SlideShare a Scribd company logo
1 of 48
Overview What is Razorback?
Razorback Is… An Open Source framework (GPLv2) to enable advanced processing of data and detection of events Able to get data as it traverses the network Able to get data after it’s  received by a server Able to perform advanced event correlation …Our answer to an evolving threat landscape
The Challenge is Different Attacks have switched from server attacks to client attacks Common attack vectors are easily obfuscated Scripting languages are infinitely variable Compression obscures attack signatures And more! File formats are made by insane people Back-channel systems are increasingly difficult to detect
The Problem With Real-Time Inline systems must emulate the processing of thousands of desktops Detection of many backchannels is most successful with statistical evaluation of network traffic Deep file inspection requires too much time to process!
Fill the Gap A system is needed that can handle varied detection needs A system is needed that extensible, open and scalable A system is needed that facilitates incident response, not just triggers it
Architecture What makes it tick?
Framework Goals ,[object Object]
Provide routing of input data to any number of relevant data processors
Provide alerting to any framework-capable system
Provide verbose, detailed logging
Make intelligent use of all data,[object Object]
Data Detection/Analysis
Output
Intelligence
Correlation
Defense Update
Workstation,[object Object]
The Dispatcher ,[object Object]
Handles database interactions
Database driven
APIs are available for easy nugget development,[object Object]
General Nugget Functionality Dispatcher Registration Types of data handled Types of output generated UUIDs Identifier of nuggets Type of nugget Types of data handled and/or provided Allows for easy addition and removal of elements
Collection Nugget Capture data From the network From a network device directly From log files Contact dispatcher for handling Has this data been evaluated before? Send the data to the Dispatcher
Detection Nugget Handles incoming data from Collection Nuggets Splits incoming data into logical sub-blocks Requests additional processing of sub-blocks Provides alerting feedback to the Dispatcher
Output Nugget Receives alert notification from Dispatcher If alert is of a handled type, additional information is requested: Short Data Long Data Complete Data Block Normalized Data Block Sends output data to relevant system
Intelligence Nugget Does not generate “alerts” per se Generates data that could potentially be used later for trending or event correlation
Correlation Nugget Interacts with the database directly Provides ability to: Detect trending data Identify “hosts of interest” Track intrusions through the network Initiate defense updates
Defense Update Nugget Receives update instructions from dispatcher Performs dynamic updates of network device(s) Update multiple devices Update multiple devices of different types! Notifies dispatcher of defense update actions
Workstation Nugget Authenticates on a per-analyst basis Provides analyst with ability to: Manage nugget components Manage alerts and events Consolidate events Add custom notes Set review flags Delete events Review system logs
Concept of Operations How do they work together?
Registration Phase Nuggets are brought online Nuggets register with the dispatcher: Their existence  The data types they handle How many threads they can run at once Dispatcher tracks via routing table Dispatcher hands back a unique “nugget id”
Hi! I exist! Detection Nugget Collection Nugget registerNugget() Dispatcher registerNugget() registerNugget() registerNugget() Detection Nugget Output Nugget
Traffic comes in… Database Web traffic SMTP traffic Local Cache 5 Query Database 1 COLLECTOR 4 3 Check cache Dispatcher Threads out Data Collector API 2 6 Data/ Metadata
Dispatcher farms out detection… Database Detection Nugget Javascript  Analysis 4 Detection results Alert/Event data Embedded sub-component data 3 2 Dispatcher Detection Nugget Embedded sub-component data Detection results 1 PDF Analysis Collected data
Output nuggets are informed… Output Nugget “I come bearing gifts” Dispatcher “No, thanks” “I come bearing gifts” Output Nugget “Yes, please!” Delicious Alert Data
Cache We want to avoid reprocessing files and sub-components we’ve already looked at MD5 and size are stored for files and subcomponents both bad and good But, after an update to any detection nugget, all known-good entries are thereby declared “tainted”
Why Taint known good? Why taint known good? Previously analyzed files may be found to be bad Why not just remove those entries? We don’t want to rescan all files If we see an alert for a previously scanned file matching the same MD5 and size, we can alert retroactively
Case Study: SMTP What happens when an email is received?
Handling SMTP Traffic A PDF with a malicious embedded EXE is attached to an email How does the system work to tell us about this malicious attachment? Components in use Track the data
Current Capabilities Nuggets that are currently available.  Many more to come, and you can help!
Snort-as-a-Collector (SaaC) SMTP mail stream capture Web capture DNS capture Custom post-mortem debugger Traps applications as they crash Sends the file that triggered the crash to Dispatcher Sends the metadata of the crash to the Dispatcher Collection Nuggets
Detection Nuggets Zynamics PDF Dissector Deobfuscation and normalization of objects Target known JavaScript attacks JavaScript Analyzer (w/ Zynamics) Search for shellcode in unescaped blocks Look for heap spray Look for obvious obfuscation possibilities www.zynamics.com/dissector.html
Detection Nuggets (cont’d…) Shellcode Analyzer (w/ libemu) Detection and execution of shellcode Look for code blocks that unwrap shellcode Win32 api hooking Determine the function call Capture the arguments Provide alerts that include shellcode action libemu.carnivore.it
Detection Nuggets (cont’d…) Office Cat Nugget Full Office file parsing  Vuln-centric detection against known threats SWF Nugget Decompresses and analyzes flash Detects known flash threats
Detection Nuggets (cont’d…) ClamAV Nugget Analyze any format Signature- and pattern-based detection Updatable signature DB Can further serve as a collector  Can issue defense updates
Output Nuggets Deep Alerting System Provide full logging output of all alerts Write out each component block Include normalized view of documents as well Maltego Interface Provide data transformations targeting the Razorback database www.paterva.com
Workstation Nuggets CLI functionality to query: Alerts, events, and incidents Nugget status Display metadata Run standardized report set

