Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Threat Hunting & Compromised Assessment on the ...

Threat Hunting & Compromised Assessment on the cheap 101

Avatar for ISSDU Threat Research

ISSDU Threat Research

October 25, 2019
Tweet

More Decks by ISSDU Threat Research

Other Decks in Technology

Transcript

  1. whoami 證照: • CEH CHFI • Palo Alto Network ACE

    • McAfee Vulnerability Manager 經歷: • 協助檢調單位偵辦重大網路犯罪 • 建置企業APT防護 • 協助企業資安事件處理 專長: • Incident Response / Compromised Assessment / Malware Analysis • Penetration Testing & Exploit Research • Security Solution Implementation • APT(Gateway/Mail/Sandbox/End point) • NGFW & NGIPS • Endpoint/Managed Detection and Response
  2. Agenda 1. What is Threat Hunting & Compromised Assessment 2.

    Hunting and Assessment Cycle 3. How to… On the Cheap… A. Host B. Network C. Intelligence 4. Conclusion
  3. 5 Why we need??? (1) • 企業的入侵向量(Initial Access) • The

    initial access tactic represents the vectors adversaries use to gain an initial foothold within a network. • 駭客怎麼打進來的方法…
  4. 6 Why we need??? (2) 沙箱繞過與反分析 • https://github.com/a0rtega/pafis h •

    https://github.com/AlicanAkyol/s ems/ • https://github.com/LordNotewort hy/al-khaser • https://github.com/marcusbotaci n/Anti.Analysis • https://github.com/ricardojrdez/a nti-analysis-tricks • https://github.com/google/sandb ox-attacksurface-analysis-tools
  5. Why we need??? (3) LOLBAS • Only pre-installed software is

    used by the attacker and no additional binary executables are installed onto the system 7
  6. Why we need??? (4) 合法掩護非法 • SoftEther VPN是一個由筑波大學研究生Daiyuu Nobori(登太游)因碩士論文 而開發的開源、跨平台、多重協定的虛擬私人網路方案,此方案讓一些虛擬私人

    網路協定像是SSL VPN 、L2TP、IPsec、OpenVPN以及微軟SSTP都由同一個單 一VPN伺服器提供。 • 北韓網軍LAZURUS攻擊事件也使用該VPN工具作為跳板使用 8
  7. Alerting vs Hunting ALERTING (AUTOMATIC) • Reactive: Focus on known

    threats HUNTING (MANUAL) • Proactive: Focus on new threats TI – threat intelligence MA – malwareanalysis DF – digital forensics IR – incident response
  8. Threat Hunting. What is It? • Cyber threat hunting is

    the practice of searching iteratively through data to detect advanced threats that evade traditional security solutions. (sqrrl) • “Searching for persistent threats that have evaded existing security controls”(Delta Risk)
  9. Compromise Assessment (1) • A compromise assessment is a high-level

    review of the organization that does not rely on a hypothesis or limited scope in order to answer a very fundamental question: am I compromised? In other words, based upon your organization’s data, logs, and existing telemetry, are there any indicators of compromise, or threat actors present in the environment? (Cisco) • “A proactive time-bound effort to detect threats that have evaded existing security controls”(Delta Risk) • 台灣好像叫 木馬檢測 or 資安健檢的惡意軟體檢視 & 網路流量及記錄檔 分析 …
  10. Compromise Assessment (2) Definitionally, compromise assessment should be: • Focused

    - On detecting malicious software and unauthorized activity within the organization • Time Bound - Assessments are short duration with high intensity generally completed with hours/days • Affordable - Organization should be able to conduct them regularly • Independent - Should not depend on in-place detection tools , which may have missed the threat in the first place
  11. Cycle Look at your network(Log) and your hosts(Log) General Hunt

    methodology • Collect data (收好收滿跟監控) • Analyze collection (分析) • Follow up on leads (追蹤線索) • Remediate (處理修復) • Repeat (循環持續 or 定期進行)
  12. 收 (IR Toolkit) https://github.com/diogo-fernan/ir-rescue • activity: user activity data •

    disk: disk data • events: Windows event logs • filesystem: data related with NTFS and files • malware: system data that can be used to spot malware • memory: the memory • network: network data • registry: system and user registry • system: system-related information • web: browsing history and caches.
  13. Sigma • https://github.com/Neo23x0/sigma • Sigma is for log files what

    Snort is for network traffic and YARA is for files.
  14. 威脅情資 情資蒐集方法及來源 • IR • VIRUSTOTAL Yara Hunting • Threat

    Hunting (Anomaly Detection) • OSINT • Twitter • https://github.com/hslatman/awesome-threat- intelligence • https://www.one- tab.com/page/higRMQLCTxaBpuYO0_JEuA • https://github.com/CyberMonitor/APT_CyberCri minal_Campagin_Collections • 客戶提供之不明樣本分析及後續關聯 • Honeypot( Open Proxy、Tor node) • 各大資安設備情資萃取 • 主動木馬檢測 情資類別 • 弱點及漏洞 • 中繼站 • 駭客手法
  15. 9 V.S 14 • 台視 • 中視 • 民視 •

    華視 • 東森 • 年代 • 中天 • 三立 • 非凡 • 八大關鍵基礎設施 • 六都區域聯防 35
  16. 資安沒有百分之百 唯有讓駭客入侵的成本提高 The cyber adversary's tactics flow like water, seeking

    the path of least resistance. Plan accordingly. - Sun Tzu, The Art of Cyber War -
  17. 被入侵並不可恥 是否有真正回饋及改善 The competent cyber warrior learns from their mistakes.

    The cyber master learns from the mistakes & knowhow of others. - Sun Tzu, The Art of Cyber War -