SlideShare a Scribd company logo
1 of 13
Download to read offline
IPLOG?
A beginner's IDS for the WIN!v0.2
IPLOG, provides the beginner
sysadmin with actionable
network intelligence, without the
complexities of more advanced
IDS solutions.
The purpose of an IDS.
Actionable & Timely Intelligence.
● Open Source Solutions
– Suricata
– TcpDump / Wireshark
– SNORT
– IPLOG
The Problems
● Suricata.
– It exists, that's all I know about it.
– If you know more about it, be ready for the Q & A!
– Next point. :-)
● TcpDump / Wireshark.
– Skills
● Can you read a pcap like a book?
● Can you dissect TCP/IP in your head?
● We are at a BSides, maybe some of you can.
– Speed
● Can you do all the above at 10 MB/s?
● Actionable? Yes. Timely? No.
The Problems Contd
SNORT Complexity
● IDS - SNORT has LOTS of options.
● Rule Management.
– Which set or sets?
● Community.
● ET.
● VRT.
● Custom.
– Which update solution?
● Oinkmaster.
● Pulled Pork.
The Problems Contd
SNORT Complexity Contd
● Logs - Here comes LOTS of DATA!
– Which DB?
● Mysql.
● Postgresql.
– SNORT -> DB interface? - Barnyard2
● A Web APP
– Web Server Deployment.
– Web App Deployment.
– Some Web Apps.
● BASE
● Snorby
● Sguil
The Problems Contd
SNORT Contd
● Skills
– Learn everything just mentioned.
– Tune your rule sets to eliminate the noise.
● Speed.
– Actionable? Yes.
– Timely? Yes.
● After your rule set is tuned.
● After you get current on the logs. :-)
A solution, IPLOG.
What is IPLOG?
● Open Source Software.
● Written by Ryan McCabe in 2000.
● github.com/NathanGibbs3/iplog
● Simple, but not tcpdump.
IPLOG
What does it do.
● Connection Logging
● Scan Detection
– TCP Port Scans.
– TCP SYN Scans.
– TCP null Scans.
– FIN Scans.
– TCP "Xmas" Scans.
– UDP Scans.
● Attack Detection
– ICMP ping floods.
– UDP and ICMP
"smurf" attacks.
– IP fragment attacks.
– Bogus TCP flags.
● NMAP Scan evasion.
( Experimental )
IPLOG
Logging
● Syslog or text file
● Log Sample
Jan 1 00:26:25 TCP: Bogus TCP flags set by 157.55.33.14:28256 (dest port 80)
Jan 1 02:24:03 UDP: scan/flood detected [port 500] from 124.126.133.120 [port 500]
Jan 1 02:24:10 ICMP: 194.187.150.110 time exceeded (udp: dest port 32887, source port 51413)
Jan 1 02:24:44 ICMP: 196.200.48.10 time exceeded (tcp: dest port 63473, source port 47785)
Jan 1 02:24:45 ICMP: 196.200.48.10 time exceeded (tcp: dest port 63473, source port 44733)
Jan 1 02:25:09 UDP: scan/flood mode expired for 124.126.133.120 - received a total of 36 packets
(14616 bytes).
Jan 1 02:26:18 ICMP: echo from 129.82.138.44 (12 bytes)
Jan 1 02:26:26 ICMP: 194.187.150.110 time exceeded (udp: dest port 51731, source port 51413)
Jan 1 02:29:15 last message repeated 1 times
Jan 1 02:29:15 TCP: ms-sql-s connection attempt from 115.239.226.51:6000
Jan 1 02:30:26 UDP: dgram to isakmp from 124.126.133.120:500 (412 data bytes)
Jan 1 02:30:26 UDP: dgram to isakmp from 124.126.133.120:500 (384 data bytes)
IPLOG
Misc.
● Can filter out noise.
– Config Example.
# gtld Name Servers
ignore udp from 192.5.6.30 sport 53
ignore udp from 192.12.94.30 sport 53
ignore udp from 192.26.92.30 sport 53
ignore udp from 192.31.80.30 sport 53
ignore udp from 192.33.14.30 sport 53
ignore udp from 192.35.51.30 sport 53
● A newer version of IPLOG. ( 2.2.5 )
github.com/NathanGibbs3/iplog
Contact Information.
● Email: nathan@cmpublishers.com
● Twitter: @Christ_Media
● Linkedin: linkedin.com/in/nategibbs
● Slideshare: slideshare.net/NathanGibbs3
● GitHub: github.com/NathanGibbs3
● Web Site: www.cmpublishers.com/oss
Thank You!
● Jesus Christ.
● Family & Friends.
● BSides ROC.
● Ryan McCabe.
Q & A
?