More Related Content

What's hot

Treat Detection using Hadoop
Treat Detection using HadoopTreat Detection using Hadoop
Treat Detection using HadoopDataWorks Summit
 
Performing Network & Security Analytics with Hadoop
Performing Network & Security Analytics with HadoopPerforming Network & Security Analytics with Hadoop
Performing Network & Security Analytics with HadoopDataWorks Summit
 
Hadoop / Spark on Malware Expression
Hadoop / Spark on Malware ExpressionHadoop / Spark on Malware Expression
Hadoop / Spark on Malware ExpressionMapR Technologies
 
A SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMS
A SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMSA SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMS
A SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMSIJNSA Journal
 
Burning Down the Haystack to Find the Needle: Security Analytics in Action
Burning Down the Haystack to Find the Needle:  Security Analytics in ActionBurning Down the Haystack to Find the Needle:  Security Analytics in Action
Burning Down the Haystack to Find the Needle: Security Analytics in ActionJosh Sokol
 
Security Certification: Security Analytics using Sumo Logic - Oct 2018
Security Certification: Security Analytics using Sumo Logic - Oct 2018Security Certification: Security Analytics using Sumo Logic - Oct 2018
Security Certification: Security Analytics using Sumo Logic - Oct 2018Sumo Logic
 
Cyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesCyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesSandeep Kumar Seeram
 
Using Sumo Logic - Apr 2018
Using Sumo Logic - Apr 2018Using Sumo Logic - Apr 2018
Using Sumo Logic - Apr 2018Sumo Logic
 
Privacy and integrity-preserving range queries
Privacy and integrity-preserving range queriesPrivacy and integrity-preserving range queries
Privacy and integrity-preserving range queriesKeerthi Reddy Yeruva
 
Level 3 Certification: Setting up Sumo Logic - Oct 2018
Level 3 Certification: Setting up Sumo Logic - Oct  2018Level 3 Certification: Setting up Sumo Logic - Oct  2018
Level 3 Certification: Setting up Sumo Logic - Oct 2018Sumo Logic
 
Logging tracing and metrics in .NET Core and Azure - dotnetdays 2020
Logging tracing and metrics in .NET Core and Azure - dotnetdays 2020Logging tracing and metrics in .NET Core and Azure - dotnetdays 2020
Logging tracing and metrics in .NET Core and Azure - dotnetdays 2020Alex Thissen
 
