SlideShare a Scribd company logo
Capture me if you can!

         Sebastien Tricaud1
              1 Picviz   Labs


Hackito Ergu Sum (Paris, France) 2011




                                        1/54
$ whoami




    • Sebastien Tricaud
    • Picviz Labs Director
    • Picviz Labs is the editor of Picviz Inspector, a data-mining
      software for security
    • Honeynet Project CTO
    • 15 years of various IDS implementations




                                                                     2/54
1   Introduction


2   Network Capture


3   Logs Capture


4   CUDA


5   Visualization


6   Conclusion




                      3/54
Context




  Once upon a time. . .




                          4/54
Context




  Once upon a time. . .
  Two days ago, at CERIAS, M. Neal Ziring said:



          The attack data is often lost in the noise of events




                                                                 4/54
Context




  Mr. Neal Ziring is currently a technical director in the
  Information Assurance Directorate (IAD), at NSA. The IAD
  provides cryptographic, network, and operational security
  products and services to protect and defend national security
  systems.




                                                                  5/54
Talk objective




   How capture can be performed and managed to effectively find
   incidents1 in large networks.




     1
         attacks, documents leaks, etc.
                                                                 6/54
Find incidents in large networks: Network traffic



    1   Capture all the traffic
    2   Someone reports an incident
    3   Run Snort on the captured traffic




                                                   7/54
Find incidents in large networks: Network traffic



    1   Capture all the traffic
    2   Someone reports an incident
    3   Run Snort on the captured traffic

    • Two countries examples:
        • 30 Gb Netflow Traffic for a 20 millions people country per
          24 hours (about 1700 events/s; 510 000 events/5 mn)




                                                                     7/54
Find incidents in large networks: Network traffic



    1   Capture all the traffic
    2   Someone reports an incident
    3   Run Snort on the captured traffic

    • Two countries examples:
        • 30 Gb Netflow Traffic for a 20 millions people country per
          24 hours (about 1700 events/s; 510 000 events/5 mn)
        • 5 min Netflow Capture on the main backbone on a 45
          millions people country: 3 millions events/5 mn




                                                                     7/54
1   Introduction


2   Network Capture


3   Logs Capture


4   CUDA


5   Visualization


6   Conclusion




                      8/54
Capture with libpcap

   u_char ∗ packet ;
   struct timeval packet_tv ;
   s t r u c t pcap_pkthdr pheader ;

   ...

   packet = ( u_char ∗ ) pcap_next ( pcaph , &pheader ) ;
   while ( packet ) {
     p a c k e t _ t v = pheader . t s ;
     t = packet_tv . tv_sec ;
     s t r t i m e = c t i m e (& t ) ;
     i f ( ntohs ( e t h e r −>e t h _ t y p e ) == ETH_TYPE_IP ) {
         i p = ( s t r u c t i p _ h d r ∗ ) ( packet + ETH_HDR_LEN ) ;

   ...

                                                                          9/54
How does libpcap works?
    • Layer 2
    • Packet copied! (ahah)
    • Apply a BPF filter
    • Get the data




                              10/54
Netfilter QUEUE (nfqueue)




                           11/54
DAQ



 (Awesome) Data Acquisition Library written by Sourcefire.
 Available from http://www.snort.org
 Unifies:
      • AFPacket
      • ipqueue
      • netfilter_queue
      • libpcap




                                                            12/54
Other ways to capture




    • Daemonlogger: relies on libpcap
    • Streams2 : relies on libpcap just for BPF
    • Various works from Luca Deri with PF_RING
    • using GPGPU




    2
        git clone git://git.carnivore.it/streams.git
                                                       13/54
Now you (perhaps) got your packet!




  The packet is captured, fine! however:
    • It can be fragmented
    • If you run a signature maching, UTF-8 encoding can
      bypass it
    • A protocol like RPC need to be decoded
    • The attack can be located at different DoD model levels




                                                                14/54
Fragmentation



  Let’s have a look at Linux:
    • IPV4: linux-src/net/ipv4/ip_fragment.c
    • IPV6: linux-src/net/ipv6/reassembly.c
  How it is performed in IPV4:
    • Defragmentation happens with the function ip_defrag()
    • Called only by:
        • ip_local_deliver()
        • ip_call_ra_chain: only if the socket is tied to an interface




                                                                         15/54
• Linux does not defragment upon FORWARD
• Netfilter may do it
• modprobe nf_conntrack_ipv4




                                           16/54
We captured, we want evils!


   Snort gives up several ways to find the evil:
     • Binary:
       content:"|0A 00 00 01 85 04 00 00
       80|root|00|" (sid:1775)
     • Simple pattern:
       content:"fuck fuck fuck" (sid:1316)
     • PCRE:
       pcre:"/ˆ x3c(REQIMG|RVWCFG) x3e/ism"
       (sid:2460)
   Problem: How Snort manages pattern matching algorithms
   along with PCRE? Each PCRE is tried on each packet?



                                                            17/54
snort PCRE lookup



    • Long patterns are easier to find
    • PCRE and pattern matching within Snort:
        • Search for the longest pattern in each signature
             • function fpAddLongestContent() in fpcreate.c
        • The traffic is prequalifed (MPSE)
        • Rules aare sequentially tested
        • The PCRE option is ignored until the complete rule test
           after the prequalification
    • PCRE uses its own DFA/NFA

  ⇒ Less we have PCRE, better we are.