More Related Content

What's hot

Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniques
amiable_indian
 
TCPdump-Wireshark
TCPdump-WiresharkTCPdump-Wireshark
TCPdump-Wireshark
Harsh Singh
 

What's hot (18)

Nmap
NmapNmap
Nmap
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniques
 
Nmap commands
Nmap commandsNmap commands
Nmap commands
 
N map presentation
N map presentationN map presentation
N map presentation
 
NMAP by Shrikant Antre & Shobhit Gautam
NMAP by Shrikant Antre & Shobhit GautamNMAP by Shrikant Antre & Shobhit Gautam
NMAP by Shrikant Antre & Shobhit Gautam
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit BasicsNetwork Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
 
Nmap
NmapNmap
Nmap
 
Nmap
NmapNmap
Nmap
 
Nmap Hacking Guide
Nmap Hacking GuideNmap Hacking Guide
Nmap Hacking Guide
 
Nmap(network mapping)
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)
 
Nmap Basics
Nmap BasicsNmap Basics
Nmap Basics
 
Network scanning with nmap
Network scanning with nmapNetwork scanning with nmap
Network scanning with nmap
 
Wireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanWireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit Ranjan
 
TCPdump-Wireshark
TCPdump-WiresharkTCPdump-Wireshark
TCPdump-Wireshark
 
Netcat
NetcatNetcat
Netcat
 
Nmap scripting engine
Nmap scripting engineNmap scripting engine
Nmap scripting engine
 
Nmap
NmapNmap
Nmap
 

Viewers also liked

X cineforum. el profesor lazhar. marzo 2013
X cineforum. el profesor lazhar. marzo 2013X cineforum. el profesor lazhar. marzo 2013
X cineforum. el profesor lazhar. marzo 2013
GCSMadrid
 
iPad / Apple TV Presentation
iPad / Apple TV PresentationiPad / Apple TV Presentation
iPad / Apple TV Presentation
sd33techht
 
HonestBeautyFinalPaper (1)
HonestBeautyFinalPaper (1)HonestBeautyFinalPaper (1)
HonestBeautyFinalPaper (1)
Sonya Joshi
 

Viewers also liked (20)

X cineforum. el profesor lazhar. marzo 2013
X cineforum. el profesor lazhar. marzo 2013X cineforum. el profesor lazhar. marzo 2013
X cineforum. el profesor lazhar. marzo 2013
 
Урок окружающего мира во 2 классе с использованием деятельностного подхода.
Урок окружающего мира во 2 классе с использованием деятельностного подхода.Урок окружающего мира во 2 классе с использованием деятельностного подхода.
Урок окружающего мира во 2 классе с использованием деятельностного подхода.
 