Sumo Logic Cert Jam - Security Analytics
Sumo Logic Cert Jam - Security AnalyticsSumo Logic Cert Jam - Security Analytics
Sumo Logic Cert Jam - Security AnalyticsSumo Logic
 
Open Security Operations Center - OpenSOC
Open Security Operations Center - OpenSOCOpen Security Operations Center - OpenSOC
Open Security Operations Center - OpenSOCSheetal Dolas
 
Sumo Logic QuickStart Webinar - Get Certified
Sumo Logic QuickStart Webinar - Get CertifiedSumo Logic QuickStart Webinar - Get Certified
Sumo Logic QuickStart Webinar - Get CertifiedSumo Logic
 
A Practical Guide to Anomaly Detection for DevOps
A Practical Guide to Anomaly Detection for DevOpsA Practical Guide to Anomaly Detection for DevOps
A Practical Guide to Anomaly Detection for DevOpsBigPanda
 
44CON 2014: Using hadoop for malware, network, forensics and log analysis
44CON 2014: Using hadoop for malware, network, forensics and log analysis44CON 2014: Using hadoop for malware, network, forensics and log analysis
44CON 2014: Using hadoop for malware, network, forensics and log analysisMichael Boman
 
Apache metron meetup presentation at capital one
Apache metron meetup presentation at capital oneApache metron meetup presentation at capital one
Apache metron meetup presentation at capital onegvetticaden
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudeSAT Publishing House
 

What's hot (18)

Treat Detection using Hadoop
Treat Detection using HadoopTreat Detection using Hadoop
Treat Detection using Hadoop
 
Performing Network & Security Analytics with Hadoop
Performing Network & Security Analytics with HadoopPerforming Network & Security Analytics with Hadoop
Performing Network & Security Analytics with Hadoop
 
Hadoop / Spark on Malware Expression
Hadoop / Spark on Malware ExpressionHadoop / Spark on Malware Expression
Hadoop / Spark on Malware Expression
 
A SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMS
A SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMSA SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMS
A SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMS
 
Burning Down the Haystack to Find the Needle: Security Analytics in Action
Burning Down the Haystack to Find the Needle:  Security Analytics in ActionBurning Down the Haystack to Find the Needle:  Security Analytics in Action
Burning Down the Haystack to Find the Needle: Security Analytics in Action
 
Security Certification: Security Analytics using Sumo Logic - Oct 2018
Security Certification: Security Analytics using Sumo Logic - Oct 2018Security Certification: Security Analytics using Sumo Logic - Oct 2018
Security Certification: Security Analytics using Sumo Logic - Oct 2018
 
Cyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on ExamplesCyber Defense Forensic Analyst - Real World Hands-on Examples
Cyber Defense Forensic Analyst - Real World Hands-on Examples
 
Using Sumo Logic - Apr 2018
Using Sumo Logic - Apr 2018Using Sumo Logic - Apr 2018
Using Sumo Logic - Apr 2018
 
Privacy and integrity-preserving range queries
Privacy and integrity-preserving range queriesPrivacy and integrity-preserving range queries
Privacy and integrity-preserving range queries
 
Level 3 Certification: Setting up Sumo Logic - Oct 2018
Level 3 Certification: Setting up Sumo Logic - Oct  2018Level 3 Certification: Setting up Sumo Logic - Oct  2018
Level 3 Certification: Setting up Sumo Logic - Oct 2018
 
Logging tracing and metrics in .NET Core and Azure - dotnetdays 2020
Logging tracing and metrics in .NET Core and Azure - dotnetdays 2020Logging tracing and metrics in .NET Core and Azure - dotnetdays 2020
Logging tracing and metrics in .NET Core and Azure - dotnetdays 2020
 
Sumo Logic Cert Jam - Security Analytics
Sumo Logic Cert Jam - Security AnalyticsSumo Logic Cert Jam - Security Analytics
Sumo Logic Cert Jam - Security Analytics
 
Open Security Operations Center - OpenSOC
Open Security Operations Center - OpenSOCOpen Security Operations Center - OpenSOC
Open Security Operations Center - OpenSOC
 
