My Keynote from BSidesTampa 2015 (video in description)

Andrew Case
Andrew CaseDirector of Research at Volexity
The Need for Proactive Threat
Hunting
Andrew Case
@attrc
Who Am I?
• Core Volatility developer
• Co-Author “Art of Memory Forensics”
• Lead-investigator on large-scale investigations
• Performed many RE efforts, pentests, and
source code audits
• BSidesNola (New Orleans) Co-Organizer
Why is Threat Hunting Needed?
• Many opaque components of the information
infrastructure
• You are combating a creative and adaptive
adversary and thus you need a creative and
adaptive analyst to find them
• Statistics have shown that people are
compromised for years without noticing
What is Threat Hunting?
• Searching for adversaries without a particular
indicator
• Dedicating time and resources to deep
analysis of potentially compromised resources
• See [1] for great commentary by Sean Mason
and [2] for several posts by Jack Crook
What are its Benefits?
• Makes the organization proactive against
attackers
• Quickly find gaps in system and application
configurations
• Defenders more familiar with their own
environment and infrastructure
• Documentation leads to organizational
knowledge
Gaining Familiarity
• Understanding and defining “normal” in order
to detect anomalous behavior and attributes
• “normal” is unique to a particular organization
and even subsets within the organization
– “normal” of a web server is quite different than
the system of Joe in accounting
• Unfamiliarity with “normal” leads to
extremely ineffective response
Running Processes
• If your analysts were given a list of every process
running on a system in your environment, how
many of them could definitively rule each as
normal or abnormal?
• How would this be judged?
– Name of the process?
– Path to the executable on disk?
– Parent process?
• Patrick Olsen has gone through great lengths to
document this [5]
Process Privileges
• What privileges do each process run as?
• Do any 3rd party programs abuse privileges or
grant themselves higher privileges than
necessary?
• Do you know which of your users run as local
admin?
Network Activity
• Which applications should be listening for
network connections?
• Which applications should talk on the
network?
• Is there any ingress/egress filtering?
– Has it been disabled or tampered with by
malware/attackers?
Kernel Drivers
• Kernel drivers have full access to entirety of a
system and its resources
• A default Windows 7 install loads over 100 kernel
drivers
• Two of the following drivers are normal, two are
Stuxnet, do your analysts know which?
– MRxCls
– MRxDAV
– MRxNet
– MRxSMB
Persistence Mechanisms
• More than just AutoRun Keys
• “Beyond the Run Key”, 26 (now 27) part and
counting blog post series by Adam Blaszczyk
on forensics of Windows persistence
mechanisms [4]
Scheduled Tasks
• Default Windows 7 install has numerous
scheduled tasks by default
• 3rd party applications create them to check for
updates, run maintenance scripts, and so on
• Adversaries also leave scheduled tasks
behind…
• Triggers: [6]
Services
• Like Scheduled Tasks, many will be installed by
default and 3rd party applications will create
their own
• Sophisticated threat groups also like to install
services
– Can be very manual and time consuming to detect
malicious services, even with memory forensics
analysis
Anti-Virus & HIPs
• Often act like malware to gain visibility into
the system
• Need to be filtered/whitelisted from any
rootkit detection tools
• Changes in AV/HIPs algorithms requires
changes in filters
Documentation is Org Knowledge
• Team members should not live in a silo
– “normal” should be documented in a way that
other team members can access
• Documentation outlives employees leaving
and scales during incidents
– Do not allow “Brents” to be created
• If your entire IR team mutinied tomorrow,
how long would it take for new hires to regain
all the departing knowledge?
What is the End Result?
• Proactive detection of threats
• Effective detection and response
• IR teams that deeply understand their
environment
• Organizational knowledge that continues to
grow and survives generations of employees
How Do You Get There?
• The executives need to understand the value
of a properly prepared IR team
• The IR team must be elevated to the status of
the IT Security team and be just as an integral
