MODULE 24 - CERTIFICATION CYBER OPS ASSOCIATE Flashcards
(144 cards)
Syslog and NTP
Various protocols that commonly appear on networks have features that make them of special interest in security monitoring.
For example, syslog and Network Time Protocol (NTP) are essential to the work of the cybersecurity analyst.
Syslog and NTP The syslog standard is used for
logging event messages from network devices and endpoints, as shown in the figure
https://snipboard.io/cuZAPX.jpg.
The standard allows for a system-neutral means of transmitting, storing, and analyzing messages.
Many types of devices from many different vendors can use syslog to send log entries to central servers that run a syslog daemon.
This centralization of log collection helps to make security monitoring practical. Servers that run syslog typically listen on UDP port 514.
Syslog and NTP Because syslog is so important to security monitoring, syslog servers may be a target for threat actors.
Some exploits,
such as those involving data exfiltration, can take a long time to complete due to the
very slow ways in which data is secretly stolen from the network.
Syslog and NTP Some attackers may try to hide the fact that exfiltration is occurring.
They attack syslog servers that contain the information that could lead to detection of the exploit.
Hackers may attempt to block the transfer of data from syslog clients to servers, tamper with or destroy log data, or tamper with the software that creates and transmits log messages.
The next generation (ng) syslog implementation, known as syslog-ng, offers enhancements that can help prevent some of the exploits that target syslog.
NTP - Network Time Protocol Syslog messages are usually timestamped.
This allows messages from different sources to be organized by time to provide a view of network communication processes.
Because the messages can come from many devices, it is important that the devices share a consistent timeclock. One way that this can be achieved is for the devices to use Network Time Protocol (NTP).
NTP uses a hierarchy of authoritative time sources to share time information between devices on the network, as shown in the figure.
In this way, device messages that share consistent time information can be submitted to the syslog server. NTP operates on UDP port 123.
NTP - Network Time Protocol
Because events that are connected to an exploit can leave traces across every network device on their path to the target system, timestamps are essential for detection.
Threat actors may attempt to attack the NTP infrastructure in order to corrupt time information used to correlate logged network events.
This can serve to obfuscate traces of ongoing exploits.
In addition, threat actors have been known to use NTP systems to direct DDoS attacks through vulnerabilities in client or server software.
While these attacks do not necessarily result in corrupted security monitoring data, they can disrupt network availability.
NTP - Network Time Protocol
https://snipboard.io/RklCav.jpg
https://snipboard.io/RklCav.jpg
DNS - DOMAIN NAME SERVICE
Domain Name Service (DNS) is used by millions of people daily.
Because of this, many organizations have less stringent policies in place to protect against DNS-based threats than they have to protect against other types of exploits.
Attackers have recognized this and commonly encapsulate different network protocols within DNS to evade security devices.
DNS - DOMAIN NAME SERVICE
DNS is now used by many types of malware.
Some varieties of malware use DNS to communicate with command-and-control (CnC) servers and to exfiltrate data in traffic disguised as normal DNS queries.
Various types of encoding, such as Base64, 8-bit binary, and Hex can be used to camouflage the data and evade basic data loss prevention (DLP) measures.
DNS - DOMAIN NAME SERVICE
For example, malware could encode stolen data as the subdomain portion of a DNS lookup for a domain where the nameserver is under control of an attacker.
A DNS lookup for ‘long-string-of-exfiltrated-data.example.com’ would be forwarded to the nameserver of example.com, which would record ‘long-string-of-exfiltrated-data’ and reply back to the malware with a coded response.
This use of the DNS subdomain is shown in the figure.
The exfiltrated data is the encoded text shown in the box.
The threat actor collects this encoded data, decodes and combines it, and now has access to an entire data file, such as a username/password database.
DNS - DOMAIN NAME SERVICE
It is likely that the subdomain part of such requests would be much longer than usual requests.
Cyber analysts can use the distribution of the lengths of subdomains within DNS requests to construct a mathematical model that describes normality.
They can then use this to compare their observations and identify an abuse of the DNS query process.
For example, it would not be normal to see a host on your network sending a query to
aW4gcGxhY2UgdG8gcHJvdGVjdC.example.com.
DNS - DOMAIN NAME SERVICE
DNS queries for randomly generated domain names, or extremely long random-appearing subdomains, should be considered suspicious, especially if their occurrence spikes dramatically on the network.
DNS proxy logs can be analyzed to detect these conditions.