Sumo Logic QuickStart Webinar - Get Certified
Sumo Logic QuickStart Webinar - Get CertifiedSumo Logic QuickStart Webinar - Get Certified
Sumo Logic QuickStart Webinar - Get Certified
 
A Practical Guide to Anomaly Detection for DevOps
A Practical Guide to Anomaly Detection for DevOpsA Practical Guide to Anomaly Detection for DevOps
A Practical Guide to Anomaly Detection for DevOps
 
44CON 2014: Using hadoop for malware, network, forensics and log analysis
44CON 2014: Using hadoop for malware, network, forensics and log analysis44CON 2014: Using hadoop for malware, network, forensics and log analysis
44CON 2014: Using hadoop for malware, network, forensics and log analysis
 
Apache metron meetup presentation at capital one
Apache metron meetup presentation at capital oneApache metron meetup presentation at capital one
Apache metron meetup presentation at capital one
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
 

Viewers also liked

Mecatronica 100427015000-phpapp02
Mecatronica 100427015000-phpapp02Mecatronica 100427015000-phpapp02
Mecatronica 100427015000-phpapp02martilloth
 
Apestaartjaren 'Je privacysettings uitgeplozen'
Apestaartjaren 'Je privacysettings uitgeplozen'Apestaartjaren 'Je privacysettings uitgeplozen'
Apestaartjaren 'Je privacysettings uitgeplozen'NelBro
 
Why st joseph.pptx2010.ppsxfor web
Why st joseph.pptx2010.ppsxfor webWhy st joseph.pptx2010.ppsxfor web
Why st joseph.pptx2010.ppsxfor webcampsoupmom
 
Dwm l ab_manual_final
Dwm l ab_manual_finalDwm l ab_manual_final
Dwm l ab_manual_finalVarsha Patil
 
Short Feltest products presentation
Short Feltest products presentationShort Feltest products presentation
Short Feltest products presentationMarcel Lensvelt
 
как избавиться от живота
как избавиться от животакак избавиться от живота
как избавиться от животаMark Klein
 
Artikel voor Jeugd in School en Wereld: Samenhang door samenwerken
Artikel voor Jeugd in School en Wereld: Samenhang door samenwerkenArtikel voor Jeugd in School en Wereld: Samenhang door samenwerken
Artikel voor Jeugd in School en Wereld: Samenhang door samenwerkenStichting sAmen Leren Geloven
 
Artikel voor Artificium: Exemplarisch onderwijs en catechese
Artikel voor Artificium: Exemplarisch onderwijs en catecheseArtikel voor Artificium: Exemplarisch onderwijs en catechese
Artikel voor Artificium: Exemplarisch onderwijs en catecheseStichting sAmen Leren Geloven
 
Java7 - Top 10 Features
Java7 - Top 10 FeaturesJava7 - Top 10 Features
Java7 - Top 10 FeaturesAndreas Enbohm
 
Software Craftsmanship
Software CraftsmanshipSoftware Craftsmanship
Software CraftsmanshipAndreas Enbohm
 
Holborn Quarterly Markets Review - Q3 2016
Holborn Quarterly Markets Review - Q3 2016Holborn Quarterly Markets Review - Q3 2016
Holborn Quarterly Markets Review - Q3 2016petebarr
 
Short and long vowels sounds
Short and long vowels soundsShort and long vowels sounds
Short and long vowels soundsKasey2182
 

Viewers also liked (18)

Mecatronica 100427015000-phpapp02
Mecatronica 100427015000-phpapp02Mecatronica 100427015000-phpapp02
Mecatronica 100427015000-phpapp02
 
Apestaartjaren 'Je privacysettings uitgeplozen'
Apestaartjaren 'Je privacysettings uitgeplozen'Apestaartjaren 'Je privacysettings uitgeplozen'
Apestaartjaren 'Je privacysettings uitgeplozen'
 
Why st joseph.pptx2010.ppsxfor web
Why st joseph.pptx2010.ppsxfor webWhy st joseph.pptx2010.ppsxfor web
Why st joseph.pptx2010.ppsxfor web
 
