SlideShare a Scribd company logo
1 of 21
Copyright © 2018 CyberSecurity Malaysia
Copyright © 2018 CyberSecurity Malaysia
SPLUNKING
LEBAHNET
(HONEYNET)
Copyright © 2018 CyberSecurity Malaysia
Content
• Background
• Problem
• Architecture Design
• Case Study
• Moving Forward
2
Copyright © 2018 CyberSecurity Malaysia
/usr/bin/whoami
Zuhair
• Executive turned Analyst
(recently) at MyCERT.
• Working on Mobile Threat
Research.
• Also happen to “play” with
honeypot technology.
Fathi Kamil @ Fatah
• Acting Manager at Cyber Threat
Research Center, MyCERT.
• Technical Lead for Malware
Mitigation WG
• LebahNET Honeypot Project
• Coordinated Malware
Eradication and Remediation
Platform.
Copyright © 2018 CyberSecurity Malaysia
Background
LebahNET - MyCERT’s Honeypot project - to study on how
exploits function as well as to collect malware binaries.
Honeypot is a computer software mechanism setup to mimic a
legitimate site to lure malicious software into believing the
system is a legitimate site, vulnerable for attacks.
Honeypot allow researchers to detect, monitor and
counterattack malicious activity by understanding the activities
during intrusion phase and from the payload attack.
4
Copyright © 2018 CyberSecurity Malaysia
Current Architecture Design
5
Copyright © 2018 CyberSecurity Malaysia
Problem Statement
• Tons of fixed structure data – Important data is not
represented as an attribute
6
Copyright © 2018 CyberSecurity Malaysia
What We Do?
• In short, throw everything in Splunk.
• Make query and show what actually in it.
7
Copyright © 2018 CyberSecurity Malaysia 8
Copyright © 2018 CyberSecurity Malaysia 9
Copyright © 2018 CyberSecurity Malaysia
Case Study
• Enrich IP to Geolocation directly
– sensor.protocol=httpd AND metadata.http_method=GET | rex
field=metadata.url_path "http(s)*://(?<domain>[^/]+)/[^?s]+" |
iplocation domain | top Country
10
Copyright © 2018 CyberSecurity Malaysia
Case Study
• Extract list of drop site URI, POST_DATA
– host=lebahnetv2 AND sensor.protocol=httpd AND
metadata.http_method=POST AND metadata.headers.Host=*| top
limit=20 "metadata.headers.Host"
11
Copyright © 2018 CyberSecurity Malaysia
Case Study
• Top MySQL attack by country
– attack_type=mysqlcmd AND sys_eval AND http | rex field=metadata.args
"http(s)*://(?<domain>[^/]+)/[^?s]+" | iplocation domain | top Country
12
Copyright © 2018 CyberSecurity Malaysia
MySQL Attack
13
Copyright © 2018 CyberSecurity Malaysia
Binary Collected
• attack_type=fileupload | timechart count by metadata.md5
usenull=f useother=f
14
Copyright © 2018 CyberSecurity Malaysia
IOT – Mirai Variant
15
Search for keyword “Shinka”
in your honeypot data!
Copyright © 2018 CyberSecurity Malaysia
Mirai
variant
• shinka AND metadata.http_method=GET | rex
field=metadata.url_path "http(s)*://(?<domain>[^/]+)/[^?s]+" |
iplocation domain | top Country
16
Copyright © 2018 CyberSecurity Malaysia
IOT – Mirai Variant
Search for keyword “ecchi”
17
Copyright © 2018 CyberSecurity Malaysia
Caveat
• Splunk does not “Auto-magically” solve your data
correlation problem.
18
Copyright © 2018 CyberSecurity Malaysia
What is Next after Splunk
• Continue paying the license if still affordable or…
• …Go for ELK
• More detail analysis on LebahNET data.
– Better statistic to show attacks
– Extract more information from the metadata
19
Copyright © 2018 CyberSecurity Malaysia
LebahNET Participation
• Part of Malware Mitigation Working Group in APCERT.
20
Copyright © 2018 CyberSecurity Malaysia
Copyright © 2018 CyberSecurity Malaysia 21