Alternatively, services such as the Cisco Umbrella passive DNS service can be used to block requests to suspected CnC and exploit domains.
DNS - DOMAIN NAME SERVICE DNS Exfiltration
DNS Exfiltration:
https://snipboard.io/QJ0L2I.jpg
HTTP and HTTPS Hypertext Transfer Protocol (HTTP)
is the backbone protocol of the World Wide Web.
However, all information carried in HTTP is transmitted in plaintext from the source computer to the destination on the internet.
HTTP does not protect data from alteration or interception by malicious parties, which is a serious threat to privacy, identity, and information security.
All browsing activity should be considered to be at risk.
HTTP and HTTPS A common exploit of HTTP is called iFrame (inline frame) injection.
Most web-based threats consist of malware scripts that have been planted on webservers.
These webservers then direct browsers to infected servers by loading iframes.
In iFrame injection, a threat actor compromises a webserver and plants malicious code which creates an invisible iFrame on a commonly visited webpage.
When the iFrame loads, malware is downloaded, frequently from a different URL than the webpage that contains the iFrame code.
Network security services, such as Cisco Web Reputation filtering, can detect when a website attempts to send content from an untrusted website to the host, even when sent from an iFrame, as shown in the figure.
HTTP and HTTPS HTTP iFrame Injection Exploit
HTTP iFrame Injection Exploit
https://snipboard.io/l0YQPu.jpg
To address the alteration or interception of confidential data, many commercial organizations have adopted HTTPS or implemented HTTPS-only policies to protect visitors to their websites and services.
HTTP and HTTPS HTTPS adds a layer of encryption to the HTTP protocol by using secure socket layer (SSL), as shown in the figure :
https://snipboard.io/U2LS0n.jpg
This makes the HTTP data unreadable as it leaves the source computer until it reaches the server.
Note that HTTPS is not a mechanism for web server security.
It only secures HTTP protocol traffic while it is in transit.
HTTPS Protocol Diagram
https://snipboard.io/U2LS0n.jpg
HTTP and HTTPS
Unfortunately, the encrypted HTTPS traffic complicates network security monitoring.
Some security devices include SSL decryption and inspection; however, this can present processing and privacy issues.
In addition, HTTPS adds complexity to packet captures due to the additional messaging involved in establishing the encrypted connection.
This process is summarized in the figure and represents additional overhead on top of HTTP.
HTTPS Transactions
https://snipboard.io/aNlyJY.jpg
Email Protocols
Email protocols such as SMTP, POP3, and IMAP can be used
Email protocols such as SMTP, POP3, and IMAP can be used by threat actors to spread malware, exfiltrate data, or provide channels to malware CnC servers, as shown in the figure.
https://snipboard.io/m82QnS.jpg
Email Protocols SMTP sends data from a host to a mail server and between mail servers.
Like DNS and HTTP, it is a common protocol to see leaving the network.
Because there is so much SMTP traffic, it is not always monitored. However, SMTP has been used in the past by malware to exfiltrate data from the network.
In the 2014 hack of Sony Pictures, one of the exploits used SMTP to exfiltrate user details from compromised hosts to CnC servers.
This information may have been used to help develop exploits of secured resources within the Sony Pictures network.
Security monitoring could reveal this type of traffic based on features of the email message.
Email Protocols IMAP and POP3 are used to download email messages from a mail server to the host computer.
For this reason, they are the application protocols that are responsible for bringing malware to the host.
Security monitoring can identify when a malware attachment entered the network and which host it first infected.
Retrospective analysis can then track the behavior of the malware from that point forward.
In this way, the malware behavior can better be understood and the threat identified.
Security monitoring tools may also allow recovery of infected file attachments for submission to malware sandboxes for analysis.
Email Protocols Email Protocol Threats
https://snipboard.io/lH1uE4.jpg
ICMP ICMP has many legitimate uses,
however ICMP functionality has also been used to craft a number of types of exploits.
ICMP can be used to identify hosts on a network, the structure of a network, and determine the operating systems at use on the network.
It can also be used as a vehicle for various types of DoS attacks.
ICMP ICMP can also be used for data exfiltration.
Because of the concern that ICMP can be used to surveil or deny service from outside of the network, ICMP traffic from inside the network is sometimes overlooked.
However, some varieties of malware use crafted ICMP packets to transfer files from infected hosts to threat actors using this method, which is known as ICMP tunneling.