Grammar
GrammarGrammar
Grammar
 
Dwm l ab_manual_final
Dwm l ab_manual_finalDwm l ab_manual_final
Dwm l ab_manual_final
 
TRU Russian Presentation 2017
TRU Russian Presentation 2017TRU Russian Presentation 2017
TRU Russian Presentation 2017
 
TRU 2017 Recruitment
TRU 2017 RecruitmentTRU 2017 Recruitment
TRU 2017 Recruitment
 
Short Feltest products presentation
Short Feltest products presentationShort Feltest products presentation
Short Feltest products presentation
 
как избавиться от живота
как избавиться от животакак избавиться от живота
как избавиться от живота
 
Artikel voor Jeugd in School en Wereld: Samenhang door samenwerken
Artikel voor Jeugd in School en Wereld: Samenhang door samenwerkenArtikel voor Jeugd in School en Wereld: Samenhang door samenwerken
Artikel voor Jeugd in School en Wereld: Samenhang door samenwerken
 
Artikel voor Zone: Het Leven Beschouwen
Artikel voor Zone: Het Leven BeschouwenArtikel voor Zone: Het Leven Beschouwen
Artikel voor Zone: Het Leven Beschouwen
 
Artikel voor Artificium: Exemplarisch onderwijs en catechese
Artikel voor Artificium: Exemplarisch onderwijs en catecheseArtikel voor Artificium: Exemplarisch onderwijs en catechese
Artikel voor Artificium: Exemplarisch onderwijs en catechese
 
Scala
ScalaScala
Scala
 
Java7 - Top 10 Features
Java7 - Top 10 FeaturesJava7 - Top 10 Features
Java7 - Top 10 Features
 
Software Craftsmanship
Software CraftsmanshipSoftware Craftsmanship
Software Craftsmanship
 
Holborn Quarterly Markets Review - Q3 2016
Holborn Quarterly Markets Review - Q3 2016Holborn Quarterly Markets Review - Q3 2016
Holborn Quarterly Markets Review - Q3 2016
 
Hybrid Applications
Hybrid ApplicationsHybrid Applications
Hybrid Applications
 
Short and long vowels sounds
Short and long vowels soundsShort and long vowels sounds
Short and long vowels sounds
 

Similar to Razorback slides-1.1

Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisGTKlondike
 
First Responders Course - Session 4 - Forensic Readiness [2004]
First Responders Course - Session 4 - Forensic Readiness [2004]First Responders Course - Session 4 - Forensic Readiness [2004]
First Responders Course - Session 4 - Forensic Readiness [2004]Phil Huggins FBCS CITP
 
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...John Bambenek
 
Intro2 malwareanalysisshort
Intro2 malwareanalysisshortIntro2 malwareanalysisshort
Intro2 malwareanalysisshortVincent Ohprecio
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservitychennuruvishnu
 
Chapter 1 organizing data vantage domain action and validity
Chapter 1  organizing data  vantage domain action and validityChapter 1  organizing data  vantage domain action and validity
Chapter 1 organizing data vantage domain action and validityPhu Nguyen
 
Big Data Security Analytic Solution using Splunk
Big Data Security Analytic Solution using SplunkBig Data Security Analytic Solution using Splunk
Big Data Security Analytic Solution using SplunkIJERA Editor
 
TechEd NZ 2014: Intelligent Systems Service - Concept, Code and Demo
TechEd NZ 2014: Intelligent Systems Service - Concept, Code and DemoTechEd NZ 2014: Intelligent Systems Service - Concept, Code and Demo
TechEd NZ 2014: Intelligent Systems Service - Concept, Code and DemoIntergen
 
Chapter 12Searching the Network1Purpose of Inves.docx
Chapter 12Searching the Network1Purpose of Inves.docxChapter 12Searching the Network1Purpose of Inves.docx
Chapter 12Searching the Network1Purpose of Inves.docxketurahhazelhurst
 
Application Programming Interface
Application Programming InterfaceApplication Programming Interface
Application Programming InterfaceSeculert
 
How to protect your corporate from advanced attacks
How to protect your corporate from advanced attacksHow to protect your corporate from advanced attacks
How to protect your corporate from advanced attacksMicrosoft
 