a part of the organization’s ongoing IT flow
Security vs IR
• Security teams are positioned during all parts
of the IT process while IR is used only during
incidents
• This leads to IR staff not being effectively
utilized and not being an on-going part of the
organization
IT Security Pre-Deployment
• Baseline testing of gold images
– Security evaluations done well before production
use
• Application development
– Secure SDLC
• Secure DevOps
– Incorporating security into cloud deployments
– Richard Mogull does great work in this space [3]
IT Security Post-Deployment
• Continuous:
– Vulnerability scans
– Penetration tests
– Application security assessments
IR is Embedded Into Nothing
• It is always after the fact
• This leaves knowledge gaps and forces on-the-
spot learning during incidents
• How do we fix this?
Incorporating the IR Team Pre-Deployment
• As security reviews gold images, the IR team
should be building baselines and looking for
logging misconfigurations that prevent full
forensic exploitation
• Applications should be developed and
configured so that all relevant activity is
logged and recoverable
Incorporating the IR Team Post-Deployment
• Continuous:
– Threat hunting
– Documentation of changes to systems and
applications
– Incorporation of new forensics artifacts into
analysis processes
Incident Preparedness
• IT security has dedicated systems for
vulnerability scanning, application testing, etc.
• IR teams need dedicated, pre-configured
systems to effectively hunt as well as respond
to incidents
Incident Preparedness Essentials
• Network monitoring
• Dedicated storage servers
• Deployable acquisition/sampling tools and
agents
• Analysis servers with real processing power
• Without these and others, response will be
chaotic, underpowered, and likely ineffective
Utilizing Documentation
• As the IR team becomes embedded,
everything it learns should be documented
• If done correctly, everything that is known
from a forensics perspective about a system
and its applications will be readily available to
all team members
Documentation into Internal Training
• New hires can be pointed to documentation of
all assets on the network and their forensic
value and artifacts
• Ongoing internal training can focus on new
artifacts discovered during all phases of the IR
team’s involvement
• A great post by Jack Crook that covers this
topic [7]
Helping Outside Parties
• Only a handful of organizations can
completely handle major breaches internally
• Giving organized access to 3rd party analysts
makes their effort more effective and
accomplished in a shorter amount of time
• To accomplish this, documentation and
analysis infrastructure must be setup before a
breach
About Executive Support…
Spending: Security vs IR Preparedness
• If “Shell Shock 2” were to be released right
now would you feel better knowing your
systems were fully patched (hence vulnerable)
or that you had a fully prepared IR team that
can handle the outbreak effectively?
• Does your organization’s resource allocation
reflect your feelings on this?
Steps – Preparing for a Hunt
1. Free up your IR teams time to prepare for
hunting
2. Create a plan that will lead to documentation
of all your hunting and response efforts
3. Start small
4. Refine
5. Move to team wide hunts
6. Create challenges and internal training based
on real events
Steps – Embedding IR into IT
1. Convince executives of the need
2. Update policy to ensure IR has a hand in
ongoing operations just like security does
3. Document everything learned
4. Incorporate what is learned into analysis
during hunts and incident handling
Conclusions
• Threat hunting is one of the best tools
available to organizations in order to stay
ahead of adversaries
• You should aim to minimize the space
attackers can work where you will not find
them
• Don’t wait on a vendor or the FBI to notify you
of breaches – be active and find them
yourself!
Questions/Comments?
• Contact information:
– andrew@dfir.org (0xB2446B45)
– @attrc
References
[1] http://seanmason.com/2014/12/09/a-hunting-we-will-go/
[2] http://blog.handlerdiaries.com/?s=hunting&submit=Search
[3] http://2014.video.sector.ca/video/110341603
[4] http://www.hexacorn.com/blog/
[5] https://sysforensics.org/2014/01/know-your-windows-
processes.html
[6] https://technet.microsoft.com/en-us/library/cc748841.aspx
[7] http://blog.handlerdiaries.com/?p=437
1 of 35