                                                                    18/54
Netflow




   • It is easier to investigate with connection flow
   • Looking at TCP SYN is better for understanding than the
     whole SYN>SYN-ACK>ACK>PSH>PSH-ACK, etc.
   • Streams was designed to help you there




                                                               19/54
1   Introduction


2   Network Capture


3   Logs Capture


4   CUDA


5   Visualization


6   Conclusion




                      20/54
Logs




       Logs highly used for forensic activity for cybercrime
                          investigation




                                                               21/54
Logs




       Logs highly used for forensic activity for cybercrime
                          investigation

       Question: who cares about logs? their weakness,
                     normalization, etc.?




                                                               21/54
SSH defaults accounts testing




   sshd [ 6 5 7 4 ] :   error   :   PAM:   Authentication   failure   for   r o o t from 1 9 2 . 1 6 8 . 1 2 . 2
   sshd [ 6 5 7 4 ] :   error   :   PAM:   Authentication   failure   for   guest from 1 9 2 . 1 6 8 . 1 2 . 2
   sshd [ 6 5 7 4 ] :   error   :   PAM:   Authentication   failure   for   p r i n t e r from 1 9 2 . 1 6 8 . 1 2 . 2
   sshd [ 6 5 7 4 ] :   error   :   PAM:   Authentication   failure   for   l p from 1 9 2 . 1 6 8 . 1 2 . 2
   sshd [ 6 5 7 4 ] :   error   :   PAM:   Authentication   failure   for   admin from 1 9 2 . 1 6 8 . 1 2 . 2




                                                                                                                         22/54
Detection dilemna



    1   Detecting
          • A user enumeration is more likely to get caught and
            correlated
          • Use tools like OSSEC and get it right in your mailbox
          • OSSEC and any other tools like that need logs to analyze
            and detect things
    2   Log analyzers common weaknesses
          • Signature based
          • PCRE based (with PCRE weaknesses as well, but this is
            for an other talk)
          • Needs food == Needs logs




                                                                       23/54
Know Your Enemy




         Log analyzer enemy == Configurable log




                                                 24/54
Squid



  Log Format configuration
  l o g f o r m a t s q u i d %t s .%03 t u %6 t r %>a %Ss/%03>Hs %<s t %rm %r u %un %Sh/%<A %mt




  Log Format options
  ...
  [ h t t p : : ] rm   Request method (GET/POST e t c )
  [ h t t p : : ] ru   Request URL
  [ h t t p : : ] rp   Request URL−Path e x c l u d i n g hostname
  ...




                                                                                                   25/54
ProFTPd



  Log with mod_log

  Log Format configuration
  LogFormat   d e f a u l t "%h %l %u %t "% r  " %s %b "




  Log Format options
   %A              − Anonymous username ( password g i v e n )
   %a              − Remote c l i e n t IP address
   %b              − Bytes s e n t f o r r e q u e s t




                                                                 26/54
Apache


  Log with mod_log

  Log Format configuration
  LogFormat "%h %l %u %t "% r  " %>s %b  " % { R e f e r e r } i  "  " % { User−Agent } i  " " combined




  Cool options!
      • %b did you see this %b?
      • %b: Size of response in bytes, excluding HTTP headers.
         In CLF format, i.e. a ’-’ rather than a 0 when no bytes are
         sent.
      • It is possible to exploit this weakness




                                                                                                                27/54
Log misuse 0-day




  A log misuse 0-day is:
    • an application fails to properly log an information it could
    • log injection
    • incorrect logged information

             There is NO log misuse 0-day database!




                                                                     28/54
Simple Log misuse 0-day

  Back on ProFTPd, remember:
  Log Format options
    %A                               − Anonymous username ( password g i v e n )



  password given = gets anything

  Code managing the password
  # d e f i n e PR_TUNABLE_PATH_MAX 1024
  char arg [ PR_TUNABLE_PATH_MAX+1] = { ’  0 ’ } ;
          case META_ANON_PASS:
              argp = arg ;
              pass = p r _ t a b l e _ g e t ( s e s s i o n . notes , " mod_auth . anon−passwd " , NULL ) ;
               i f ( ! pass )
                  pass = "UNKNOWN" ;

           s s t r n c p y ( argp , pass , s i z e o f ( arg ) ) ;



  → Remote log injection possible, in /var/log/proftpd/auth.log

                                                                                                               29/54
Log misuse database




  Actually there is CWE. . .
    • Common Weakness Enumeration
    • CWE-778: Insufficient Logging
      "When a security-critical event occurs, the software either
      does not record the event or omits important details about
      the event when logging it."




                                                                    30/54
CVE examples


   • CVE-2003-1566: Microsoft IIS 5.0 does not log requests
     that use the TRACK method, which allows remote
     attackers to obtain sensitive information without detection.
   • CVE-2007-3730: OpenVMS does not log the source IP.
   • CVE-2008-1203: Adobe ColdFusion 8 and ColdFusion
     MX7 do not log failed connection attempts on the
     administrative interface.
   • ...

                Those CVE are still under review




                                                                    31/54
YASA! (Yet Another Stealth Attack)




   Ever seen this attack?
   66.249.65.39 - - [28/Mar/2007:03:08:46 +0200] "GET /index.html
   HTTP/1.1" 404 394 "-" "Mozilla/5.0 (compatible; Googlebot/2.1;
   +http://www.google.com/bot.html)"




                                                                    32/54
1   Introduction


2   Network Capture


3   Logs Capture


4   CUDA


5   Visualization


6   Conclusion




                      33/54
My laptop has a NVIDIA Geforce GT 420M




    • 96 CUDA cores
    • Memory Bandwidth 25.6 GB/sec
    • A Thread block can run up to 512 threads




                                                 34/54
CUDA architecture




                    35/54
CUDA processing flow




                      36/54
Capture using CUDA: NetGPU


  Available from http://code.google.com/p/netgpu




                                                   37/54
1   Introduction


2   Network Capture


3   Logs Capture


4   CUDA


5   Visualization


6   Conclusion




                      38/54
Problems with SIEM and Intrusion Detection




    • Capture is complex
    • Rulesets are required: always after the problem
    • Too many false positives




                                                        39/54
Why Visualization

  Handle large data without extracting known events to correlate
  yourself.




