4589 6505 E417 7480 D1A4 A990 private: [email protected] pgp: 4CFC 8E69 4A07 59F2 4508 8A39 0AFA 9CC3 2D65 031E otr: [email protected]: 40FCAFD7 FAA097B6 29BE95CE 6740E37E 0790E295

is hiring!

Web: http://soundcloud.com/jobsEmail: [email protected]

Thank You!Special Thank You to Code Blue and the Organisers!