Module 16 Network Forensics, Investigating Logs and Investigating Network Traffic.pptx
efrizalzaida
12 views
118 slides
Jun 06, 2024
Slide 1 of 118
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
About This Presentation
ITenabler
Size: 21.63 MB
Language: en
Added: Jun 06, 2024
Slides: 118 pages
Slide Content
Module 16
Designed by s . Presented by Professionals.
C/HFI
Forensic
Computes
dol IGATOR
SECURITY NEWS
28 Jul 2011
Reported widely in the general media, wholesale ISP and international IP capacity
provider Platform Networks has played a critical part in the arrest of a 25-year-
old Cowra man on 49 hacking charges by the Australian Federal Police (AFP)
Providing the AFP High Tech Crimes unit with access to network traffic, resources
and logs over a period of 6 months,
Ina letter to customers, David Hooton, Platform Networks’ managing director,
assured his customers that they were not at risk.
“The activity in question was far reaching, involved a large number of networks
both in and outside of Australia, and was not focused on either Platform
Networks or any of its customers specifically." Talking to searchSecurity.com.au
Wednesday morning Mr Hooton made it clear that Platform Networks had the
network monitoring and intelligence in place to identify issues on the network as
part of routine systems checks and “real-time” security monitoring
Jessica was missing from her home for a week. She left a note
for her father mentioning that she was going to meet her school
friend. A few weeks later Jessica’s dead body was found near a
dumping yard.
Investigators were called in to investigate Jessica’s death. A
preliminary investigation of Jessica’s computer and logs revealed
some facts that helped the cops trace the killer.
Network forensics is the process of identifying criminal activity and the
people behind it
Network forensics can be defined as the sniffing, recording, acquisition
and analysis of the network traffic and event logs in order to investigate a
network security incident
It allows investigators to inspect network traffic and logs to identify and
locate the attack system
All Rights Reserved. Reproduction is Strictly Prohibited.
Network Addressing Schemes
[+9 There are two types of network addressing schemes
LAN Addressing Internet Addressing
& Each node in LAN has a MAC 2 Internet is a collection of LANs
address that is factory- and/or other networks that are
programmed into its NIC connected with routers
@ An intrusion detection system (IDS) gathers and analyzes information from within a computer or a network to
identify the possible violations of security policy, including unauthorized access, as well as misuse
These mechanisms check for Trojan horses,
or files that have otherwise been modified,
indicating an intruder has already been there,
for example, Tripwire
N —
@ These mechanisms are typically programs
that parse log files after an event has already
occurred, such as failed login attempts
IP spoofing refers to a process in which an attacker
changes his or her IP address so that he or she
appears to be someone else
Attacker sending a
packet with a spoofed
When the victim replies to the address, it goes sles Sia
back to the spoofed address and not to the
attacker's real address
Mo
Victim 1P address 7 = —
Sr Real address
IP spoofing using Hping2: 7.777
Hping2 www.juggyboy.com -a 7.7.7.7
You will not be able to complete the three-way handshake and open a successful TCP connection by
spoofing an IP address
All Rights Reserved. Reproductionis Strictly Prohibited,
Man-in-the-Middle Attack
Attackers use different techniques and split
the TCP connection into two connections
hs 2 Telnet Email a
spifer ona neiwor Passwords Traffic : A packet sniffer can
in promiscuous —_
I only capture packet
mode, an attacker can an E ” Br
information within a
capture and analyze 5 Dee
all of the network Syslog Web \ : SENSE
traffic Traffic yr Traffic
i E | Anattacker can steal Er i
A DNS \¥ sensitive information by Chat H
Traffic sniffing the network Sessions / Usually any laptop
Many enterprises’ a > can plug in to the
switch ports are ie , « network and gain
open Router FTP E access to the
Configuration md network
9 In a Dos attack, attackers flood a victim system with non-legitimate service requests or
traffic to overload its resources, which prevents it from performing intended tasks
Malicious Traffic
Malicious traffic takes control over all the
available bandwidth
Data on Stack Some data.
maybe
Segment overwritten
New Return Address 4
Overwritten Data y
on Stack Segment | Malicious code.
Ex Execve(/bin/sh}
End of Stack
Stack when function
smashes a stack
Copyright O by
AllRights Reserved. Reproduction is Strictly Prohibited.