Project in malware analysis:C2C
Project in malware analysis:C2CProject in malware analysis:C2C
Project in malware analysis:C2CFabrizio Farinacci
 
Ece seminar 20070927
Ece seminar 20070927Ece seminar 20070927
Ece seminar 20070927Todd Deshane
 
Graph The Planet 2019 - Intrusion Detection with Graphs
Graph The Planet 2019 - Intrusion Detection with GraphsGraph The Planet 2019 - Intrusion Detection with Graphs
Graph The Planet 2019 - Intrusion Detection with GraphsMatt Swann
 
Monitoring With Alterpoint And Cs Mars
Monitoring With Alterpoint And Cs MarsMonitoring With Alterpoint And Cs Mars
Monitoring With Alterpoint And Cs Marsamit_monty
 
Penetration testing, What’s this?
Penetration testing, What’s this?Penetration testing, What’s this?
Penetration testing, What’s this?Dmitry Evteev
 
Logging, tracing and metrics: Instrumentation in .NET 5 and Azure
Logging, tracing and metrics: Instrumentation in .NET 5 and AzureLogging, tracing and metrics: Instrumentation in .NET 5 and Azure
Logging, tracing and metrics: Instrumentation in .NET 5 and AzureAlex Thissen
 
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...Kevin Mao
 

Similar to Razorback slides-1.1 (20)

Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysis
 
First Responders Course - Session 4 - Forensic Readiness [2004]
First Responders Course - Session 4 - Forensic Readiness [2004]First Responders Course - Session 4 - Forensic Readiness [2004]
First Responders Course - Session 4 - Forensic Readiness [2004]
 
File access auditing
File access auditingFile access auditing
File access auditing
 
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
Cybercrime and Computer Forensics Seminar - Chicago Bar Association CLE May 2...
 
Intro2 malwareanalysisshort
Intro2 malwareanalysisshortIntro2 malwareanalysisshort
Intro2 malwareanalysisshort
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
 
Chapter 1 organizing data vantage domain action and validity
Chapter 1  organizing data  vantage domain action and validityChapter 1  organizing data  vantage domain action and validity
Chapter 1 organizing data vantage domain action and validity
 
Big Data Security Analytic Solution using Splunk
Big Data Security Analytic Solution using SplunkBig Data Security Analytic Solution using Splunk
Big Data Security Analytic Solution using Splunk
 
TechEd NZ 2014: Intelligent Systems Service - Concept, Code and Demo
TechEd NZ 2014: Intelligent Systems Service - Concept, Code and DemoTechEd NZ 2014: Intelligent Systems Service - Concept, Code and Demo
TechEd NZ 2014: Intelligent Systems Service - Concept, Code and Demo
 
Chapter 12Searching the Network1Purpose of Inves.docx
Chapter 12Searching the Network1Purpose of Inves.docxChapter 12Searching the Network1Purpose of Inves.docx
Chapter 12Searching the Network1Purpose of Inves.docx
 
Application Programming Interface
Application Programming InterfaceApplication Programming Interface
Application Programming Interface
 
How to protect your corporate from advanced attacks
How to protect your corporate from advanced attacksHow to protect your corporate from advanced attacks
How to protect your corporate from advanced attacks
 
Project in malware analysis:C2C
Project in malware analysis:C2CProject in malware analysis:C2C
Project in malware analysis:C2C
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 
Ece seminar 20070927
Ece seminar 20070927Ece seminar 20070927
Ece seminar 20070927
 
Graph The Planet 2019 - Intrusion Detection with Graphs
Graph The Planet 2019 - Intrusion Detection with GraphsGraph The Planet 2019 - Intrusion Detection with Graphs
Graph The Planet 2019 - Intrusion Detection with Graphs
 
Monitoring With Alterpoint And Cs Mars
Monitoring With Alterpoint And Cs MarsMonitoring With Alterpoint And Cs Mars
Monitoring With Alterpoint And Cs Mars
 
Penetration testing, What’s this?
Penetration testing, What’s this?Penetration testing, What’s this?
Penetration testing, What’s this?
 