AppleTV in the Classrooom
AppleTV in the ClassrooomAppleTV in the Classrooom
AppleTV in the Classrooom
 
Annatto. Technical file
Annatto. Technical fileAnnatto. Technical file
Annatto. Technical file
 
Conference Paper: Random Access Preamble Format for Systems with Many Antennas
Conference Paper: Random Access Preamble Format for Systems with Many AntennasConference Paper: Random Access Preamble Format for Systems with Many Antennas
Conference Paper: Random Access Preamble Format for Systems with Many Antennas
 
Мотивация персонала: как обойти рынок? (Устьянцев)
Мотивация персонала: как обойти рынок? (Устьянцев)Мотивация персонала: как обойти рынок? (Устьянцев)
Мотивация персонала: как обойти рынок? (Устьянцев)
 
Dried oregano. Technical file
Dried oregano. Technical fileDried oregano. Technical file
Dried oregano. Technical file
 
iPad / Apple TV Presentation
iPad / Apple TV PresentationiPad / Apple TV Presentation
iPad / Apple TV Presentation
 
Presentación AAL
Presentación AALPresentación AAL
Presentación AAL
 
Conference Paper: Elastic Network Functions: opportunities and challenges
Conference Paper: Elastic Network Functions: opportunities and challengesConference Paper: Elastic Network Functions: opportunities and challenges
Conference Paper: Elastic Network Functions: opportunities and challenges
 
Cineforum de liderazgo transformador
Cineforum de liderazgo transformadorCineforum de liderazgo transformador
Cineforum de liderazgo transformador
 
Advertising: Sabra Hummus
Advertising: Sabra HummusAdvertising: Sabra Hummus
Advertising: Sabra Hummus
 
A stuA study of non-monetary rewards as a motivation tooldy of monetary rewar...
A stuA study of non-monetary rewards as a motivation tooldy of monetary rewar...A stuA study of non-monetary rewards as a motivation tooldy of monetary rewar...
A stuA study of non-monetary rewards as a motivation tooldy of monetary rewar...
 
my resume
my resumemy resume
my resume
 
RecSys 2016 Talk: Feature Selection For Human Recommenders
RecSys 2016 Talk: Feature Selection For Human RecommendersRecSys 2016 Talk: Feature Selection For Human Recommenders
RecSys 2016 Talk: Feature Selection For Human Recommenders
 
Coffee and climate change
Coffee and climate changeCoffee and climate change
Coffee and climate change
 
2600Hz - The Next Wave - KazooCon 2015
2600Hz - The Next Wave - KazooCon 2015 2600Hz - The Next Wave - KazooCon 2015
2600Hz - The Next Wave - KazooCon 2015
 
Управление цифровым обслуживанием клиентов
Управление цифровым обслуживанием клиентовУправление цифровым обслуживанием клиентов
Управление цифровым обслуживанием клиентов
 
HonestBeautyFinalPaper (1)
HonestBeautyFinalPaper (1)HonestBeautyFinalPaper (1)
HonestBeautyFinalPaper (1)
 
Работа с признаками сильной корпоративной культуры
Работа с признаками сильной корпоративной культурыРабота с признаками сильной корпоративной культуры
Работа с признаками сильной корпоративной культуры
 

Similar to IPLOG-BSidesROC-2015

IPLOG-BSides-DE-2014
IPLOG-BSides-DE-2014IPLOG-BSides-DE-2014
IPLOG-BSides-DE-2014
Leo Jotib
 
How to dominate a country
How to dominate a countryHow to dominate a country
How to dominate a country
Tiago Henriques
 
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
PROIDEA
 
How Secure is TCP/IP - A review of Network Protocol
How Secure is TCP/IP - A review of Network ProtocolHow Secure is TCP/IP - A review of Network Protocol
How Secure is TCP/IP - A review of Network Protocol
ssuserc49ec4
 

Similar to IPLOG-BSidesROC-2015 (20)

IPLOG-BSides-DE-2014
IPLOG-BSides-DE-2014IPLOG-BSides-DE-2014
IPLOG-BSides-DE-2014
 
Enei
EneiEnei
Enei
 
100 M pps on PC.
100 M pps on PC.100 M pps on PC.
100 M pps on PC.
 
Preso fcul
Preso fculPreso fcul
Preso fcul
 
How to dominate a country
How to dominate a countryHow to dominate a country
How to dominate a country
 
PLNOG16: Obsługa 100M pps na platformie PC , Przemysław Frasunek, Paweł Mała...
PLNOG16: Obsługa 100M pps na platformie PC, Przemysław Frasunek, Paweł Mała...PLNOG16: Obsługa 100M pps na platformie PC, Przemysław Frasunek, Paweł Mała...
PLNOG16: Obsługa 100M pps na platformie PC , Przemysław Frasunek, Paweł Mała...
 