Recommended

Investigating Cooridinated Data Exfiltration by
Investigating Cooridinated Data ExfiltrationInvestigating Cooridinated Data Exfiltration
Investigating Cooridinated Data ExfiltrationAndrew Case
8.3K views113 slides
Windows Threat Hunting by
Windows Threat HuntingWindows Threat Hunting
Windows Threat HuntingGIBIN JOHN
1.4K views17 slides
The New Pentest? Rise of the Compromise Assessment by
The New Pentest? Rise of the Compromise AssessmentThe New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise AssessmentInfocyte
657 views22 slides
Dynamic Population Discovery for Lateral Movement (Using Machine Learning) by
Dynamic Population Discovery for Lateral Movement (Using Machine Learning)Dynamic Population Discovery for Lateral Movement (Using Machine Learning)
Dynamic Population Discovery for Lateral Movement (Using Machine Learning)Rod Soto
1.4K views97 slides
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too... by
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...RootedCON
2.6K views21 slides
Hunting: Defense Against The Dark Arts by
Hunting: Defense Against The Dark ArtsHunting: Defense Against The Dark Arts
Hunting: Defense Against The Dark ArtsSpyglass Security
3.4K views39 slides

More Related Content

What's hot

Next Generation Advanced Malware Detection and Defense by
Next Generation Advanced Malware Detection and DefenseNext Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and DefenseLuca Simonelli
1.8K views30 slides
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016 by
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016Danny Akacki
981 views46 slides
TIG / Infocyte: Proactive Cybersecurity for State and Local Government by
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentInfocyte
162 views40 slides
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline by
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineLastline, Inc.
1.1K views31 slides
No Easy Breach DerbyCon 2016 by
No Easy Breach DerbyCon 2016No Easy Breach DerbyCon 2016
No Easy Breach DerbyCon 2016Matthew Dunwoody
40.1K views36 slides
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware by
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in FirmwareUsing Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in FirmwareLastline, Inc.
1.5K views58 slides

What's hot(20)

Next Generation Advanced Malware Detection and Defense by Luca Simonelli
Next Generation Advanced Malware Detection and DefenseNext Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and Defense
Luca Simonelli1.8K views
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016 by Danny Akacki
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Danny Akacki981 views
TIG / Infocyte: Proactive Cybersecurity for State and Local Government by Infocyte
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
Infocyte162 views
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline by Lastline, Inc.
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Lastline, Inc.1.1K views
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware by Lastline, Inc.
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in FirmwareUsing Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Lastline, Inc.1.5K views
Avoiding the Pitfalls of Hunting - BSides Charm 2016 by Tony Cook
Avoiding the Pitfalls of Hunting - BSides Charm 2016Avoiding the Pitfalls of Hunting - BSides Charm 2016
Avoiding the Pitfalls of Hunting - BSides Charm 2016
Tony Cook1.3K views
Hunting on the Cheap by EndgameInc
Hunting on the CheapHunting on the Cheap
Hunting on the Cheap
EndgameInc1.6K views
Understanding advanced persistent threats (APT) by Dan Morrill
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
Dan Morrill7.3K views
Digital Forensics and Incident Response (DFIR) Training Session - January by Infocyte
Digital Forensics and Incident Response (DFIR) Training Session - JanuaryDigital Forensics and Incident Response (DFIR) Training Session - January
Digital Forensics and Incident Response (DFIR) Training Session - January
Infocyte541 views
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas... by Lastline, Inc.
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...
Lastline, Inc.1.3K views
How to Hunt for Lateral Movement on Your Network by Sqrrl
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your Network
Sqrrl2.8K views
Malware in the Wild: Evolving to Evade Detection by Lastline, Inc.
Malware in the Wild: Evolving to Evade DetectionMalware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade Detection
Lastline, Inc.1.8K views
Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015 by Lastline, Inc.
Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015 Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015
Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015
Lastline, Inc.649 views
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna by Lastline, Inc.
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna Now you see me, now you don't: chasing evasive malware - Giovanni Vigna
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna
Lastline, Inc.1.8K views
Infocyte Mid-market Threat and Incident Response Report Webinar by Infocyte
Infocyte Mid-market Threat and Incident Response Report WebinarInfocyte Mid-market Threat and Incident Response Report Webinar
Infocyte Mid-market Threat and Incident Response Report Webinar
Infocyte212 views
TTPs for Threat hunting In Oil Refineries by Dragos, Inc.
TTPs for Threat hunting In Oil RefineriesTTPs for Threat hunting In Oil Refineries
TTPs for Threat hunting In Oil Refineries
Dragos, Inc.428 views
encase enterprise by Damir Delija
 encase enterprise  encase enterprise
encase enterprise
Damir Delija3.8K views
Introduction to the advanced persistent threat and hactivism by Global Micro Solutions
Introduction to the advanced persistent threat and hactivismIntroduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivism
Hunting on the cheap by Anjum Ahuja
Hunting on the cheapHunting on the cheap
Hunting on the cheap
Anjum Ahuja329 views

