81
Username: conf2016 Password: security https://conf-sec-seho-<2 digit number that is your birthday>.splunkoxygen.com/ https://conf-sec-seho-31.splunkoxygen.com/ EXAMPLE if I was born on July 31st: https://conf-sec-seho-04.splunkoxygen.com/ EXAMPLE if I was born on August 4th:

Username: conf2016 Password: security

Embed Size (px)

Citation preview

Page 1: Username: conf2016 Password: security

Username:conf2016Password:security

https://conf-sec-seho-<2digitnumberthatisyourbirthday>.splunkoxygen.com/

https://conf-sec-seho-31.splunkoxygen.com/

EXAMPLEifIwasbornonJuly31st:

https://conf-sec-seho-04.splunkoxygen.com/

EXAMPLEifIwasbornonAugust4th:

Page 2: Username: conf2016 Password: security

Copyright©2016Splunk Inc.

JamesBrodskyGuywithbeard|Splunk

DimitriMcKayGuywithlargerbeard|Splunk

Splunking theEndpoint:“Handson!”RansomwareEdition

Page 3: Username: conf2016 Password: security

Disclaimer

3

Duringthecourseofthispresentation,wemaymakeridiculousstatementsregardingSplunkfeaturesthatmayormaynotbetrue.ThisisnotreflectiveofSplunkasacompany.Wecautionyouthatsuchstatementsreflectourownpersonallackofintelligenceandyoushouldloweryourexpectationsbasedonthefactthatwe’renotallthatbright.Bywe,wemeanDimitri.Actualfeaturesorfunctionsandtheirexplanationofwhichmaydifferfromreality.ForSplunkSearchLanguagequestions,Dimitri’sanswerswillprobably notbethetruth,assuch,actualresultswilldiffergreatlyfromthosecontainedinSplunkdocumentation.Ifyourecordthispresentation,youaregivingupyourrighttovote,righttobarearms(i.e.notanktops),andrightstoyourfirstbornmalechild. Theforward-lookingstatementsmadeinthispresentationarebeingmadeupaswegoalong.If reviewedafter itslivepresentation, thiscontentmaynotcontaincurrentorfactualinformation. Pleasedonotassumeanylegalobligationtoourcommentsorstatementsasfrankly,ifyoutattle,wewilldenyeverything. Inaddition,informationinthispresentationissubjecttochangeatanytimewithoutnoticebasedonhowmuchtroublewecouldpotentiallybein.Thispresentation isforeducational informational entertainmentpurposesonly.Donothold Splunkaccountableforanythingthatwemightsayordo,asfrankly,thebiasedopinionsandpoordecisionsweareabouttomakehereareourown.Thanks,andenjoytheshow.

Page 4: Username: conf2016 Password: security

4

Page 5: Username: conf2016 Password: security

5

Page 6: Username: conf2016 Password: security

6

Brodsky

SEManagerSWMajorsSecurityPracticeFanboy

3 Years+

Page 7: Username: conf2016 Password: security

7

3 Years+

Brodsky

SEManagerSWMajorsSecurityPracticeFanboy

Page 8: Username: conf2016 Password: security

8

Page 9: Username: conf2016 Password: security

> DimitriMcKay|SeniorSecurityArchitect|CISSP|CCSK|LOLZ|WTF

q 20yearsofnet/systemsecurityexperience.q 2nd place,2016Defcon BeardCompetition

q Formerpentester,corporatesecurityslackerforasearchengineandplussizedhandmodel.

q Enjoysmakingpoordecisions,breakingthingsanddisappointingmyparents.

q CurrentroleontheSecurityPracticeteamfocusesonsecuritystrategyforthefortune50,evangelismandaskingdumbquestions.

q Currentlyinterestedinmachinelearningforhomehomeautomationproductswhichwilleventuallybecomeselfawareandkillusall.