More Related Content

Similar to Splunking Lebahnet

David Bianco - Enterprise Security Monitoring
David Bianco - Enterprise Security MonitoringDavid Bianco - Enterprise Security Monitoring
David Bianco - Enterprise Security Monitoring
bsidesaugusta
 
Pivotal Data Lake Architecture & its role in security analytics
Pivotal Data Lake Architecture & its role in security analyticsPivotal Data Lake Architecture & its role in security analytics
Pivotal Data Lake Architecture & its role in security analytics
EMC
 

Similar to Splunking Lebahnet (20)

HeartBleed Bug, by Megat Muazzam [APNIC 38]
HeartBleed Bug, by Megat Muazzam [APNIC 38]HeartBleed Bug, by Megat Muazzam [APNIC 38]
HeartBleed Bug, by Megat Muazzam [APNIC 38]
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
Microservices and APIs
Microservices and APIsMicroservices and APIs
Microservices and APIs
 
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
 
Get Real-Time Cyber Threat Protection with Risk Management and SIEM
Get Real-Time Cyber Threat Protection with Risk Management and SIEMGet Real-Time Cyber Threat Protection with Risk Management and SIEM
Get Real-Time Cyber Threat Protection with Risk Management and SIEM
 
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-miningOWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
 
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.
Is NetTraveler APT managed by PLA Military Camp in Lanzhou [China] ???.
 
G017424448
G017424448G017424448
G017424448
 
Hta t07-did-you-read-the-news-http-request-hijacking
Hta t07-did-you-read-the-news-http-request-hijackingHta t07-did-you-read-the-news-http-request-hijacking
Hta t07-did-you-read-the-news-http-request-hijacking
 
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption? CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
 
David Bianco - Enterprise Security Monitoring
David Bianco - Enterprise Security MonitoringDavid Bianco - Enterprise Security Monitoring
David Bianco - Enterprise Security Monitoring
 
Cyber Threat 2019 NCSC-SANS London Conference - Mandiant Grab Bag of Attacker...
Cyber Threat 2019 NCSC-SANS London Conference - Mandiant Grab Bag of Attacker...Cyber Threat 2019 NCSC-SANS London Conference - Mandiant Grab Bag of Attacker...
Cyber Threat 2019 NCSC-SANS London Conference - Mandiant Grab Bag of Attacker...
 
Automation: The Wonderful Wizard of CTI (or is it?)
Automation: The Wonderful Wizard of CTI (or is it?) Automation: The Wonderful Wizard of CTI (or is it?)
Automation: The Wonderful Wizard of CTI (or is it?)
 
Sensor Data in InfluxDB by David Simmons, IoT Developer Evangelist | InfluxData
Sensor Data in InfluxDB by David Simmons, IoT Developer Evangelist | InfluxDataSensor Data in InfluxDB by David Simmons, IoT Developer Evangelist | InfluxData
Sensor Data in InfluxDB by David Simmons, IoT Developer Evangelist | InfluxData
 
Drupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the AttackerDrupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the Attacker
 
Automating Big Data with the Automic Hadoop Agent
Automating Big Data with the Automic Hadoop AgentAutomating Big Data with the Automic Hadoop Agent
Automating Big Data with the Automic Hadoop Agent
 
From Mirai to Monero – One Year’s Worth of Honeypot Data
From Mirai to Monero – One Year’s Worth of Honeypot DataFrom Mirai to Monero – One Year’s Worth of Honeypot Data
From Mirai to Monero – One Year’s Worth of Honeypot Data
 
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
IRJET-  	  Preventing Phishing Attack using Evolutionary AlgorithmsIRJET-  	  Preventing Phishing Attack using Evolutionary Algorithms
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
 
Pivotal Data Lake Architecture & its role in security analytics
Pivotal Data Lake Architecture & its role in security analyticsPivotal Data Lake Architecture & its role in security analytics
Pivotal Data Lake Architecture & its role in security analytics
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

