Network Security Fundamentals
Security Training Course
- Dr. Charles J. Antonelli
Network Security Fundamentals Security Training Course Dr. Charles - - PowerPoint PPT Presentation
Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 7 Intrusion Detection Topics Fundamentals Network IDS Snort Host-based IDS
3 04/13 cja2013
5 04/13 cja2013
6 04/13 cja2013
sniff packets from the wire OS shim (HIDS)
7 04/13 cja2013
from “Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection” Ptacek & Newsham
8 04/13 cja2013
9 04/13 cja2013
10 04/13 cja2013
11 04/13 cja2013
12 04/13 cja2013
13
IP normalization TCP session tracking URL de-obfuscation attack detection
04/13 cja2013
14 04/13 cja2013
15 04/13 cja2013
16 04/13 cja2013
17 04/13 cja2013
18
GET awstats?configdir=|
04/13 cja2013
19 04/13 cja2013
20 04/13 cja2013
21 04/13 cja2013
22 04/13 cja2013
23 04/13 cja2013
24 04/13 cja2013
25 04/13 cja2013
26 04/13 cja2013
GET /blah.ida? AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA[Ax240]=x HTTP/1.1
27 04/13 cja2013
28 04/13 cja2013
CVE-2005-0116 CVE-2005-0116 Description AWStats 6.1, and other versions before 6.3, allows remote attackers to execute arbitrary commands via shell metacharacters in the configdir parameter.
29 04/13 cja2013
31 04/13 cja2013
http://www.emergingthreats.net/
32 04/13 cja2013
TCP state machine
» portscan and hostscan
URL deobfuscation Interfaces with rules
33 04/13 cja2013
snort_manual.pdf
Official Snort Ruleset
34 04/13 cja2013
35 04/13 cja2013
04/13
cja 2013
36
04/13 37 cja2013
snort –I lo –v [–d –e]
snort –i lo –v [-d –e] [–b|-h] –l ./log
snort –i lo –v [-d –e] –c /etc/snort/snort.conf –A console –k none
sudo service snortd start 38 04/13 cja2013
39 04/13 cja2013
40 04/13 cja2013
41 04/13 cja2013
42 04/13 cja2013
» content: “|00 00 00|”;
43 04/13 cja2013
44 04/13 cja2013
45 04/13 cja2013
46 04/13 cja2013
47 04/13 cja2013
48 04/13 cja2013
"Here's my Everything's Okay Alarm. This will sound every 3 seconds unless something isn't okay. It can't be turned off, but it does break easily." 50 04/13 cja2013
51 04/13 cja2013
from “Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection” Ptacek & Newsham
52 04/13 cja2013
53 04/13 cja2013
54 04/13 cja2013
55 04/13 cja2013
56 04/13 cja2013
57 04/13 cja2013
58 04/13 cja2013
59 04/13 cja2013
60 04/13 cja2013
61 04/13 cja2013
62 04/13 cja2013
63 04/13 cja2013
65 04/13 cja2013
04/13 66 cja2013
67 04/13 cja2013
68 04/13 cja2013
monitor for change, what to do if changes are detected As shipped, monitors a large set of standard files You will want to modify this file for your site
69 04/13 cja2013
Create passphrases when prompted
Enter passphrases when prompted
Enter passphrase when prompted
70 04/13 cja2013
Report sent to standard output and saved as *.twr in report directory
Shows changes
Shows all generated reports
» File name reflects date and time file was generated
Shows report report.twr
71 04/13 cja2013
http://www.blackhat.com/presentations/bh-federal-06/BH-Fed-06-Zanero.pdf (accessed April 2010)
Detection,” Secure Networks, 1998. http://insecure.org/stf/secnet_ids/secnet_ids.pdf (Accessed April 2010)
1999. http://www.usenix.org/event/lisa99/full_papers/roesch/roesch_html/ (accessed April 2010)
http://www.citi.umich.edu/u/provos/systrace/ (accessed April 2010)
System,” Proceedings of the FREENIX Track, Usenix Technical Conference, June 2001.
72 04/13 cja2013