Logging, tracing and metrics: Instrumentation in .NET 5 and Azure
Logging, tracing and metrics: Instrumentation in .NET 5 and AzureLogging, tracing and metrics: Instrumentation in .NET 5 and Azure
Logging, tracing and metrics: Instrumentation in .NET 5 and Azure
 
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
Achieving Real-time Ingestion and Analysis of Security Events through Kafka a...
 

Razorback slides-1.1

  • 1.
  • 2. Overview What is Razorback?
  • 3. Razorback Is… An Open Source framework (GPLv2) to enable advanced processing of data and detection of events Able to get data as it traverses the network Able to get data after it’s received by a server Able to perform advanced event correlation …Our answer to an evolving threat landscape
  • 4. The Challenge is Different Attacks have switched from server attacks to client attacks Common attack vectors are easily obfuscated Scripting languages are infinitely variable Compression obscures attack signatures And more! File formats are made by insane people Back-channel systems are increasingly difficult to detect
  • 5. The Problem With Real-Time Inline systems must emulate the processing of thousands of desktops Detection of many backchannels is most successful with statistical evaluation of network traffic Deep file inspection requires too much time to process!
  • 6. Fill the Gap A system is needed that can handle varied detection needs A system is needed that extensible, open and scalable A system is needed that facilitates incident response, not just triggers it
  • 8.
  • 9. Provide routing of input data to any number of relevant data processors
  • 10. Provide alerting to any framework-capable system
  • 12.
  • 18.
  • 19.
  • 22.
  • 23. General Nugget Functionality Dispatcher Registration Types of data handled Types of output generated UUIDs Identifier of nuggets Type of nugget Types of data handled and/or provided Allows for easy addition and removal of elements
  • 24. Collection Nugget Capture data From the network From a network device directly From log files Contact dispatcher for handling Has this data been evaluated before? Send the data to the Dispatcher
  • 25. Detection Nugget Handles incoming data from Collection Nuggets Splits incoming data into logical sub-blocks Requests additional processing of sub-blocks Provides alerting feedback to the Dispatcher
  • 26. Output Nugget Receives alert notification from Dispatcher If alert is of a handled type, additional information is requested: Short Data Long Data Complete Data Block Normalized Data Block Sends output data to relevant system
  • 27. Intelligence Nugget Does not generate “alerts” per se Generates data that could potentially be used later for trending or event correlation
  • 28. Correlation Nugget Interacts with the database directly Provides ability to: Detect trending data Identify “hosts of interest” Track intrusions through the network Initiate defense updates
  • 29. Defense Update Nugget Receives update instructions from dispatcher Performs dynamic updates of network device(s) Update multiple devices Update multiple devices of different types! Notifies dispatcher of defense update actions
  • 30. Workstation Nugget Authenticates on a per-analyst basis Provides analyst with ability to: Manage nugget components Manage alerts and events Consolidate events Add custom notes Set review flags Delete events Review system logs
  • 31. Concept of Operations How do they work together?
  • 32. Registration Phase Nuggets are brought online Nuggets register with the dispatcher: Their existence The data types they handle How many threads they can run at once Dispatcher tracks via routing table Dispatcher hands back a unique “nugget id”
  • 33. Hi! I exist! Detection Nugget Collection Nugget registerNugget() Dispatcher registerNugget() registerNugget() registerNugget() Detection Nugget Output Nugget
  • 34. Traffic comes in… Database Web traffic SMTP traffic Local Cache 5 Query Database 1 COLLECTOR 4 3 Check cache Dispatcher Threads out Data Collector API 2 6 Data/ Metadata
  • 35. Dispatcher farms out detection… Database Detection Nugget Javascript Analysis 4 Detection results Alert/Event data Embedded sub-component data 3 2 Dispatcher Detection Nugget Embedded sub-component data Detection results 1 PDF Analysis Collected data
  • 36. Output nuggets are informed… Output Nugget “I come bearing gifts” Dispatcher “No, thanks” “I come bearing gifts” Output Nugget “Yes, please!” Delicious Alert Data