Splunking Lebahnet

  • 1. Copyright © 2018 CyberSecurity Malaysia Copyright © 2018 CyberSecurity Malaysia SPLUNKING LEBAHNET (HONEYNET)
  • 2. Copyright © 2018 CyberSecurity Malaysia Content • Background • Problem • Architecture Design • Case Study • Moving Forward 2
  • 3. Copyright © 2018 CyberSecurity Malaysia /usr/bin/whoami Zuhair • Executive turned Analyst (recently) at MyCERT. • Working on Mobile Threat Research. • Also happen to “play” with honeypot technology. Fathi Kamil @ Fatah • Acting Manager at Cyber Threat Research Center, MyCERT. • Technical Lead for Malware Mitigation WG • LebahNET Honeypot Project • Coordinated Malware Eradication and Remediation Platform.
  • 4. Copyright © 2018 CyberSecurity Malaysia Background LebahNET - MyCERT’s Honeypot project - to study on how exploits function as well as to collect malware binaries. Honeypot is a computer software mechanism setup to mimic a legitimate site to lure malicious software into believing the system is a legitimate site, vulnerable for attacks. Honeypot allow researchers to detect, monitor and counterattack malicious activity by understanding the activities during intrusion phase and from the payload attack. 4
  • 5. Copyright © 2018 CyberSecurity Malaysia Current Architecture Design 5
  • 6. Copyright © 2018 CyberSecurity Malaysia Problem Statement • Tons of fixed structure data – Important data is not represented as an attribute 6
  • 7. Copyright © 2018 CyberSecurity Malaysia What We Do? • In short, throw everything in Splunk. • Make query and show what actually in it. 7
  • 8. Copyright © 2018 CyberSecurity Malaysia 8
  • 9. Copyright © 2018 CyberSecurity Malaysia 9
  • 10. Copyright © 2018 CyberSecurity Malaysia Case Study • Enrich IP to Geolocation directly – sensor.protocol=httpd AND metadata.http_method=GET | rex field=metadata.url_path "http(s)*://(?<domain>[^/]+)/[^?s]+" | iplocation domain | top Country 10
  • 11. Copyright © 2018 CyberSecurity Malaysia Case Study • Extract list of drop site URI, POST_DATA – host=lebahnetv2 AND sensor.protocol=httpd AND metadata.http_method=POST AND metadata.headers.Host=*| top limit=20 "metadata.headers.Host" 11
  • 12. Copyright © 2018 CyberSecurity Malaysia Case Study • Top MySQL attack by country – attack_type=mysqlcmd AND sys_eval AND http | rex field=metadata.args "http(s)*://(?<domain>[^/]+)/[^?s]+" | iplocation domain | top Country 12
  • 13. Copyright © 2018 CyberSecurity Malaysia MySQL Attack 13
  • 14. Copyright © 2018 CyberSecurity Malaysia Binary Collected • attack_type=fileupload | timechart count by metadata.md5 usenull=f useother=f 14
  • 15. Copyright © 2018 CyberSecurity Malaysia IOT – Mirai Variant 15 Search for keyword “Shinka” in your honeypot data!
  • 16. Copyright © 2018 CyberSecurity Malaysia Mirai variant • shinka AND metadata.http_method=GET | rex field=metadata.url_path "http(s)*://(?<domain>[^/]+)/[^?s]+" | iplocation domain | top Country 16
  • 17. Copyright © 2018 CyberSecurity Malaysia IOT – Mirai Variant Search for keyword “ecchi” 17
  • 18. Copyright © 2018 CyberSecurity Malaysia Caveat • Splunk does not “Auto-magically” solve your data correlation problem. 18
  • 19. Copyright © 2018 CyberSecurity Malaysia What is Next after Splunk • Continue paying the license if still affordable or… • …Go for ELK • More detail analysis on LebahNET data. – Better statistic to show attacks – Extract more information from the metadata 19
  • 20. Copyright © 2018 CyberSecurity Malaysia LebahNET Participation • Part of Malware Mitigation Working Group in APCERT. 20
  • 21. Copyright © 2018 CyberSecurity Malaysia Copyright © 2018 CyberSecurity Malaysia 21

Editor's Notes

  1. Dionaea, cowrie, glastoph