DPDK layer for porting IPS-IDS
DPDK layer for porting IPS-IDSDPDK layer for porting IPS-IDS
DPDK layer for porting IPS-IDS
 
Linux Network Stack
Linux Network StackLinux Network Stack
Linux Network Stack
 
Network Programming: Data Plane Development Kit (DPDK)
Network Programming: Data Plane Development Kit (DPDK)Network Programming: Data Plane Development Kit (DPDK)
Network Programming: Data Plane Development Kit (DPDK)
 
Security Onion Advance
Security Onion AdvanceSecurity Onion Advance
Security Onion Advance
 
Introduction to DPDK
Introduction to DPDKIntroduction to DPDK
Introduction to DPDK
 
SNMP Demystified Part-I
SNMP Demystified Part-ISNMP Demystified Part-I
SNMP Demystified Part-I
 
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
 
SMP implementation for OpenBSD/sgi
SMP implementation for OpenBSD/sgiSMP implementation for OpenBSD/sgi
SMP implementation for OpenBSD/sgi
 
How Secure is TCP/IP - A review of Network Protocol
How Secure is TCP/IP - A review of Network ProtocolHow Secure is TCP/IP - A review of Network Protocol
How Secure is TCP/IP - A review of Network Protocol
 
Pcapy and dpkt - tcpdump on steroids - Ran Leibman - DevOpsDays Tel Aviv 2018
Pcapy and dpkt - tcpdump on steroids - Ran Leibman - DevOpsDays Tel Aviv 2018Pcapy and dpkt - tcpdump on steroids - Ran Leibman - DevOpsDays Tel Aviv 2018
Pcapy and dpkt - tcpdump on steroids - Ran Leibman - DevOpsDays Tel Aviv 2018
 
Master Serial Killer - DEF CON 22 - ICS Village
Master Serial Killer - DEF CON 22 - ICS VillageMaster Serial Killer - DEF CON 22 - ICS Village
Master Serial Killer - DEF CON 22 - ICS Village
 
Network traffic analysis course
Network traffic analysis courseNetwork traffic analysis course
Network traffic analysis course
 
Rip 2 docoments version 1.1 by deepak kumar
Rip 2 docoments version 1.1 by deepak kumarRip 2 docoments version 1.1 by deepak kumar
Rip 2 docoments version 1.1 by deepak kumar
 
Get rid of TLS certificates - using IPSec for large scale cloud protection
Get rid of TLS certificates - using IPSec for large scale cloud protectionGet rid of TLS certificates - using IPSec for large scale cloud protection
Get rid of TLS certificates - using IPSec for large scale cloud protection
 

