Riasztások

SANS · 2 óra 44 perc

Is Metadata Only Approach, Good Enough for Network Traffic Analysis?, (Sun, May 19th)

Five years ago I wrote a diary how metadata could be used to detect suspicious activity[1]. Obviously collecting packets allows the analyst to scrutinize the payload which allows in-depth analysis. However, with higher content being encrypted and the cost of storing terabyte of packets, more organization are now looking at a metadata-only approach to be good enough to respond to incidents.

Lately, I had discussion on what might be the "next generation of super tools" to help catch bad actors in a network. If you already have logs from many sources plus metadata with full packet capture at some key locations, using tools like User and Entity Behavior Analytics (UEBA) and Endpoint Detection and Response (EDR) are becoming really effective in the network at catching bad actors are becoming in some cases, a replacement for full packet capture.

This appears to be true when combining data from sources such as network devices logs made available to review endpoint activities. Not that long ago, network forensic tools (NFTs) were storing everything in/out of a network as raw packets, but today’s fast networks is making this approach pretty much impractical for nearly everyone. This is where rich host and network metadata can capture most of the information required and provide much better investigative value for the money, it is easier and in most cases faster to find issues lurking in the network at a much lower computational and storage cost.

There are still some cases where metadata might be insufficient where packets capture might be required to complement the investigation but that is becoming rarer.

What do you think currently works best for you in detecting actors inside a network: logs, packets, UEBA, EDR or a combination of some of these tools?

[1] https://isc.sans.edu/forums/diary/Is+Metadata+the+Magic+in+Modern+Network+Security/16114
[2] https://isc.sans.edu/forums/diary/Mapping+Use+Cases+to+Logs+Which+Logs+are+the+Most+Important+to+Collect/22526/
[3] https://isc.sans.edu/diary/Collecting+Logs+from+Security+Devices+at+Home/14614

-----------
Guy Bruneau IPSS Inc.
My Handler Page
Twitter: GuyBruneau
gbruneau at isc dot sans dot edu

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
NVD: all CVE · 2019. május 18.

CVE-2019-12173

MacDown 0.7.1 (870) allows remote code execution via a file:\\\ URI, with a .app pathname, in the HREF attribute of an A element. This is different from CVE-2019-12138.
NVD: all CVE · 2019. május 18.

CVE-2019-12172

Typora 0.9.9.21.1 (1913) allows arbitrary code execution via a modified file: URL syntax in the HREF attribute of an AREA element, as demonstrated by file:\\\ on macOS or Linux, or file://C| on Windows. This is different from CVE-2019-12137.
NVD: all CVE · 2019. május 18.

CVE-2019-12168

Four-Faith Wireless Mobile Router F3x24 v1.0 devices allow remote code execution via the Command Shell (aka Administration > Commands) screen.
NVD: all CVE · 2019. május 18.

CVE-2019-12170

ATutor through 2.2.4 is vulnerable to arbitrary file uploads via the mods/_core/backups/upload.php (aka backup) component. This may result in remote command execution. An attacker can use the instructor account to fully compromise the system using a crafted backup ZIP archive. This will allow for PHP files to be written to the web root, and for code to execute on the remote server.
Sophos virus alerts · 2019. május 18.

Troj/Stealer-PW

Sophos virus alerts · 2019. május 18.

Troj/RTFDl-VX

Sophos virus alerts · 2019. május 18.

Troj/Inject-EBZ

Sophos virus alerts · 2019. május 18.

Troj/Fareit-HQY

Sophos virus alerts · 2019. május 18.

Troj/Fareit-HQZ

Sophos virus alerts · 2019. május 18.

Troj/Rozena-V

Sophos virus alerts · 2019. május 18.

Troj/Phish-FDN

Sophos virus alerts · 2019. május 18.

Troj/NanoCr-BI

Sophos virus alerts · 2019. május 18.

Troj/DocDl-TTG

Sophos virus alerts · 2019. május 18.

Troj/DocDl-TTE

Sophos virus alerts · 2019. május 18.

Troj/DocDl-TTD

Sophos virus alerts · 2019. május 18.

Troj/BatDrp-T

Sophos virus alerts · 2019. május 18.

Troj/Agent-BBMG

Sophos virus alerts · 2019. május 18.

Troj/Agent-BBMF

Sophos virus alerts · 2019. május 18.

JS/Dwnldr-YCU