Viewers also liked

Proactive Measures to Defeat Insider Threat by
Proactive Measures to Defeat Insider ThreatProactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider ThreatAndrew Case
1.4K views23 slides
Hunting Mac Malware with Memory Forensics by
Hunting Mac Malware with Memory ForensicsHunting Mac Malware with Memory Forensics
Hunting Mac Malware with Memory ForensicsAndrew Case
752 views42 slides
De-Anonymizing Live CDs through Physical Memory Analysis by
De-Anonymizing Live CDs through Physical Memory AnalysisDe-Anonymizing Live CDs through Physical Memory Analysis
De-Anonymizing Live CDs through Physical Memory AnalysisAndrew Case
1.5K views61 slides
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ... by
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...Andrew Case
1.5K views43 slides
Mac Memory Analysis with Volatility by
Mac Memory Analysis with VolatilityMac Memory Analysis with Volatility
Mac Memory Analysis with VolatilityAndrew Case
6K views58 slides
Memory Analysis of the Dalvik (Android) Virtual Machine by
Memory Analysis of the Dalvik (Android) Virtual MachineMemory Analysis of the Dalvik (Android) Virtual Machine
Memory Analysis of the Dalvik (Android) Virtual MachineAndrew Case
2.9K views47 slides

Viewers also liked(20)

Proactive Measures to Defeat Insider Threat by Andrew Case
Proactive Measures to Defeat Insider ThreatProactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider Threat
Andrew Case1.4K views
Hunting Mac Malware with Memory Forensics by Andrew Case
Hunting Mac Malware with Memory ForensicsHunting Mac Malware with Memory Forensics
Hunting Mac Malware with Memory Forensics
Andrew Case752 views
De-Anonymizing Live CDs through Physical Memory Analysis by Andrew Case
De-Anonymizing Live CDs through Physical Memory AnalysisDe-Anonymizing Live CDs through Physical Memory Analysis
De-Anonymizing Live CDs through Physical Memory Analysis
Andrew Case1.5K views
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ... by Andrew Case
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...
Andrew Case1.5K views
Mac Memory Analysis with Volatility by Andrew Case
Mac Memory Analysis with VolatilityMac Memory Analysis with Volatility
Mac Memory Analysis with Volatility
Andrew Case6K views
Memory Analysis of the Dalvik (Android) Virtual Machine by Andrew Case
Memory Analysis of the Dalvik (Android) Virtual MachineMemory Analysis of the Dalvik (Android) Virtual Machine
Memory Analysis of the Dalvik (Android) Virtual Machine
Andrew Case2.9K views
Security Analytics for Data Discovery - Closing the SIEM Gap by Eric Johansen, CISSP
Security Analytics for Data Discovery - Closing the SIEM GapSecurity Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM Gap
Linux Memory Analysis with Volatility by Andrew Case
Linux Memory Analysis with VolatilityLinux Memory Analysis with Volatility
Linux Memory Analysis with Volatility
Andrew Case2.5K views
OMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity by Andrew Case
OMFW 2012: Analyzing Linux Kernel Rootkits with VolatlityOMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
OMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
Andrew Case839 views
Hunting before a Known Incident by EndgameInc
Hunting before a Known IncidentHunting before a Known Incident
Hunting before a Known Incident
EndgameInc1.4K views
Unmasking Careto through Memory Forensics (video in description) by Andrew Case
Unmasking Careto through Memory Forensics (video in description)Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)
Andrew Case1.7K views
Cyber threat Intelligence and Incident Response by:-Sandeep Singh by OWASP Delhi
Cyber threat Intelligence and Incident Response by:-Sandeep SinghCyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
OWASP Delhi2.8K views
Next Generation Memory Forensics by Andrew Case
Next Generation Memory ForensicsNext Generation Memory Forensics
Next Generation Memory Forensics
Andrew Case2K views
Building a Successful Threat Hunting Program by Carl C. Manion
Building a Successful Threat Hunting ProgramBuilding a Successful Threat Hunting Program
Building a Successful Threat Hunting Program
Carl C. Manion1.1K views
Workshop - Linux Memory Analysis with Volatility by Andrew Case
Workshop - Linux Memory Analysis with VolatilityWorkshop - Linux Memory Analysis with Volatility
Workshop - Linux Memory Analysis with Volatility
Andrew Case6.5K views
Abstract Tools for Effective Threat Hunting by chrissanders88
Abstract Tools for Effective Threat HuntingAbstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat Hunting
chrissanders881.7K views
Creating Your Own Threat Intel Through Hunting & Visualization by Raffael Marty
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & Visualization
Raffael Marty25.2K views
BSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz by Christopher Gerritz
BSidesLV 2016 - Powershell - Hunting on the Endpoint - GerritzBSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
BSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
Data Exploration with Apache Drill: Day 1 by Charles Givre
Data Exploration with Apache Drill:  Day 1Data Exploration with Apache Drill:  Day 1
Data Exploration with Apache Drill: Day 1
Charles Givre1.1K views