Trojan Horse
® Itis a program in which the malicious or harmful code is contained inside apparently harmless
programming or data in such a way that it can get control and cause damage, such as ruining the file
allocation table on your hard disk
a In this attack, the attacker injects plaintext into the log files
The attacker tries to divert the attention of the investigator towards another person
The log files application relates the user to the action performed
) The attacker changes the log file source code by inserting [LINEBREAK] and changing
the user name “Tester01” to say “Manager01”
Consider the example if the
value in the value field is
replaced as “9.99 | WRITE”
The values are shifted from one
column to the next as shown:
ey
. In this attack, the attacker injects a single pipe
character or multiple pipe characters into the log files
Some systems contain log files that have several data
columns; these log files contain single lines of text files
and data fields separated by a pipe character
. When the attacker injects single or multiple pipe
characters, the previous values are replaced and
shifted from one column to the next
E In this attack, the attacker injects into a log
This will control the display of the subsequent entries
Consider an HTML log file that is potentially not secure
The browser under normal conditions displays a list of all
the along with a timestamp
Line7 in the example shows the potentially malicious
which is under the attacker's control
= The attacker can disable logging to perform other
attacks by changing the Session ID to:
>
>
Table's current row is closed effectively and a new table is
started at the background color which is as same as before
Due to this, the session IDs will be logged in white font color,
which makes it difficult to identify them against the
background color
Token removal is e—
the solution for this
kind of attack
Remove ‘<’ and ‘>’ characters
wherever you find that a
malicious input is given
Identify the inputs 2)
given by the attacker
ie
Copyright O by
All Rights Reserved. Reproduction is Strictly Prohibited,
Attack
It is an attack on the log viewing interface
In this attack, terminal emulation is used to interpret character sequence as the special
action directives to the terminal
Terminal injection can be used on an FTP client log file on a Linux system
As an example, a bash shell command is used asa backdoor by an attacker to display
all the users’ passwords
Finally, the FTP client leaves the log file with passwords
If the attacker knows that the administrator of the system inspects the log file via a cat
command that displays its output in a terminal window, he can abuse its use of ANSI
terminal sequences to clear the screen and make the log file appear empty
2004,05.26 4 /home/jenny/t g /test
2004. 26 enn if ysite.org /backup
2004.05.26 / r.com fhackedbash
All Rights Reserved. Reproduction is Strictly Prohibited.
Where to Look for
Use r to capture log files of various devices and applications
Log files from the following devices and applications can be used as evidence for network
security incidents:
Routers i a
ooo E ee i Business
: Applications
Switches
Servers,
Desktops,
and
Mainframes
Intrusion
Detection
Systems
Intrusion
Prevention
C HFI : > Copyright O by
All Rights Reserved. Reproduction is Strictly Prohibited.
Log Capturing Tool: ManageEngine
m EventLog Analyzer is a web-
based, real time and
monitoring
and management software
BD It collects, analyzes, reports,
and archives:
a from distributed
Windows hosts
from distributed Unix
hosts, routers, switches, and
other SysLog devices
m ManageEngine Firewall
Analyzer is a firewall log
analysis tool for security
event management that
collects, analyzes, and
archives logs from
network perimeter
security devices and
generates reports
All Rights Reserved. Reproduction is Strictly Prohibited
Log Capturing Tool: GFI EventsManager
@ GFI EventsManager automatically processes and archives logs, collecting the information
you need to know about the most important events occurring in your network
Collect events data i <p Report scheduling
distributed over a Eventiog scanning | (2 1 | and automated
WAN into one central profiles distribution via email
EE —
An investigator can prove If the server is Move the logs to a master
authenticity of log files if compromised investigator server and then to
they are unaltered from should move the logs off secondary storage media
the time they were the compromised server such as a DVD or disk
1. DNS poisoning is a technique that tricks a DNS server into believing that it has received authentic
information when, in reality, it has not
2. It results in substitution of a false Internet provider address at the domain name service level where
web addresses are converted into numeric Internet provider addresses
3. Perform DNS poisoning by setting up a fake website
All Rights Reserved. Reproduction is Strictly Prohibited.
Intranet DNS Spoofing (Remote Network)
J In this example of Internet DNS spoofing, the investigator infects Rebecca’s
machine with a Trojan and changes her DNS IP address to that of the investigator
‘What isthe IP )
= Rebecca's Browser
connects to 65.0.0.2
Investigator sniffs the
= Ns we 2
credential and redirects the
request to real website
All Rights Reserved. Reproduction is Strictly Prohibited.