9

MinsterofSwagger@dimitrimckay

Page 10: Username: conf2016 Password: security

> DimitriMcKay|SeniorSecurityArchitect|CISSP|CCSK|LOLZ|WTF

q 20yearsofnet/systemsecurityexperience.q 2nd place,2016Defcon BeardCompetition

q Formerpentester,corporatesecurityslackerforasearchengineandplussizedhandmodel.

q Enjoysmakingpoordecisions,breakingthingsanddisappointingmyparents.

q CurrentroleontheSecurityPracticeteamfocusesonsecuritystrategyforthefortune50,evangelismandaskingdumbquestions.

q Currentlyinterestedinmachinelearningforhomehomeautomationproductswhichwilleventuallybecomeselfawareandkillusall.

10

MinsterofSwagger@dimitrimckay

Page 11: Username: conf2016 Password: security

11

Page 12: Username: conf2016 Password: security

AgendaReallyshortransomwareoverviewWhat’dwetalkaboutlastyearanderrataHowdowelogin?Hands-On:DetectionbywatchingtheendpointsHands-On:AdiversionovertoforensicsHands-On:IdeasforpreventionCollapseonstage

12

Page 13: Username: conf2016 Password: security

13

IntentionallyLeftBlank

Page 14: Username: conf2016 Password: security

14

So… what’stheproblem,Dimitri?

Page 15: Username: conf2016 Password: security

15

Page 16: Username: conf2016 Password: security

16

Page 17: Username: conf2016 Password: security

17

Page 18: Username: conf2016 Password: security

RansomwareEvolution

18

2013 2014 2015 2016

RANSOMLOCK

URAUSY

CRYPTOLOCKER

CRYPTODEFENSECRYPTOWALL

REVETONLOCKDROID

TESLACRYPTCTB-LOCKERLOCKSCREEN

VIRLOCKTOX

TESLACRYPT2.0TORRENTLOCKER

73V3N

DMALOCKCHIMERA

LOCKYSAMSAMKERANGERPOWERWARE

PETYATESLACRYPT3&4

CERBERJIGSAWROKKU

HYDRACRYPT…

Page 19: Username: conf2016 Password: security

19

Page 20: Username: conf2016 Password: security

20

So,wait,howbadisit,Dimitri?

Page 21: Username: conf2016 Password: security

Today

21

Page 22: Username: conf2016 Password: security

22

2016Verizonbreachreport

Page 23: Username: conf2016 Password: security

23

Page 24: Username: conf2016 Password: security

24

Page 25: Username: conf2016 Password: security

25

2016Verizonbreachreport

Page 26: Username: conf2016 Password: security

26

Mindvisualizingthattothekillchain,Dimitri?

Page 27: Username: conf2016 Password: security

RansomwareKillChain

27

CriminalSyndicate

Ransomware

WateringHole/ExploitKit

MaliciousEmail(Link/Attachment)

Vulnerability

Page 28: Username: conf2016 Password: security

28

Page 29: Username: conf2016 Password: security

29

SwitchtoJames

Page 30: Username: conf2016 Password: security

30

Butbeforewecontinue…

Page 31: Username: conf2016 Password: security

31

Let’sgobackintime…

Page 32: Username: conf2016 Password: security

Toexactly1yearago

Page 33: Username: conf2016 Password: security

@MGMLasVegas

Page 34: Username: conf2016 Password: security

34Poordecisionsweremade

Page 35: Username: conf2016 Password: security

35

TheUF:It’smorethanyouthink

Logs

Page 36: Username: conf2016 Password: security

36

Scripts

Perfmon

WireData

Logs

Process/Apps/FIM

Registry

Sysmon

TheUF:It’smorethanyouthink

Page 37: Username: conf2016 Password: security

37

WireData

Logs

Process/Apps/FIM

Registry

Sysmon

RansomwareExercises:fromtheUF

Page 38: Username: conf2016 Password: security

38

WireData

Logs

Process/Apps/FIM

Registry

Sysmon

AndwewilladdfromnonUFsources:

Forensics

FirewallVulnerabilities

Page 39: Username: conf2016 Password: security

39

Howmuchdata?

That’smorelikeit.16MBofSysmon,5.5MBofWindowsevents=21.5MBperendpoint.

Coveragefor1,000Windowsendpoints?21.5GB ingest,perday.

Page 40: Username: conf2016 Password: security

40

Whatwentwronglastyear?