Similar to My Keynote from BSidesTampa 2015 (video in description)

Security Outsourcing - Couples Counseling - Atif Ghauri by
Security Outsourcing - Couples Counseling - Atif GhauriSecurity Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriAtif Ghauri
524 views38 slides
Its Not You Its Me MSSP Couples Counseling by
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples CounselingAtif Ghauri
938 views37 slides
Incident response by
Incident responseIncident response
Incident responseAnshul Gupta
1.9K views21 slides
Introduction to information security by
Introduction to information securityIntroduction to information security
Introduction to information securityKumawat Dharmpal
3.3K views45 slides
CNIT 121: 2 IR Management Handbook by
CNIT 121: 2 IR Management HandbookCNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management HandbookSam Bowne
1.9K views43 slides
A journey into Application Security by
A journey into Application SecurityA journey into Application Security
A journey into Application SecurityChristian Martorella
1.2K views49 slides

Similar to My Keynote from BSidesTampa 2015 (video in description)(20)

Security Outsourcing - Couples Counseling - Atif Ghauri by Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriSecurity Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif Ghauri
Atif Ghauri524 views
Its Not You Its Me MSSP Couples Counseling by Atif Ghauri
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples Counseling
Atif Ghauri938 views
Incident response by Anshul Gupta
Incident responseIncident response
Incident response
Anshul Gupta1.9K views
Introduction to information security by Kumawat Dharmpal
Introduction to information securityIntroduction to information security
Introduction to information security
Kumawat Dharmpal3.3K views
CNIT 121: 2 IR Management Handbook by Sam Bowne
CNIT 121: 2 IR Management HandbookCNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management Handbook
Sam Bowne1.9K views
Security Architecture by Priyank Hada
Security ArchitectureSecurity Architecture
Security Architecture
Priyank Hada497 views
Can You Really Automate Yourself Secure by Cigital
Can You Really Automate Yourself SecureCan You Really Automate Yourself Secure
Can You Really Automate Yourself Secure
Cigital352 views
RMS Security Breakfast by Rackspace
RMS Security BreakfastRMS Security Breakfast
RMS Security Breakfast
Rackspace681 views
How to build a cyber threat intelligence program by Mark Arena
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence program
Mark Arena4.4K views
Workshop incident response n handling-bssn 12 nop 2019-ignmantra by IGN MANTRA
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
IGN MANTRA457 views
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia by IGN MANTRA
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
IGN MANTRA261 views
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited by Falgun Rathod
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Falgun Rathod334 views
BAIT1103 Chapter 7 by limsh
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7
limsh2.1K views

Recently uploaded

DRBD Deep Dive - Philipp Reisner - LINBIT by
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBITShapeBlue
180 views21 slides
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... by
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...ShapeBlue
180 views18 slides
Generative AI: Shifting the AI Landscape by
Generative AI: Shifting the AI LandscapeGenerative AI: Shifting the AI Landscape
Generative AI: Shifting the AI LandscapeDeakin University
53 views55 slides
Business Analyst Series 2023 - Week 4 Session 7 by
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7DianaGray10
139 views31 slides
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... by
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...ShapeBlue
106 views12 slides
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... by
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...ShapeBlue
139 views29 slides

Recently uploaded(20)