                                                                   40/54
Secviz
  Visualization community website: http://www.secviz.org




                                                           41/54
Circos




         42/54
Limitation




   Enough with limitations.




                              43/54
How many events are in this picture?




                                       44/54
How many events are in this picture?




                                       45/54
Discover a successful attack in less than one minute




                                                       46/54
Discover a successful attack in less than one minute




                                                       47/54
Discover a successful attack in less than one minute




                                                       48/54
Discover a successful attack in less than one minute




                                                       49/54
Discover a successful attack in less than one minute




                                                       50/54
Discover a successful attack in less than one minute




                                                       51/54
1   Introduction


2   Network Capture


3   Logs Capture


4   CUDA


5   Visualization


6   Conclusion




                      52/54
Conclusion




    • Data are obviously lost in the noise of events today
    • If we are creative, we may be able to solve this issue
    • We have some technical limitations, we need to find ways
      to get around them




                                                                53/54
Conclusion




    • Data are obviously lost in the noise of events today
    • If we are creative, we may be able to solve this issue
    • We have some technical limitations, we need to find ways
      to get around them
    • We have some technical solutions (hint: SIEM), we need to
      find ways to get around them
    • I strongly believe visualization has a great role to play in it




                                                                        53/54
Questions?




    • Email: stricaud@picviz.com
    • Company website: http://www.picviz.com
    • Twitter: @tricaud
    • Blog: http://logviz.blogger.com




                                               54/54

More Related Content

What's hot

3 scanning-ger paoctes-pub
3  scanning-ger paoctes-pub3  scanning-ger paoctes-pub
3 scanning-ger paoctes-pub
Cassio Ramos
 
How You Will Get Hacked Ten Years from Now
How You Will Get Hacked Ten Years from NowHow You Will Get Hacked Ten Years from Now
How You Will Get Hacked Ten Years from Now
julievreeland
 
Linux Linux Traffic Control
Linux Linux Traffic ControlLinux Linux Traffic Control
Linux Linux Traffic Control
SUSE Labs Taipei
 
Secure coding for developers
Secure coding for developersSecure coding for developers
Secure coding for developers
sluge
 
ebpf and IO Visor: The What, how, and what next!
ebpf and IO Visor: The What, how, and what next!ebpf and IO Visor: The What, how, and what next!
ebpf and IO Visor: The What, how, and what next!
Affan Syed
 
Faster packet processing in Linux: XDP
Faster packet processing in Linux: XDPFaster packet processing in Linux: XDP
Faster packet processing in Linux: XDP
Daniel T. Lee
 
Packet sniffing in switched LANs
Packet sniffing in switched LANsPacket sniffing in switched LANs
Packet sniffing in switched LANs
Ishraq Al Fataftah
 
Introduction to Memory Exploitation (CppEurope 2021)
Introduction to Memory Exploitation (CppEurope 2021)Introduction to Memory Exploitation (CppEurope 2021)
Introduction to Memory Exploitation (CppEurope 2021)
Patricia Aas
 
2 netcat enum-pub
2 netcat enum-pub2 netcat enum-pub
2 netcat enum-pub
Cassio Ramos
 
BPF: Next Generation of Programmable Datapath
BPF: Next Generation of Programmable DatapathBPF: Next Generation of Programmable Datapath
BPF: Next Generation of Programmable Datapath
Thomas Graf
 
NSC #2 - Challenge Solution
NSC #2 - Challenge SolutionNSC #2 - Challenge Solution
NSC #2 - Challenge Solution
NoSuchCon
 
Chromium Sandbox on Linux (BlackHoodie 2018)
Chromium Sandbox on Linux (BlackHoodie 2018)Chromium Sandbox on Linux (BlackHoodie 2018)
Chromium Sandbox on Linux (BlackHoodie 2018)
Patricia Aas
 
Can We Prevent Use-after-free Attacks?
Can We Prevent Use-after-free Attacks?Can We Prevent Use-after-free Attacks?
Can We Prevent Use-after-free Attacks?
inaz2
 
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...
Ontico
 
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...
Андрей Шорин
 
[Blackhat EU'14] Attacking the Linux PRNG on Android and Embedded Devices
[Blackhat EU'14] Attacking the Linux PRNG on Android and Embedded Devices[Blackhat EU'14] Attacking the Linux PRNG on Android and Embedded Devices
[Blackhat EU'14] Attacking the Linux PRNG on Android and Embedded Devices
srkedmi
 
Services
ServicesServices
Services
Terry Hernandez
 
john-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Later
john-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Laterjohn-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Later
john-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Later
Positive Hack Days
 
project_docs
project_docsproject_docs
project_docs
Andrey Lavrinovic
 
Network emulator
Network emulatorNetwork emulator
Network emulator
jeromy fu
 

What's hot (20)

3 scanning-ger paoctes-pub
3  scanning-ger paoctes-pub3  scanning-ger paoctes-pub
3 scanning-ger paoctes-pub
 
How You Will Get Hacked Ten Years from Now
How You Will Get Hacked Ten Years from NowHow You Will Get Hacked Ten Years from Now
How You Will Get Hacked Ten Years from Now
 
Linux Linux Traffic Control
Linux Linux Traffic ControlLinux Linux Traffic Control
Linux Linux Traffic Control
 
Secure coding for developers
Secure coding for developersSecure coding for developers
Secure coding for developers
 
ebpf and IO Visor: The What, how, and what next!
ebpf and IO Visor: The What, how, and what next!ebpf and IO Visor: The What, how, and what next!
ebpf and IO Visor: The What, how, and what next!
 