IPLOG-BSidesROC-2015

  • 1. IPLOG? A beginner's IDS for the WIN!v0.2 IPLOG, provides the beginner sysadmin with actionable network intelligence, without the complexities of more advanced IDS solutions.
  • 2. The purpose of an IDS. Actionable & Timely Intelligence. ● Open Source Solutions – Suricata – TcpDump / Wireshark – SNORT – IPLOG
  • 3. The Problems ● Suricata. – It exists, that's all I know about it. – If you know more about it, be ready for the Q & A! – Next point. :-) ● TcpDump / Wireshark. – Skills ● Can you read a pcap like a book? ● Can you dissect TCP/IP in your head? ● We are at a BSides, maybe some of you can. – Speed ● Can you do all the above at 10 MB/s? ● Actionable? Yes. Timely? No.
  • 4. The Problems Contd SNORT Complexity ● IDS - SNORT has LOTS of options. ● Rule Management. – Which set or sets? ● Community. ● ET. ● VRT. ● Custom. – Which update solution? ● Oinkmaster. ● Pulled Pork.
  • 5. The Problems Contd SNORT Complexity Contd ● Logs - Here comes LOTS of DATA! – Which DB? ● Mysql. ● Postgresql. – SNORT -> DB interface? - Barnyard2 ● A Web APP – Web Server Deployment. – Web App Deployment. – Some Web Apps. ● BASE ● Snorby ● Sguil
  • 6. The Problems Contd SNORT Contd ● Skills – Learn everything just mentioned. – Tune your rule sets to eliminate the noise. ● Speed. – Actionable? Yes. – Timely? Yes. ● After your rule set is tuned. ● After you get current on the logs. :-)
  • 7. A solution, IPLOG. What is IPLOG? ● Open Source Software. ● Written by Ryan McCabe in 2000. ● github.com/NathanGibbs3/iplog ● Simple, but not tcpdump.
  • 8. IPLOG What does it do. ● Connection Logging ● Scan Detection – TCP Port Scans. – TCP SYN Scans. – TCP null Scans. – FIN Scans. – TCP "Xmas" Scans. – UDP Scans. ● Attack Detection – ICMP ping floods. – UDP and ICMP "smurf" attacks. – IP fragment attacks. – Bogus TCP flags. ● NMAP Scan evasion. ( Experimental )
  • 9. IPLOG Logging ● Syslog or text file ● Log Sample Jan 1 00:26:25 TCP: Bogus TCP flags set by 157.55.33.14:28256 (dest port 80) Jan 1 02:24:03 UDP: scan/flood detected [port 500] from 124.126.133.120 [port 500] Jan 1 02:24:10 ICMP: 194.187.150.110 time exceeded (udp: dest port 32887, source port 51413) Jan 1 02:24:44 ICMP: 196.200.48.10 time exceeded (tcp: dest port 63473, source port 47785) Jan 1 02:24:45 ICMP: 196.200.48.10 time exceeded (tcp: dest port 63473, source port 44733) Jan 1 02:25:09 UDP: scan/flood mode expired for 124.126.133.120 - received a total of 36 packets (14616 bytes). Jan 1 02:26:18 ICMP: echo from 129.82.138.44 (12 bytes) Jan 1 02:26:26 ICMP: 194.187.150.110 time exceeded (udp: dest port 51731, source port 51413) Jan 1 02:29:15 last message repeated 1 times Jan 1 02:29:15 TCP: ms-sql-s connection attempt from 115.239.226.51:6000 Jan 1 02:30:26 UDP: dgram to isakmp from 124.126.133.120:500 (412 data bytes) Jan 1 02:30:26 UDP: dgram to isakmp from 124.126.133.120:500 (384 data bytes)
  • 10. IPLOG Misc. ● Can filter out noise. – Config Example. # gtld Name Servers ignore udp from 192.5.6.30 sport 53 ignore udp from 192.12.94.30 sport 53 ignore udp from 192.26.92.30 sport 53 ignore udp from 192.31.80.30 sport 53 ignore udp from 192.33.14.30 sport 53 ignore udp from 192.35.51.30 sport 53 ● A newer version of IPLOG. ( 2.2.5 ) github.com/NathanGibbs3/iplog
  • 11. Contact Information. ● Email: nathan@cmpublishers.com ● Twitter: @Christ_Media ● Linkedin: linkedin.com/in/nategibbs ● Slideshare: slideshare.net/NathanGibbs3 ● GitHub: github.com/NathanGibbs3 ● Web Site: www.cmpublishers.com/oss
  • 12. Thank You! ● Jesus Christ. ● Family & Friends. ● BSides ROC. ● Ryan McCabe.