DRBD Deep Dive - Philipp Reisner - LINBIT by ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue180 views
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... by ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue180 views
Business Analyst Series 2023 - Week 4 Session 7 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10139 views
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... by ShapeBlue
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
ShapeBlue106 views
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... by ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue139 views
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates by ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue252 views
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... by ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue198 views
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue by ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue263 views
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... by ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue132 views
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... by ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue126 views
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue by ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue135 views
The Power of Heat Decarbonisation Plans in the Built Environment by IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE79 views
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... by ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue119 views
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... by ShapeBlue
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
ShapeBlue194 views
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue by ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
ShapeBlue218 views
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... by ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue186 views
Initiating and Advancing Your Strategic GIS Governance Strategy by Safe Software
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
Safe Software176 views
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... by ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue145 views
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool by ShapeBlue
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool
ShapeBlue123 views

My Keynote from BSidesTampa 2015 (video in description)

  • 1. The Need for Proactive Threat Hunting Andrew Case @attrc
  • 2. Who Am I? • Core Volatility developer • Co-Author “Art of Memory Forensics” • Lead-investigator on large-scale investigations • Performed many RE efforts, pentests, and source code audits • BSidesNola (New Orleans) Co-Organizer
  • 3. Why is Threat Hunting Needed? • Many opaque components of the information infrastructure • You are combating a creative and adaptive adversary and thus you need a creative and adaptive analyst to find them • Statistics have shown that people are compromised for years without noticing
  • 4. What is Threat Hunting? • Searching for adversaries without a particular indicator • Dedicating time and resources to deep analysis of potentially compromised resources • See [1] for great commentary by Sean Mason and [2] for several posts by Jack Crook
  • 5. What are its Benefits? • Makes the organization proactive against attackers • Quickly find gaps in system and application configurations • Defenders more familiar with their own environment and infrastructure • Documentation leads to organizational knowledge
  • 6. Gaining Familiarity • Understanding and defining “normal” in order to detect anomalous behavior and attributes • “normal” is unique to a particular organization and even subsets within the organization – “normal” of a web server is quite different than the system of Joe in accounting • Unfamiliarity with “normal” leads to extremely ineffective response
  • 7. Running Processes • If your analysts were given a list of every process running on a system in your environment, how many of them could definitively rule each as normal or abnormal? • How would this be judged? – Name of the process? – Path to the executable on disk? – Parent process? • Patrick Olsen has gone through great lengths to document this [5]
  • 8. Process Privileges • What privileges do each process run as? • Do any 3rd party programs abuse privileges or grant themselves higher privileges than necessary? • Do you know which of your users run as local admin?
  • 9. Network Activity • Which applications should be listening for network connections? • Which applications should talk on the network? • Is there any ingress/egress filtering? – Has it been disabled or tampered with by malware/attackers?
  • 10. Kernel Drivers • Kernel drivers have full access to entirety of a system and its resources • A default Windows 7 install loads over 100 kernel drivers • Two of the following drivers are normal, two are Stuxnet, do your analysts know which? – MRxCls – MRxDAV – MRxNet – MRxSMB
  • 11. Persistence Mechanisms • More than just AutoRun Keys • “Beyond the Run Key”, 26 (now 27) part and counting blog post series by Adam Blaszczyk on forensics of Windows persistence mechanisms [4]
  • 12. Scheduled Tasks • Default Windows 7 install has numerous scheduled tasks by default • 3rd party applications create them to check for updates, run maintenance scripts, and so on • Adversaries also leave scheduled tasks behind… • Triggers: [6]