Proxy Server DNS Poisoning
=] In this example, the investigator sends a Trojan to Rebecca’s machine and changes her
proxy server settings in Internet Explorer to those of the investigator
What the Pro serre
abe ron ana are kit (rom cn nt set
an
Adress: [mcoz | Pat: [ton Cages
Real Website
www.xsecurity.com |
(IP: 200.0.0.45) ai
Clone pra save fera unser
Rebecca
(IP: 10.0.0.5)
investigator's fake
website sniffs the
credential and redirects
he request to the real
eo
Investigator sends Rebecca's
0
>
Attacker runs Proxy Server in Fake Website
Russia IP: 200.0.0.2 (IP: 65.0.0.2)
All Rights Reserved. Reproduction is Strictly Prohibited.
DNS Cache Poisoning
£ DNS cache poisoning involves changing or adding records in the resolver cache of a DNS so that a
DNS query for a domain returns an IP address of a fake website set by the investigator
e = If the server cannot validate that DNS responses have come from an authoritative source, it will
cache the incorrect entries locally and serve them to users who make the same request
IDS can be configured to capture the network traffic
and generate alerts
Results of networking devices such as routers and firewalls,
can be recorded through a serial cable using the Windows
HyperTerminal program or using a UNIX script
If the amount of information to be captured is huge,
then record the onscreen event using a video camera or
a relative software program
Snort is an open source network
intrusion detection system, capable of
performing real-time
Dy martin Roesch ¢ the Snort Toma: httpi//wov.anort.org/eoct/anort-team
It can perform and Copyright (0) 1996-2019 Seuroefize, Ino., er al
10 2010-06-25
and is used
to detect a variety of
such as buffer overflows, stealth port
scans, CGI attacks, SMB probes, and OS 85: Session exceeded configured max bytes to queue 1048275 using 1048979 bytes (
bring attempts ‘Ligne wenn. 108.260, 168,7 12636 —-> 92, 46,09,369 40 (0) ı Znntate Oxi Duringe
It uses a flexible to iia
describe traffic that it should collect or A en ain
pass, as well as a that ae er for 0 dat eg 39 minutes 45 seconds
utilizes a modular plug-in architecture vets ain: 118
A enart: 05: Prat session from cache that was using 1098947 bytes (puego whole cache.
All Rights Reserved. Reproduction is Strictly Prohibited.
NetWitness Investigator can locally capture live traffic and process packet files from virtually
any existing network collection device for quick and easy analysis
ul Capsa network analyzer captures all data transmitted over the network and provides a wide range of
analysis statistics in an intuitive and graphic way
‘lal itidentifies and analyzes more than 300 network protocols, as well as network applications based on the
protocols
—
ca fa NE | capone] mp
A em Er an]
Fate | 13
— a mn. Ss um mm.
san de pe |
, rep co
mars tps 0
EE
En»
Sn
gun
Son,
EEE 27.
ssw za
1a 18060 on 0
oe 0 0
oso 0
Packs Desc Pac. Dyson Faden =
S E preve
MD jt SA Me iv St
mio 10300 am ane Eu
Su ue
Sum 42m
aus
EM asin
Emo Va
[a vo.
EST
Stipe? Duron
Buus... ceo LEME ESAS La HE.
Dia, S32. CONLIN LOMME NE 1051 MB
Buin. Buaw. mom zum 1028. 2000
our. Biss. com Lime ease Lane
Sun wa | ins MB 45865
Er PUT
Sum ce. HORT.
Lau Am IMSS aramın 1057
Dee be
=
All Rights Reserved. Reproduction is Strictly Prohibited.
NetResident is a network
content monitoring program es
that captures, stores, analyzes,
and reconstructs network events
such as email messages, web
pages, downloaded files, instant Een
messages, and VoIP .
conversations
Traffic 1Q Professional enables security professionals to audit and validate the behavior of
security devices by generating the standard application traffic or attack traffic between two
virtual machines
te ones U sem QU nome Ey | Ft + so
assess, audit, and test the behavioral
ENTE,
characteristics of any non-proxy packet-
filtering device including:
CommView is a network monitor
and analyzer that captures every
packet on the wire to display vital
information such as a list of
packets and network connections,
vital statistics, protocol
distribution charts, etc.
| rte seach eo Teds stas tues Heb
CES
828-012 0%
lala
a y
| orina cameos [ous | ora Orun | Same]
Gar om Im
EEE
CE EE CE
‘hn arte
Data Tan u
= - za. eine
ranas Ol
ee alos + le
SoftPerfect Network Protocol Analyzer
is a tool for analyzing, debugging, al
er ER wel ce AA Gas Chee Corse 9216007
maintaining and monitoring local TE —
# D Came | Dato tons | GB Pocket Bude |
networks and Internet connections
SC) ere! Fede [0 WED. [fine [Pret Tessa 2]
D Cntr DIOL. IP UDP Nets Oi.