Faster packet processing in Linux: XDP
Faster packet processing in Linux: XDPFaster packet processing in Linux: XDP
Faster packet processing in Linux: XDP
 
Packet sniffing in switched LANs
Packet sniffing in switched LANsPacket sniffing in switched LANs
Packet sniffing in switched LANs
 
Introduction to Memory Exploitation (CppEurope 2021)
Introduction to Memory Exploitation (CppEurope 2021)Introduction to Memory Exploitation (CppEurope 2021)
Introduction to Memory Exploitation (CppEurope 2021)
 
2 netcat enum-pub
2 netcat enum-pub2 netcat enum-pub
2 netcat enum-pub
 
BPF: Next Generation of Programmable Datapath
BPF: Next Generation of Programmable DatapathBPF: Next Generation of Programmable Datapath
BPF: Next Generation of Programmable Datapath
 
NSC #2 - Challenge Solution
NSC #2 - Challenge SolutionNSC #2 - Challenge Solution
NSC #2 - Challenge Solution
 
Chromium Sandbox on Linux (BlackHoodie 2018)
Chromium Sandbox on Linux (BlackHoodie 2018)Chromium Sandbox on Linux (BlackHoodie 2018)
Chromium Sandbox on Linux (BlackHoodie 2018)
 
Can We Prevent Use-after-free Attacks?
Can We Prevent Use-after-free Attacks?Can We Prevent Use-after-free Attacks?
Can We Prevent Use-after-free Attacks?
 
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...
 
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...
 
[Blackhat EU'14] Attacking the Linux PRNG on Android and Embedded Devices
[Blackhat EU'14] Attacking the Linux PRNG on Android and Embedded Devices[Blackhat EU'14] Attacking the Linux PRNG on Android and Embedded Devices
[Blackhat EU'14] Attacking the Linux PRNG on Android and Embedded Devices
 
Services
ServicesServices
Services
 
john-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Later
john-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Laterjohn-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Later
john-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Later
 
project_docs
project_docsproject_docs
project_docs
 
Network emulator
Network emulatorNetwork emulator
Network emulator
 

Similar to HES2011 - Sebastien Tricaud - Capture me if you can

Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)
Andrew Case
 
Provenance for Data Munging Environments
Provenance for Data Munging EnvironmentsProvenance for Data Munging Environments
Provenance for Data Munging Environments
Paul Groth
 
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
Alexandre Moneger
 
Penetration Testing Boot CAMP
Penetration Testing Boot CAMPPenetration Testing Boot CAMP
Security Onion
Security OnionSecurity Onion
Security Onion
johndegruyter
 
Threat hunting on the wire
Threat hunting on the wireThreat hunting on the wire
Threat hunting on the wire
InfoSec Addicts
 
Symmetric Crypto for DPDK - Declan Doherty
Symmetric Crypto for DPDK - Declan DohertySymmetric Crypto for DPDK - Declan Doherty
Symmetric Crypto for DPDK - Declan Doherty
harryvanhaaren
 
Finding Needles in Haystacks (The Size of Countries)
Finding Needles in Haystacks (The Size of Countries)Finding Needles in Haystacks (The Size of Countries)
Finding Needles in Haystacks (The Size of Countries)
packetloop
 
PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...
PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...
PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...
CODE BLUE
 
Conclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleConclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at Scale
Guardicore
 
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlowCisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
Lancope, Inc.
 
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
idsecconf
 
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
Zoltan Balazs
 
(130511) #fitalk network forensics and its role and scope
(130511) #fitalk   network forensics and its role and scope(130511) #fitalk   network forensics and its role and scope
(130511) #fitalk network forensics and its role and scope
INSIGHT FORENSIC
 
The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)
Martin Schütte
 
OMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
OMFW 2012: Analyzing Linux Kernel Rootkits with VolatlityOMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
OMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
Andrew Case
 
Your Inner Sysadmin - MidwestPHP 2015
Your Inner Sysadmin - MidwestPHP 2015Your Inner Sysadmin - MidwestPHP 2015
Your Inner Sysadmin - MidwestPHP 2015
Chris Tankersley
 
Tuning parallelcodeonsolaris005
Tuning parallelcodeonsolaris005Tuning parallelcodeonsolaris005
Tuning parallelcodeonsolaris005
dflexer
 
OT Security - h-c0n 2020
OT Security - h-c0n 2020OT Security - h-c0n 2020
OT Security - h-c0n 2020
Jose Palanco
 
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit BasicsNetwork Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Bishop Fox
 

Similar to HES2011 - Sebastien Tricaud - Capture me if you can (20)

Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)
 
Provenance for Data Munging Environments
Provenance for Data Munging EnvironmentsProvenance for Data Munging Environments
Provenance for Data Munging Environments
 
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
 
Penetration Testing Boot CAMP
Penetration Testing Boot CAMPPenetration Testing Boot CAMP
Penetration Testing Boot CAMP
 
Security Onion
Security OnionSecurity Onion
Security Onion
 
Threat hunting on the wire
Threat hunting on the wireThreat hunting on the wire
Threat hunting on the wire
 
Symmetric Crypto for DPDK - Declan Doherty
Symmetric Crypto for DPDK - Declan DohertySymmetric Crypto for DPDK - Declan Doherty
Symmetric Crypto for DPDK - Declan Doherty
 
Finding Needles in Haystacks (The Size of Countries)
Finding Needles in Haystacks (The Size of Countries)Finding Needles in Haystacks (The Size of Countries)
Finding Needles in Haystacks (The Size of Countries)
 
PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...
PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...
PANDEMONIUM: Automated Identification of Cryptographic Algorithms using Dynam...
 
Conclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleConclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at Scale
 
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlowCisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
 
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
 
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
 
(130511) #fitalk network forensics and its role and scope
(130511) #fitalk   network forensics and its role and scope(130511) #fitalk   network forensics and its role and scope
(130511) #fitalk network forensics and its role and scope
 
The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)The IPv6 Snort Plugin (at DeepSec 2014)
The IPv6 Snort Plugin (at DeepSec 2014)
 
OMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
OMFW 2012: Analyzing Linux Kernel Rootkits with VolatlityOMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
OMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
 
Your Inner Sysadmin - MidwestPHP 2015
Your Inner Sysadmin - MidwestPHP 2015Your Inner Sysadmin - MidwestPHP 2015
Your Inner Sysadmin - MidwestPHP 2015
 
Tuning parallelcodeonsolaris005
Tuning parallelcodeonsolaris005Tuning parallelcodeonsolaris005
Tuning parallelcodeonsolaris005
 
OT Security - h-c0n 2020
OT Security - h-c0n 2020OT Security - h-c0n 2020
OT Security - h-c0n 2020
 
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit BasicsNetwork Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
 

More from Hackito Ergo Sum

HES 2011 - Gal Diskin - Binary instrumentation for hackers - Lightning-talk
HES 2011 - Gal Diskin - Binary instrumentation for hackers - Lightning-talkHES 2011 - Gal Diskin - Binary instrumentation for hackers - Lightning-talk
HES 2011 - Gal Diskin - Binary instrumentation for hackers - Lightning-talk
Hackito Ergo Sum
 
HES2011 - Jon Oberheide and Dan Rosenberg - Stackjacking
HES2011 - Jon Oberheide and Dan Rosenberg - StackjackingHES2011 - Jon Oberheide and Dan Rosenberg - Stackjacking
HES2011 - Jon Oberheide and Dan Rosenberg - Stackjacking
Hackito Ergo Sum
 
HES2011 - Gabriel Gonzalez - Man In Remote PKCS11 for fun and non profit
HES2011 - Gabriel Gonzalez - Man In Remote PKCS11 for fun and non profitHES2011 - Gabriel Gonzalez - Man In Remote PKCS11 for fun and non profit
HES2011 - Gabriel Gonzalez - Man In Remote PKCS11 for fun and non profit
Hackito Ergo Sum
 
HES2011 - Eloi Vanderbeken - Hackito Ergo Sum Crackme
HES2011 - Eloi Vanderbeken - Hackito Ergo Sum CrackmeHES2011 - Eloi Vanderbeken - Hackito Ergo Sum Crackme
HES2011 - Eloi Vanderbeken - Hackito Ergo Sum Crackme
Hackito Ergo Sum
 
HES2011 - Aaron Portnoy and Logan Brown - Black Box Auditing Adobe Shockwave
HES2011 - Aaron Portnoy and Logan Brown - Black Box Auditing Adobe ShockwaveHES2011 - Aaron Portnoy and Logan Brown - Black Box Auditing Adobe Shockwave
HES2011 - Aaron Portnoy and Logan Brown - Black Box Auditing Adobe Shockwave
Hackito Ergo Sum
 
HES2011 - Jon Larimer - Autorun Vulnerabilities on Linux
HES2011 - Jon Larimer - Autorun Vulnerabilities on LinuxHES2011 - Jon Larimer - Autorun Vulnerabilities on Linux
HES2011 - Jon Larimer - Autorun Vulnerabilities on Linux
Hackito Ergo Sum
 
HES2011 - James Oakley and Sergey bratus-Exploiting-the-Hard-Working-DWARF
HES2011 - James Oakley and Sergey bratus-Exploiting-the-Hard-Working-DWARFHES2011 - James Oakley and Sergey bratus-Exploiting-the-Hard-Working-DWARF
HES2011 - James Oakley and Sergey bratus-Exploiting-the-Hard-Working-DWARF
Hackito Ergo Sum
 
HES2011 - joernchen - Ruby on Rails from a Code Auditor Perspective
HES2011 - joernchen - Ruby on Rails from a Code Auditor PerspectiveHES2011 - joernchen - Ruby on Rails from a Code Auditor Perspective
HES2011 - joernchen - Ruby on Rails from a Code Auditor Perspective
Hackito Ergo Sum
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
Hackito Ergo Sum
 
HES2011 - Richard Johnson - A Castle Made of Sand Adobe Reader X Sandbox
HES2011 - Richard Johnson - A Castle Made of Sand Adobe Reader X SandboxHES2011 - Richard Johnson - A Castle Made of Sand Adobe Reader X Sandbox
HES2011 - Richard Johnson - A Castle Made of Sand Adobe Reader X Sandbox
Hackito Ergo Sum
 
HES2011 - Tarjei Mandt – Kernel Pool Exploitation on Windows 7
HES2011 - Tarjei Mandt – Kernel Pool Exploitation on Windows 7HES2011 - Tarjei Mandt – Kernel Pool Exploitation on Windows 7
HES2011 - Tarjei Mandt – Kernel Pool Exploitation on Windows 7
Hackito Ergo Sum
 
