THREAT HUNTING WITH A
RASPBERRY PI
ABOUT ME
• One of the CISO’s for MRK Technologies
• 20 Years experience
• Career focused on defense and response (blue team)
• Father, husband, Marine, and gamer
• @b0dach
AGENDA
• Overview of how a Raspberry Pi can be used in Threat Hunting
• Tools installed and Sensor placement in the Network
• Automation of tools Integration with threat intel feeds
• Utilizing custom IoC’s
• Summary
RASPBERRY PI IN THREAT HUNTING
• Since building a sensor is (relatively) cheap and easy, this is a great way
to get more visibility into your network
• It’s a great way to start threat hunting without expensive products
• Utilizing the Pi as a sensor, you can place multiple sensors that report
back to a server
• This is intended to be used in conjunction with your skillset, not the
entire hunt
RASPBERRY PI IN THREAT HUNTING
•Inexpensive
•Can be deployed quickly (plug and play)
•Automation and integration with threat feeds
•Sensor offloads the data to an ELK cluster
Pros:
•It’s a Raspberry Pi
•It could be used in a large enterprise, but not recommended
•ARM architecture
Cons:
THE HARDWARE
• Raspberry Pi 3 model B
• 32GB micro SD card
• Smraza Raspberry Pi 3 B+ Case
• HausBell H7 keyboard
• Total investment: $84.00
KREEPY PI
• There are a number of Raspian ports that
have been compiled that can be utilized
• Sweet Security – Threat hunting tools with
ELK
• BriarIDS – A Raspberry Pi IDS
• RaspberryPi NSM – Network Secutity
Monitor
• OTX API – Alienvault threat intelligence feed
• All utilize open source IDS tools like Bro
and Suricata
• (I chose a hybrid of these three)
BASIC CONFIGURATION: KREEPY PI
• Raspbian (Built off NOOBS 2.8.2)
• Setup to run in command line mode
• Set video memory to 0
• Configure tools per instructions
• Be prepared to work!
• Install Filebeats, configure to ship logs to your ELK instance
DEPLOYMENT
• Kreepy Pi sensor
• eth0 in promisc mode
• USB Ethernet dongle – eth1 management interface
• (Or use the WLAN chip and an off network router)
• Security Onion/ELK Server on a different system (VM/Server/Etc.)
HUNTING
• Monitoring and baselining
• If possible
• Bro and OTX
• Suricata for additional analysis
CUSTOM IOC’S
• Bro and Suricata have the capability to have custom IoC’s
• Export from MISP
• Created by you
SUMMARY
• Easy(ish) and inexpensive way to utilize bro, suricata, and ELK to
automate network threat hunting
• PoC of Kreppy Pi will be uploaded to github
• This is the beginning, more tool integration and tuning will follow
• Contribute!!
QUESTIONS
• @b0dach
• https://github.com/b0dach

Threat Hunting with a Raspberry Pi

  • 1.
    THREAT HUNTING WITHA RASPBERRY PI
  • 2.
    ABOUT ME • Oneof the CISO’s for MRK Technologies • 20 Years experience • Career focused on defense and response (blue team) • Father, husband, Marine, and gamer • @b0dach
  • 3.
    AGENDA • Overview ofhow a Raspberry Pi can be used in Threat Hunting • Tools installed and Sensor placement in the Network • Automation of tools Integration with threat intel feeds • Utilizing custom IoC’s • Summary
  • 4.
    RASPBERRY PI INTHREAT HUNTING • Since building a sensor is (relatively) cheap and easy, this is a great way to get more visibility into your network • It’s a great way to start threat hunting without expensive products • Utilizing the Pi as a sensor, you can place multiple sensors that report back to a server • This is intended to be used in conjunction with your skillset, not the entire hunt
  • 5.
    RASPBERRY PI INTHREAT HUNTING •Inexpensive •Can be deployed quickly (plug and play) •Automation and integration with threat feeds •Sensor offloads the data to an ELK cluster Pros: •It’s a Raspberry Pi •It could be used in a large enterprise, but not recommended •ARM architecture Cons:
  • 6.
    THE HARDWARE • RaspberryPi 3 model B • 32GB micro SD card • Smraza Raspberry Pi 3 B+ Case • HausBell H7 keyboard • Total investment: $84.00
  • 7.
    KREEPY PI • Thereare a number of Raspian ports that have been compiled that can be utilized • Sweet Security – Threat hunting tools with ELK • BriarIDS – A Raspberry Pi IDS • RaspberryPi NSM – Network Secutity Monitor • OTX API – Alienvault threat intelligence feed • All utilize open source IDS tools like Bro and Suricata • (I chose a hybrid of these three)
  • 8.
    BASIC CONFIGURATION: KREEPYPI • Raspbian (Built off NOOBS 2.8.2) • Setup to run in command line mode • Set video memory to 0 • Configure tools per instructions • Be prepared to work! • Install Filebeats, configure to ship logs to your ELK instance
  • 9.
    DEPLOYMENT • Kreepy Pisensor • eth0 in promisc mode • USB Ethernet dongle – eth1 management interface • (Or use the WLAN chip and an off network router) • Security Onion/ELK Server on a different system (VM/Server/Etc.)
  • 10.
    HUNTING • Monitoring andbaselining • If possible • Bro and OTX • Suricata for additional analysis
  • 12.
    CUSTOM IOC’S • Broand Suricata have the capability to have custom IoC’s • Export from MISP • Created by you
  • 13.
    SUMMARY • Easy(ish) andinexpensive way to utilize bro, suricata, and ELK to automate network threat hunting • PoC of Kreppy Pi will be uploaded to github • This is the beginning, more tool integration and tuning will follow • Contribute!!
  • 14.

Editor's Notes

  • #5 This started as with a question, can we automate threat hunting in an inexpensive way?
  • #8 Half