  • 13. Services • Like Scheduled Tasks, many will be installed by default and 3rd party applications will create their own • Sophisticated threat groups also like to install services – Can be very manual and time consuming to detect malicious services, even with memory forensics analysis
  • 14. Anti-Virus & HIPs • Often act like malware to gain visibility into the system • Need to be filtered/whitelisted from any rootkit detection tools • Changes in AV/HIPs algorithms requires changes in filters
  • 15. Documentation is Org Knowledge • Team members should not live in a silo – “normal” should be documented in a way that other team members can access • Documentation outlives employees leaving and scales during incidents – Do not allow “Brents” to be created • If your entire IR team mutinied tomorrow, how long would it take for new hires to regain all the departing knowledge?
  • 16. What is the End Result? • Proactive detection of threats • Effective detection and response • IR teams that deeply understand their environment • Organizational knowledge that continues to grow and survives generations of employees
  • 17. How Do You Get There? • The executives need to understand the value of a properly prepared IR team • The IR team must be elevated to the status of the IT Security team and be just as an integral a part of the organization’s ongoing IT flow
  • 18. Security vs IR • Security teams are positioned during all parts of the IT process while IR is used only during incidents • This leads to IR staff not being effectively utilized and not being an on-going part of the organization
  • 19. IT Security Pre-Deployment • Baseline testing of gold images – Security evaluations done well before production use • Application development – Secure SDLC • Secure DevOps – Incorporating security into cloud deployments – Richard Mogull does great work in this space [3]
  • 20. IT Security Post-Deployment • Continuous: – Vulnerability scans – Penetration tests – Application security assessments
  • 21. IR is Embedded Into Nothing • It is always after the fact • This leaves knowledge gaps and forces on-the- spot learning during incidents • How do we fix this?
  • 22. Incorporating the IR Team Pre-Deployment • As security reviews gold images, the IR team should be building baselines and looking for logging misconfigurations that prevent full forensic exploitation • Applications should be developed and configured so that all relevant activity is logged and recoverable
  • 23. Incorporating the IR Team Post-Deployment • Continuous: – Threat hunting – Documentation of changes to systems and applications – Incorporation of new forensics artifacts into analysis processes
  • 24. Incident Preparedness • IT security has dedicated systems for vulnerability scanning, application testing, etc. • IR teams need dedicated, pre-configured systems to effectively hunt as well as respond to incidents
  • 25. Incident Preparedness Essentials • Network monitoring • Dedicated storage servers • Deployable acquisition/sampling tools and agents • Analysis servers with real processing power • Without these and others, response will be chaotic, underpowered, and likely ineffective
  • 26. Utilizing Documentation • As the IR team becomes embedded, everything it learns should be documented • If done correctly, everything that is known from a forensics perspective about a system and its applications will be readily available to all team members
  • 27. Documentation into Internal Training • New hires can be pointed to documentation of all assets on the network and their forensic value and artifacts • Ongoing internal training can focus on new artifacts discovered during all phases of the IR team’s involvement • A great post by Jack Crook that covers this topic [7]
  • 28. Helping Outside Parties • Only a handful of organizations can completely handle major breaches internally • Giving organized access to 3rd party analysts makes their effort more effective and accomplished in a shorter amount of time • To accomplish this, documentation and analysis infrastructure must be setup before a breach
  • 30. Spending: Security vs IR Preparedness • If “Shell Shock 2” were to be released right now would you feel better knowing your systems were fully patched (hence vulnerable) or that you had a fully prepared IR team that can handle the outbreak effectively? • Does your organization’s resource allocation reflect your feelings on this?
  • 31. Steps – Preparing for a Hunt 1. Free up your IR teams time to prepare for hunting 2. Create a plan that will lead to documentation of all your hunting and response efforts 3. Start small 4. Refine 5. Move to team wide hunts 6. Create challenges and internal training based on real events
  • 32. Steps – Embedding IR into IT 1. Convince executives of the need 2. Update policy to ensure IR has a hand in ongoing operations just like security does 3. Document everything learned 4. Incorporate what is learned into analysis during hunts and incident handling
  • 33. Conclusions • Threat hunting is one of the best tools available to organizations in order to stay ahead of adversaries • You should aim to minimize the space attackers can work where you will not find them • Don’t wait on a vendor or the FBI to notify you of breaches – be active and find them yourself!
  • 34. Questions/Comments? • Contact information: – andrew@dfir.org (0xB2446B45) – @attrc
  • 35. References [1] http://seanmason.com/2014/12/09/a-hunting-we-will-go/ [2] http://blog.handlerdiaries.com/?s=hunting&submit=Search [3] http://2014.video.sector.ca/video/110341603 [4] http://www.hexacorn.com/blog/ [5] https://sysforensics.org/2014/01/know-your-windows- processes.html [6] https://technet.microsoft.com/en-us/library/cc748841.aspx [7] http://blog.handlerdiaries.com/?p=437