  • 37. Cache We want to avoid reprocessing files and sub-components we’ve already looked at MD5 and size are stored for files and subcomponents both bad and good But, after an update to any detection nugget, all known-good entries are thereby declared “tainted”
  • 38. Why Taint known good? Why taint known good? Previously analyzed files may be found to be bad Why not just remove those entries? We don’t want to rescan all files If we see an alert for a previously scanned file matching the same MD5 and size, we can alert retroactively
  • 39. Case Study: SMTP What happens when an email is received?
  • 40. Handling SMTP Traffic A PDF with a malicious embedded EXE is attached to an email How does the system work to tell us about this malicious attachment? Components in use Track the data
  • 41. Current Capabilities Nuggets that are currently available. Many more to come, and you can help!
  • 42. Snort-as-a-Collector (SaaC) SMTP mail stream capture Web capture DNS capture Custom post-mortem debugger Traps applications as they crash Sends the file that triggered the crash to Dispatcher Sends the metadata of the crash to the Dispatcher Collection Nuggets
  • 43. Detection Nuggets Zynamics PDF Dissector Deobfuscation and normalization of objects Target known JavaScript attacks JavaScript Analyzer (w/ Zynamics) Search for shellcode in unescaped blocks Look for heap spray Look for obvious obfuscation possibilities www.zynamics.com/dissector.html
  • 44. Detection Nuggets (cont’d…) Shellcode Analyzer (w/ libemu) Detection and execution of shellcode Look for code blocks that unwrap shellcode Win32 api hooking Determine the function call Capture the arguments Provide alerts that include shellcode action libemu.carnivore.it
  • 45. Detection Nuggets (cont’d…) Office Cat Nugget Full Office file parsing Vuln-centric detection against known threats SWF Nugget Decompresses and analyzes flash Detects known flash threats
  • 46. Detection Nuggets (cont’d…) ClamAV Nugget Analyze any format Signature- and pattern-based detection Updatable signature DB Can further serve as a collector Can issue defense updates
  • 47. Output Nuggets Deep Alerting System Provide full logging output of all alerts Write out each component block Include normalized view of documents as well Maltego Interface Provide data transformations targeting the Razorback database www.paterva.com
  • 48. Workstation Nuggets CLI functionality to query: Alerts, events, and incidents Nugget status Display metadata Run standardized report set
  • 49. Programming Interfaces How are nuggets created?
  • 50. Custom API API provided for easy creation of nuggets The API provides functionality for: Registering a new nugget Sending and receiving data Cache and database interaction Threading is handled automagically!
  • 51. General Functions registerNugget() Type of nugget Type(s) of data handled Connection information registerHandler() Specifies handler function Type(s) of data handled for that function Can register multiple handlers per nugget
  • 52. Collection and Detection Nuggets sendData() Sends captured data to the dispatcher sendMetaData() Adds any additional information about the collected or parsed data sendAlert() Specific alert data to be sent to Output Nuggets
  • 53. Intelligence Nuggets Functions provide access to modify database Types of Intelligence Nuggets supported: Email Web DNS Easy to add new protocols Create database schema Provide function for accessing that schema
  • 54. What if I don’t like C? Nuggets can be written in any language Wrappers providing interfaces to the API functions are provided Ruby Python Perl If you can wrap C, you can create an API
  • 56. Razorback Framework… Extensible. Open. Modular. All functions are separated and distributed Core is written in C, APIs available for other languages as well Limitless possibilities!
  • 57. This is great! How can I help? See a need for a nugget? Write one and send it in! Full source code available on Sourceforge http://sourceforge.net/projects/razorbacktm http://sourceforge.net/projects/nuggetfarm Bug tracking via SourceforgeTrac
  • 58. Questions?? Patrick Mullen pmullen@sourcefire.com phoogazi on Twitter Ryan Pentney rpentney@sourcefire.com Sourcefire VRT labs.snort.org vrt-sourcefire.blogspot.com VRT_Sourcefire on Twitter Razorback Team: Alex Kambis Alex Kirk Alain Zidouemba Christopher McBee Kevin Miklavcic LureneGrenier Matt Olney Matt Watchinski Nigel Houghton Patrick Mullen Ryan Pentney Sojeong Hong