A look at some of the tools and techniques which can help anyone to build computer systems with security at their core, using free and Open Source tools.
Operations Defensive operations aim to: • Protect Information Resources from attack. They must: • Cost less than the losses that would occur in their absence.
Intrusion Detection – Inline mode – Intrusion Prevention – Searches network traffic for pattern matches – Rules files updated daily Suricata – IDS/IPS project started in 2009 – Multi-threaded for greater native performance – Protocol detection. Not based on port number – Can use Snort rules and can co-exist
Platform: – IDS features available – require custom scripting. – Detailed statistical log files created – Application-layer transcripts, e.g. HTTP, SSL etc. – Cluster-aware for high-capacity analysis – Scripting engine : Highly extensible – e.g. Match file MD5 against Team Cymru malware database
for known attack patterns: – Use additional wireless radios in monitor mode – (optionally) Channel-hop on the channels that you use – Kismet Drones can be distributed network-wide – Suitable for embedded use i.e. OpenWRT, DD-WRT etc. – Kismet Clients can view real-time host list and traffic – Alerts sent via syslog – Permits full 802.11 capture
and historical information about: – Hosts observed – Protocol distribution – Multicast/Broadcast frequency – Who's talking to whom? • Can also be used as a NetFlow Collector
a database of authorized MAC addresses – Alert on any deviation – syslog or email • PRADS - Passive Real-Time Asset Detection System – Builds a list of hosts/service on the network – Can be used to inform Snort configuration – pradsassetreport - what's been seen on the network? • PBNJ – Active Network Asset Detection System – Database of discovered hosts/services (nmap) – Re-scan & diff
including switches, routers, etc. – e.g. Snare or eventlog-to-syslog for Windows • Cryptographic Log Signing – Feature of rsyslog version 7.4+ – rsgutil utility verifies signatures action(type="omfile" file="/var/log/syslog" sig.provider="gt" sig.keepTreeHashes="on" sig.keepRecordHashes="on") action(type="omfile" file="/var/log/syslog" sig.provider="gt" sig.keepTreeHashes="on" sig.keepRecordHashes="on")
for security related information – Snort-like rules for pattern matching – e.g. Handling our previous WIDS alert alert syslog $EXTERNAL_NET any -> $HOME_NET any (msg: "[KISMET] Spoofed disassociated/deauthenticate packets"; program: kismet_server; pcre: "/DEAUTHFLOOD|BCASTDISCON/"; classtype: suspicious-traffic;) alert syslog $EXTERNAL_NET any -> $HOME_NET any (msg: "[KISMET] Spoofed disassociated/deauthenticate packets"; program: kismet_server; pcre: "/DEAUTHFLOOD|BCASTDISCON/"; classtype: suspicious-traffic;) – Incorporate results into an IDS database – Integrates with Snortsam Agent for active firewall response