Page 41: Username: conf2016 Password: security

41

Let’sgobackintime…

nooneisperfect…

Page 42: Username: conf2016 Password: security

42

Let’sgobackintime…

Mistakesweremade…

Page 43: Username: conf2016 Password: security

Therewere… inaccuracies…

Page 44: Username: conf2016 Password: security

Thesedidn’talwayswork.Havebeenupdated/fixed.

44

New!

New!

https://splunk.box.com/splunking-the-endpointThankyou,JeffWalzer andMikeSangray!

Page 45: Username: conf2016 Password: security

Username:conf2016Password:security

https://conf-sec-seho-<2digitnumberthatisyourbirthday>.splunkoxygen.com/

https://conf-sec-seho-31.splunkoxygen.com/

EXAMPLEifIwasbornonJuly31st:

https://conf-sec-seho-04.splunkoxygen.com/

EXAMPLEifIwasbornonAugust4th:

Page 46: Username: conf2016 Password: security

Whileyou’regettingloggedin…

46

Aninterludetotalkaboutyourpriorities,people.Dimitri?

Page 47: Username: conf2016 Password: security

47

SwitchtoDimitri

Page 48: Username: conf2016 Password: security

vs.

Page 49: Username: conf2016 Password: security

49

Page 50: Username: conf2016 Password: security

50

Page 51: Username: conf2016 Password: security

51

Page 52: Username: conf2016 Password: security

52

Page 53: Username: conf2016 Password: security
Page 54: Username: conf2016 Password: security

OR

Page 55: Username: conf2016 Password: security

Youmightneedhelp!Followalongwiththenarrationintheapp,atleastforthefirstfew

examples.

Page 56: Username: conf2016 Password: security

NewbiePath

Page 57: Username: conf2016 Password: security

You’vegotthis!Copyandpastetheexamplesearchesintothe“searchbar”inthe“SplunkLive Security2016”

app.

Page 58: Username: conf2016 Password: security

NinjaPath

Page 59: Username: conf2016 Password: security

NinjaPath

Page 60: Username: conf2016 Password: security

Whathavewehere?

Ourlearningenvironmentconsistsof:

• 31publically-accessiblesingle-instanceSplunk servers

• Eachwith~700Kevents,fromrealenvironment.

Page 61: Username: conf2016 Password: security

61

What’sthelabenvironmentlooklike?This?

mylablookslike…youthinkwhat

Page 62: Username: conf2016 Password: security

62

What’sthelabenvironmentlooklike?This?

Whatyouthinkmylablookslike

thereality.

Page 63: Username: conf2016 Password: security

63

attribution.

Page 64: Username: conf2016 Password: security

64

Getreadytocheat learn.

Page 65: Username: conf2016 Password: security

65

Hi.We’reblackhats.

Page 66: Username: conf2016 Password: security

66

we8106desk Fortigate NGFirewall

192.168.250.1

Internetsuricata-idsOD-FM-CONF-NA

(AWS)

splunk-02

wenessus1192.168.2.50WE9041SRV

LAN

WESIFTSVR1WESTOQSVR1

webackupsvr1

Ransomware Lab:“WayneEnterprises”

Hi!I’manendpoint!

Page 67: Username: conf2016 Password: security

67

we8106desk

splunk-02

webackupsvr1

Fortigate NGFirewall

192.168.250.1

Internetsuricata-idsOD-FM-CONF-NA

(AWS)

wenessus1192.168.2.50WE9041SRV

LAN

WESIFTSVR1WESTOQSVR1

USBDrivewithMaliciousWordMacroDoc

miranda_tate_unveiled.dotm(viaUSBdrive)

Page 68: Username: conf2016 Password: security

68

we8106desk Fortigate NGFirewall

192.168.250.1

Internetsuricata-idsOD-FM-CONF-NA

(AWS)