HES2011 - Yuval Vadim Polevoy – Money Is In The Eye Of The Beholder: New And ...
HES2011 - Yuval Vadim Polevoy – Money Is In The Eye Of The Beholder: New And ...HES2011 - Yuval Vadim Polevoy – Money Is In The Eye Of The Beholder: New And ...
HES2011 - Yuval Vadim Polevoy – Money Is In The Eye Of The Beholder: New And ...
Hackito Ergo Sum
 
HES2011 - Itzik Kolter - Let me Stuxnet You
HES2011 - Itzik Kolter - Let me Stuxnet YouHES2011 - Itzik Kolter - Let me Stuxnet You
HES2011 - Itzik Kolter - Let me Stuxnet You
Hackito Ergo Sum
 

More from Hackito Ergo Sum (13)

HES 2011 - Gal Diskin - Binary instrumentation for hackers - Lightning-talk
HES 2011 - Gal Diskin - Binary instrumentation for hackers - Lightning-talkHES 2011 - Gal Diskin - Binary instrumentation for hackers - Lightning-talk
HES 2011 - Gal Diskin - Binary instrumentation for hackers - Lightning-talk
 
HES2011 - Jon Oberheide and Dan Rosenberg - Stackjacking
HES2011 - Jon Oberheide and Dan Rosenberg - StackjackingHES2011 - Jon Oberheide and Dan Rosenberg - Stackjacking
HES2011 - Jon Oberheide and Dan Rosenberg - Stackjacking
 
HES2011 - Gabriel Gonzalez - Man In Remote PKCS11 for fun and non profit
HES2011 - Gabriel Gonzalez - Man In Remote PKCS11 for fun and non profitHES2011 - Gabriel Gonzalez - Man In Remote PKCS11 for fun and non profit
HES2011 - Gabriel Gonzalez - Man In Remote PKCS11 for fun and non profit
 
HES2011 - Eloi Vanderbeken - Hackito Ergo Sum Crackme
HES2011 - Eloi Vanderbeken - Hackito Ergo Sum CrackmeHES2011 - Eloi Vanderbeken - Hackito Ergo Sum Crackme
HES2011 - Eloi Vanderbeken - Hackito Ergo Sum Crackme
 
HES2011 - Aaron Portnoy and Logan Brown - Black Box Auditing Adobe Shockwave
HES2011 - Aaron Portnoy and Logan Brown - Black Box Auditing Adobe ShockwaveHES2011 - Aaron Portnoy and Logan Brown - Black Box Auditing Adobe Shockwave
HES2011 - Aaron Portnoy and Logan Brown - Black Box Auditing Adobe Shockwave
 
HES2011 - Jon Larimer - Autorun Vulnerabilities on Linux
HES2011 - Jon Larimer - Autorun Vulnerabilities on LinuxHES2011 - Jon Larimer - Autorun Vulnerabilities on Linux
HES2011 - Jon Larimer - Autorun Vulnerabilities on Linux
 
HES2011 - James Oakley and Sergey bratus-Exploiting-the-Hard-Working-DWARF
HES2011 - James Oakley and Sergey bratus-Exploiting-the-Hard-Working-DWARFHES2011 - James Oakley and Sergey bratus-Exploiting-the-Hard-Working-DWARF
HES2011 - James Oakley and Sergey bratus-Exploiting-the-Hard-Working-DWARF
 
HES2011 - joernchen - Ruby on Rails from a Code Auditor Perspective
HES2011 - joernchen - Ruby on Rails from a Code Auditor PerspectiveHES2011 - joernchen - Ruby on Rails from a Code Auditor Perspective
HES2011 - joernchen - Ruby on Rails from a Code Auditor Perspective
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
 
HES2011 - Richard Johnson - A Castle Made of Sand Adobe Reader X Sandbox
HES2011 - Richard Johnson - A Castle Made of Sand Adobe Reader X SandboxHES2011 - Richard Johnson - A Castle Made of Sand Adobe Reader X Sandbox
HES2011 - Richard Johnson - A Castle Made of Sand Adobe Reader X Sandbox
 
HES2011 - Tarjei Mandt – Kernel Pool Exploitation on Windows 7
HES2011 - Tarjei Mandt – Kernel Pool Exploitation on Windows 7HES2011 - Tarjei Mandt – Kernel Pool Exploitation on Windows 7
HES2011 - Tarjei Mandt – Kernel Pool Exploitation on Windows 7
 
HES2011 - Yuval Vadim Polevoy – Money Is In The Eye Of The Beholder: New And ...
HES2011 - Yuval Vadim Polevoy – Money Is In The Eye Of The Beholder: New And ...HES2011 - Yuval Vadim Polevoy – Money Is In The Eye Of The Beholder: New And ...
HES2011 - Yuval Vadim Polevoy – Money Is In The Eye Of The Beholder: New And ...
 
HES2011 - Itzik Kolter - Let me Stuxnet You
HES2011 - Itzik Kolter - Let me Stuxnet YouHES2011 - Itzik Kolter - Let me Stuxnet You
HES2011 - Itzik Kolter - Let me Stuxnet You
 

Recently uploaded

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 

Recently uploaded (20)