CNE. IP PAPEdo eu I EBT
MAO. IP UDPoMeorden 1a BIG
nou ane
? ana OWED. 1P
It captures the data passing through 1351 DMC. IP
a dial-up connection or network
Ethernet card, analyzes this data and
then represents it in an easily E S 5
readable form 238 6 373 2 76501234567890
er URL visits,
email, chats, games, FTP, and data
flows, and also takes webpage
snapshots, duplicates email and
FTP copies, records MSN
messenger content, and gives
statistical reports
CHFI
19
era Tode) Mb)
Dei)
UAL.
mn bostormegeci..— www bostoemagocir
à Maat 2 ur hcatormagasi— | seu bostonmagesie
2 Host 3 IP memboctormegecl...— veu bortommageeir
à Haat 3 ie hostormagazl._. mn bostommagaar
AnalogX Packetmon allows you to capture IP packets that pass through
the network interface - whether they originate from the machine on
which PacketMon is installed, or a completely different machine on the
network
network analyzer, and network
sniffer that plugs in to computer i sorte, i oo Rs
networks and monitors any e : E re therein tae
Internet and email activity that
Top Routers
ame Routers ‚Argus allows investigators to monitor
os D network connectivity (Ping test),
Status TCP/UDP ports, output or exit code of a
program, content of a web page,
seb authoritativeness of a name server,
results of SQL queries, etc.
Stems: down since Wet 11 Sep 13:47:36 2002
sat elapsed time Sb up% dawn times down
Today" 16527 Nos 002002008 xeon Doo mM. — -_
Yenerduy Weo26Ner0090q2%02 12000 020 1000 Top Temmlngrsschner DNELnerzochart. 5OA_uhakpıLnereschaet Thee sor
2Dwye Age Tae 25 Nar0000002008
This Mouth $1 No00 9000 2008
Laman — Weel OCT zi
03
SOON wee UDP/Dematyhetreochnet
um LL Wud sur O
Moms Ago Mec 1Sept09001205 ab Do 1000 este nslncreachoet
a À pe
layer PRES iPNQ A amändänam 020 Pi LE al JP
Th 22 May 18 11:992008 doom TRANSITION - Bey Mas 1 ‘Stats: up since Thon 30 Oct 17.49.13 2003
Thu 22 May 12 11202008 dewnovemide TRANSITION - eya Marz | star lapsed tone % wp So den tes den
Fa 26 Mer 103812006 dem TRANSITION. Bon Mer Joie Tka27NosDODOID2008—— 120000-1000 oD f]
Wea) AOL tent TRANSITION Amer Fey WeereNevcocoio2005 100900 ID ni o
ed ON ALORS doom TRANSITION Amsler ZDaye Age ‘Tee?SNovUOUOIDIm0s Icbundı 1000 u A
” MA ne 18 LANTA dario darmentda MD À NEVDIAR Babe “This Monts Sar1Nor00:00002002 — 264120200 1000 000 o
Los Mee Weit OMA m1 0000 FEN DAD 2
Zions age Meas SION ann 1000 ni 5
TeVe Weil MOON AmSAENT I DU 15
[oie E SE Ui
Tu Cet 17:48-183008 up TRANSITION up fern
Thu C1509.182003 down TRANSITION - coven
DI.
Network forensics is the process of identifying criminal activity and the people behind it
An intrusion detection system (IDS) gathers and analyzes information from within a computer or a
network to identify the possible violations of security policy, including unauthorized access, as well as
misuse
Honeypot is an information system resource that is expressly set up to attract and trap people who
attempt to penetrate an organization's network
The man-in-the-middle attack is used to intrude into an existing connection between systems and to
intercept messages being exchanged
Log files from various devices and applications can be used as evidence for network security incidents
To ensure that the log file is not modified, encrypt the log by using some public-key encryption scheme
A sniffer is computer software or hardware that can intercept and log traffic passing over a digital
network or part of a network
DNS poisoning is a technique that tricks a DNS server into believing that it has received authentic
information when, in reality, it has not