LAN

webackupsvr1wenessus1192.168.2.50WE9041SRV

splunk-02

WESIFTSVR1WESTOQSVR1

CommunicationtoDownloadCryptorCode

Page 69: Username: conf2016 Password: security

69

we8106desk

splunk-02

webackupsvr1

Fortigate NGFirewall

192.168.250.1

Internetsuricata-idsOD-FM-CONF-NA

(AWS)

wenessus1192.168.2.50WE9041SRV

LAN

WESIFTSVR1WESTOQSVR1

LocalFileEncryption

Page 70: Username: conf2016 Password: security

70

we8106desk

WE9041SRVwebackupsvr1wenessus1192.168.2.50

splunk-02

Fortigate NGFirewall

192.168.250.1

Internetsuricata-idsOD-FM-CONF-NA

(AWS)

LAN

WESIFTSVR1WESTOQSVR1

LateralMovetoFileshare

Page 71: Username: conf2016 Password: security

71

we8106desk

WE9041SRVwebackupsvr1wenessus1192.168.2.50

splunk-02

Fortigate NGFirewall

192.168.250.1

Internetsuricata-idsOD-FM-CONF-NA

(AWS)

LAN

WESIFTSVR1WESTOQSVR1

AbandonHope

Page 72: Username: conf2016 Password: security

72

we8106desk Fortigate NGFirewall

192.168.250.1

Internetsuricata-idsOD-FM-CONF-NA

(AWS)

splunk-02

wenessus1192.168.2.50WE9041SRV

LAN

WESIFTSVR1WESTOQSVR1

webackupsvr1

SourcetypesWeHave

WinEventLog:SystemWinEventLog:ApplicationWinEventLog:Security

Microsoft-Windows-Sysmon/OperationalWinRegistry

stream:*

suricata

nessus:pluginnessus:scan

fgt_*

log2timelinestoq:*

WinEventLog:SystemWinEventLog:ApplicationWinEventLog:Security

netbackup_logs

Page 73: Username: conf2016 Password: security

73

DETECTION:Windowsevents,stream,sysmon,registry,firewall….

Page 74: Username: conf2016 Password: security

DETECTION- Welearnedthat:

74

Manywaystodetectunusualendpointbehaviorthatcouldindicateransomwareinfection.Makeyoursearcheslookforgeneral,abnormalbehavior– not“specific”oryou’llneverkeepup.Youdon’thavetoturnoneverythingweshowedtogetsomevalue– butthemoreyouhavethemoreconfidentyoucanbe.Windowseventsareabareminimum!Theearlieryoudetect,thebetterchanceyouhaveatstoppingthespread.

Page 75: Username: conf2016 Password: security

75

FORENSICS:Adiveintoadiskimage

Page 76: Username: conf2016 Password: security

Forensics:Whatdidwelearn?

76

Don’tusesuspiciousUSBdrivescontainingmacro-enabledWorddocs.JWhilelotsofgoodcommercialforensicanalysistoolsexist,there’salotyoucandowithprogramsfromtheopen-sourcecommunity.Log2timeline/Plaso hasbeenaroundforaLONGtimeandcanbeenhancedviaextensiveplugins.Cost=$0.Lotsoftraining!YoucouldgatherdiskimagesfrominfectedsystemsanduseSplunk tosiftthroughtheextensiveamountsofdata.Insmallershops,thisisagooduseforacopyof“FreeSplunk”onyourlaptop.

Page 77: Username: conf2016 Password: security

77

PREVENTION:Infection“Lag.”Backups,backups,backups,backups,backups.Patches,patches,patches,patchesandpatches.Automatedanalysis.

Page 78: Username: conf2016 Password: security

Prevention:Whatdidwelearn?

78

Dowhatyoucanaboutimplementingpolicytohardenyourendpoints.Backeverythingupalwaysandverify.Scanyoursystems,patchyoursystems,useassetandidentityinfo.Performautomatedanalysistoknowwhenbadstuff’sarriving.Leverageinfectionlagbuiltintoransomwarevariantsto“takeaction”beforethedarkness.KenWestin’stalkfromTuesday!

Page 79: Username: conf2016 Password: security

AdaptiveResponse

AdaptiveResponse.

Page 80: Username: conf2016 Password: security

Dimitri’s MagicalandTimelyARSlide

80

Page 81: Username: conf2016 Password: security

THANKYOU

https://splunk.box.com/splunking-the-endpoint2016https://splunk.box.com/splunking-the-endpoint