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 

HES2011 - Sebastien Tricaud - Capture me if you can

  • 1. Capture me if you can! Sebastien Tricaud1 1 Picviz Labs Hackito Ergu Sum (Paris, France) 2011 1/54
  • 2. $ whoami • Sebastien Tricaud • Picviz Labs Director • Picviz Labs is the editor of Picviz Inspector, a data-mining software for security • Honeynet Project CTO • 15 years of various IDS implementations 2/54
  • 3. 1 Introduction 2 Network Capture 3 Logs Capture 4 CUDA 5 Visualization 6 Conclusion 3/54
  • 4. Context Once upon a time. . . 4/54
  • 5. Context Once upon a time. . . Two days ago, at CERIAS, M. Neal Ziring said: The attack data is often lost in the noise of events 4/54
  • 6. Context Mr. Neal Ziring is currently a technical director in the Information Assurance Directorate (IAD), at NSA. The IAD provides cryptographic, network, and operational security products and services to protect and defend national security systems. 5/54
  • 7. Talk objective How capture can be performed and managed to effectively find incidents1 in large networks. 1 attacks, documents leaks, etc. 6/54
  • 8. Find incidents in large networks: Network traffic 1 Capture all the traffic 2 Someone reports an incident 3 Run Snort on the captured traffic 7/54
  • 9. Find incidents in large networks: Network traffic 1 Capture all the traffic 2 Someone reports an incident 3 Run Snort on the captured traffic • Two countries examples: • 30 Gb Netflow Traffic for a 20 millions people country per 24 hours (about 1700 events/s; 510 000 events/5 mn) 7/54
  • 10. Find incidents in large networks: Network traffic 1 Capture all the traffic 2 Someone reports an incident 3 Run Snort on the captured traffic • Two countries examples: • 30 Gb Netflow Traffic for a 20 millions people country per 24 hours (about 1700 events/s; 510 000 events/5 mn) • 5 min Netflow Capture on the main backbone on a 45 millions people country: 3 millions events/5 mn 7/54
  • 11. 1 Introduction 2 Network Capture 3 Logs Capture 4 CUDA 5 Visualization 6 Conclusion 8/54
  • 12. Capture with libpcap u_char ∗ packet ; struct timeval packet_tv ; s t r u c t pcap_pkthdr pheader ; ... packet = ( u_char ∗ ) pcap_next ( pcaph , &pheader ) ; while ( packet ) { p a c k e t _ t v = pheader . t s ; t = packet_tv . tv_sec ; s t r t i m e = c t i m e (& t ) ; i f ( ntohs ( e t h e r −>e t h _ t y p e ) == ETH_TYPE_IP ) { i p = ( s t r u c t i p _ h d r ∗ ) ( packet + ETH_HDR_LEN ) ; ... 9/54
  • 13. How does libpcap works? • Layer 2 • Packet copied! (ahah) • Apply a BPF filter • Get the data 10/54
  • 15. DAQ (Awesome) Data Acquisition Library written by Sourcefire. Available from http://www.snort.org Unifies: • AFPacket • ipqueue • netfilter_queue • libpcap 12/54
  • 16. Other ways to capture • Daemonlogger: relies on libpcap • Streams2 : relies on libpcap just for BPF • Various works from Luca Deri with PF_RING • using GPGPU 2 git clone git://git.carnivore.it/streams.git 13/54
  • 17. Now you (perhaps) got your packet! The packet is captured, fine! however: • It can be fragmented • If you run a signature maching, UTF-8 encoding can bypass it • A protocol like RPC need to be decoded • The attack can be located at different DoD model levels 14/54
  • 18. Fragmentation Let’s have a look at Linux: • IPV4: linux-src/net/ipv4/ip_fragment.c • IPV6: linux-src/net/ipv6/reassembly.c How it is performed in IPV4: • Defragmentation happens with the function ip_defrag() • Called only by: • ip_local_deliver() • ip_call_ra_chain: only if the socket is tied to an interface 15/54
  • 19. • Linux does not defragment upon FORWARD • Netfilter may do it • modprobe nf_conntrack_ipv4 16/54
  • 20. We captured, we want evils! Snort gives up several ways to find the evil: • Binary: content:"|0A 00 00 01 85 04 00 00 80|root|00|" (sid:1775) • Simple pattern: content:"fuck fuck fuck" (sid:1316) • PCRE: pcre:"/ˆ x3c(REQIMG|RVWCFG) x3e/ism" (sid:2460) Problem: How Snort manages pattern matching algorithms along with PCRE? Each PCRE is tried on each packet? 17/54
  • 21. snort PCRE lookup • Long patterns are easier to find • PCRE and pattern matching within Snort: • Search for the longest pattern in each signature • function fpAddLongestContent() in fpcreate.c • The traffic is prequalifed (MPSE) • Rules aare sequentially tested • The PCRE option is ignored until the complete rule test after the prequalification • PCRE uses its own DFA/NFA ⇒ Less we have PCRE, better we are. 18/54
  • 22. Netflow • It is easier to investigate with connection flow • Looking at TCP SYN is better for understanding than the whole SYN>SYN-ACK>ACK>PSH>PSH-ACK, etc. • Streams was designed to help you there 19/54
  • 23. 1 Introduction 2 Network Capture 3 Logs Capture 4 CUDA 5 Visualization 6 Conclusion 20/54
  • 24. Logs Logs highly used for forensic activity for cybercrime investigation 21/54
  • 25. Logs Logs highly used for forensic activity for cybercrime investigation Question: who cares about logs? their weakness, normalization, etc.? 21/54
  • 26. SSH defaults accounts testing sshd [ 6 5 7 4 ] : error : PAM: Authentication failure for r o o t from 1 9 2 . 1 6 8 . 1 2 . 2 sshd [ 6 5 7 4 ] : error : PAM: Authentication failure for guest from 1 9 2 . 1 6 8 . 1 2 . 2 sshd [ 6 5 7 4 ] : error : PAM: Authentication failure for p r i n t e r from 1 9 2 . 1 6 8 . 1 2 . 2 sshd [ 6 5 7 4 ] : error : PAM: Authentication failure for l p from 1 9 2 . 1 6 8 . 1 2 . 2 sshd [ 6 5 7 4 ] : error : PAM: Authentication failure for admin from 1 9 2 . 1 6 8 . 1 2 . 2 22/54
  • 27. Detection dilemna 1 Detecting • A user enumeration is more likely to get caught and correlated • Use tools like OSSEC and get it right in your mailbox • OSSEC and any other tools like that need logs to analyze and detect things 2 Log analyzers common weaknesses • Signature based • PCRE based (with PCRE weaknesses as well, but this is for an other talk) • Needs food == Needs logs 23/54
  • 28. Know Your Enemy Log analyzer enemy == Configurable log 24/54
  • 29. Squid Log Format configuration l o g f o r m a t s q u i d %t s .%03 t u %6 t r %>a %Ss/%03>Hs %<s t %rm %r u %un %Sh/%<A %mt Log Format options ... [ h t t p : : ] rm Request method (GET/POST e t c ) [ h t t p : : ] ru Request URL [ h t t p : : ] rp Request URL−Path e x c l u d i n g hostname ... 25/54
  • 30. ProFTPd Log with mod_log Log Format configuration LogFormat d e f a u l t "%h %l %u %t "% r " %s %b " Log Format options %A − Anonymous username ( password g i v e n ) %a − Remote c l i e n t IP address %b − Bytes s e n t f o r r e q u e s t 26/54
  • 31. Apache Log with mod_log Log Format configuration LogFormat "%h %l %u %t "% r " %>s %b " % { R e f e r e r } i " " % { User−Agent } i " " combined Cool options! • %b did you see this %b? • %b: Size of response in bytes, excluding HTTP headers. In CLF format, i.e. a ’-’ rather than a 0 when no bytes are sent. • It is possible to exploit this weakness 27/54
  • 32. Log misuse 0-day A log misuse 0-day is: • an application fails to properly log an information it could • log injection • incorrect logged information There is NO log misuse 0-day database! 28/54
  • 33. Simple Log misuse 0-day Back on ProFTPd, remember: Log Format options %A − Anonymous username ( password g i v e n ) password given = gets anything Code managing the password # d e f i n e PR_TUNABLE_PATH_MAX 1024 char arg [ PR_TUNABLE_PATH_MAX+1] = { ’ 0 ’ } ; case META_ANON_PASS: argp = arg ; pass = p r _ t a b l e _ g e t ( s e s s i o n . notes , " mod_auth . anon−passwd " , NULL ) ; i f ( ! pass ) pass = "UNKNOWN" ; s s t r n c p y ( argp , pass , s i z e o f ( arg ) ) ; → Remote log injection possible, in /var/log/proftpd/auth.log 29/54
  • 34. Log misuse database Actually there is CWE. . . • Common Weakness Enumeration • CWE-778: Insufficient Logging "When a security-critical event occurs, the software either does not record the event or omits important details about the event when logging it." 30/54
  • 35. CVE examples • CVE-2003-1566: Microsoft IIS 5.0 does not log requests that use the TRACK method, which allows remote attackers to obtain sensitive information without detection. • CVE-2007-3730: OpenVMS does not log the source IP. • CVE-2008-1203: Adobe ColdFusion 8 and ColdFusion MX7 do not log failed connection attempts on the administrative interface. • ... Those CVE are still under review 31/54
  • 36. YASA! (Yet Another Stealth Attack) Ever seen this attack? 66.249.65.39 - - [28/Mar/2007:03:08:46 +0200] "GET /index.html HTTP/1.1" 404 394 "-" "Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" 32/54
  • 37. 1 Introduction 2 Network Capture 3 Logs Capture 4 CUDA 5 Visualization 6 Conclusion 33/54
  • 38. My laptop has a NVIDIA Geforce GT 420M • 96 CUDA cores • Memory Bandwidth 25.6 GB/sec • A Thread block can run up to 512 threads 34/54
  • 41. Capture using CUDA: NetGPU Available from http://code.google.com/p/netgpu 37/54
  • 42. 1 Introduction 2 Network Capture 3 Logs Capture 4 CUDA 5 Visualization 6 Conclusion 38/54
  • 43. Problems with SIEM and Intrusion Detection • Capture is complex • Rulesets are required: always after the problem • Too many false positives 39/54
  • 44. Why Visualization Handle large data without extracting known events to correlate yourself. 40/54
  • 45. Secviz Visualization community website: http://www.secviz.org 41/54
  • 46. Circos 42/54
  • 47. Limitation Enough with limitations. 43/54
  • 48. How many events are in this picture? 44/54
  • 49. How many events are in this picture? 45/54
  • 50. Discover a successful attack in less than one minute 46/54
  • 51. Discover a successful attack in less than one minute 47/54
  • 52. Discover a successful attack in less than one minute 48/54
  • 53. Discover a successful attack in less than one minute 49/54
  • 54. Discover a successful attack in less than one minute 50/54
  • 55. Discover a successful attack in less than one minute 51/54
  • 56. 1 Introduction 2 Network Capture 3 Logs Capture 4 CUDA 5 Visualization 6 Conclusion 52/54
  • 57. Conclusion • Data are obviously lost in the noise of events today • If we are creative, we may be able to solve this issue • We have some technical limitations, we need to find ways to get around them 53/54
  • 58. Conclusion • Data are obviously lost in the noise of events today • If we are creative, we may be able to solve this issue • We have some technical limitations, we need to find ways to get around them • We have some technical solutions (hint: SIEM), we need to find ways to get around them • I strongly believe visualization has a great role to play in it 53/54
  • 59. Questions? • Email: stricaud@picviz.com • Company website: http://www.picviz.com • Twitter: @tricaud • Blog: http://logviz.blogger.com 54/54