visualizing analyzing and filtering zeek events
play

Visualizing, Analyzing and Filtering Zeek Events using a graphical - PowerPoint PPT Presentation

Visualizing, Analyzing and Filtering Zeek Events using a graphical frontend and OpenGL Nick Skelsey ZeekWeek 2019 Seattle, WA 11 October, 2019 AGENDA Motivation 1. State of the art 2. Monopticon 3. Related research 4. 2 CONNECTIVITY


  1. Visualizing, Analyzing and Filtering Zeek Events using a graphical frontend and OpenGL Nick Skelsey ZeekWeek 2019 Seattle, WA 11 October, 2019

  2. AGENDA Motivation 1. State of the art 2. Monopticon 3. Related research 4. 2

  3. CONNECTIVITY ISSUES: do not suffer in silence > ping google.com > ping 8.8.8.8 > ip a > ping 192.168.1.0 > dhcp -4 iface_name *check cable* *check unpaid bills* *check news for regional disaster* 3

  4. MOTIVATION Graphics can have high information density. 1. No certifications required. 2. 3 . Develop intuition. 4

  5. IVRE Lalet, Pierre, Florent Monjalet, and Camille Mougey. "IVRE, a network recon framework." ivre.rocks (2017). 5

  6. ZENMAP & RADIALNET RadialNet: An Interactive Network Topology Visualization Tool with Visual Auditing Support, CRITIS 2008 João P. S. Medeiros, Selan R. dos Santos at Federal University of Rio Grande do Norte – UFRN 6

  7. MONOPTICON A GPLv3 application built with C++, zeek and Mangum for POSIX systems. 7

  8. minicps WATER TREATMENT > ip link add name feth1 type dummy > ip link set dev feth1 up > tcpreplay -v -i feth1 SWaT_plc_test.pcapng Antonioli, Daniele, and Nils Ole Tippenhauer. "MiniCPS: A toolkit for security research on CPS networks." Proceedings of the First ACM workshop on cyber-physical systems-security and/or privacy. ACM, 2015. 8

  9. Bettercap ARP Spoofing > set arp.spoof.internal true; > set arp.spoof.targets 192.168.1.20,192.168.1.30; > set arp.spoof.full_duplex on; > arp.spoof on; 9

  10. OBSERVATIONS Limit scope: Ethernet and IPv4 1. Must be modular: Represent the OSI stack as a stack 2. Must be passive: offline packet analysis 3. Must be quick: native or web assembly 4. Should be extensible: zeek and bash scripts 5 . 10 10

  11. DESIGN 11 11

  12. MODELING DEVICES IN A BROADCAST DOMAIN IEEE 802.1* defines ethernet 38:30:f9:61:97:6f 12

  13. MAGNUM.GRAPHICS 13

  14. THE GRAPHICS PIPELINE 14 14

  15. OBJECT SELECTION 3 1 2 15

  16. OBJECT LAYOUT 16 16

  17. LIMITATIONS 17

  18. 802.1 BROADCAST DOMAINS All devices addressable by their MAC. Frames traverse switches based on: - Destination address - The type of address - The switches (routing) tables - Structure of the spanning tree - Optimizations like 802.1aq Fedyk, D., et al. "IS-IS extensions supporting IEEE 802.1 aq shortest path bridging." Internet Engineering Task Force (IETF), RFC 6329 (2012): 2070-1721. 18

  19. AAALM zeek package that passively infers the structure of an IPv4 network over Ethernet 19

  20. INFERRING NETWORK STRUCTURE 20

  21. DRAWING A BROADCAST DOMAIN 21

  22. Port knocking 22

  23. FUTURE WORK Extensible event monitoring 1. Sane packaging 2. L2 & L3 model to identify network security 3. policy violations. 23

  24. THANK YOU Check out: Monopticon on github or in the AUR aaalm zeek package Bibliography: nskelsey.com/zweek bvtech.it securenetwork.it 24

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend