mind the gap - sans · mind the gap: building a bridge from intrusion to detection . ......

47
Bart Hopper MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION

Upload: ngonhi

Post on 23-May-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

Bart Hopper

MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION

TO DETECTION

Page 2: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

WHAT WILL WE COVER? (SLIDES AVAILABLE ON REQUEST)

• Defining the Threat

• Yara

• Python

• Python PEFile module

• Entropy measurements

• ClamAV

Page 3: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

WHOAMI

Page 4: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

THE MOST INTERESTING TOILET IN THE WORLD

Los Banditos Restaurant

Prague, Czech Republic

Page 5: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

BUT I HAVE AN ANTIVIRUS PROGRAM…..

Page 6: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

A NORMAL MS WORD DOCUMENT

Page 7: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

RESUME SENT TO HR

Page 8: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

YARA HTTP://PLUSVIC.GITHUB.IO/YARA/

Page 9: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

XOR RULES

Page 10: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

HIDDEN EVIL

Page 11: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …
Page 12: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …
Page 13: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …
Page 14: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

ALTERNATE DATA STREAMS (ADS)

Page 15: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

SCANNING ALTERNATE DATA STREAMS

Page 16: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

SCANNING THE REGISTRY

Page 17: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

SCANNING A PROCESS

Page 18: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

Source: http://resources.infosecinstitute.com/presenting-the-pe-header/

Page 19: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

SCANNING A PROCESS (PART 2)

Page 21: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

GENERATING METERPRETER PAYLOADS

Page 22: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

YARAGENERATOR (HTTPS://YARAGENERATOR.COM/)

Page 23: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

GENERATED RULE

Page 24: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

CREATING RULES BASED ON RESOURCES (HTTP://WWW.ANGUSJ.COM/RESOURCEHACKER/)

Page 25: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

PEVIEW (HTTP://WWW.MAGMA.CA/~WJR)

Page 26: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

EASY STRING TO HEXCODE CONVERSION

Page 27: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

COMPUTING FILE HASH USING PYTHON

Page 28: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

PYTHON MODULE – PEFILE (HTTPS://CODE.GOOGLE.COM/P/PEFILE/)

Page 29: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

INSTALLING ON PYTHON3

Page 30: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

GENERATING HASHES WITH PEFILE

Page 31: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

EXTRACTING FILE SEGMENTS

Page 32: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

HASHES SORTED BY SECTIONS

Page 33: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

NOTHING IN COMMON?!

Page 34: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

ENTROPY

Lyda, R.; Hamrock, J., "Using Entropy Analysis to Find Encrypted and Packed

Malware," Security & Privacy, IEEE , vol.5, no.2, pp.40,45, March-April 2007

Data Set Average

Entropy 99% Confidence

Intervals

Plain Text 4.347 4.401 - 5.030

Native Executables 5.099 6.084 - 6.369

Packed Executables 6.801 7.199 - 7.267

Encrypted Executables 7.175 7.295 - 7.312

Page 35: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

COMPUTING ENTROPY

Page 36: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

ENTROPY > 6.5

Page 37: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

IMPHASH (HASH OF IMPORT TABLE) (HTTPS://WWW.MANDIANT.COM/BLOG/TRACKING-MALWARE-IMPORT-HASHING/)

Page 38: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

IMPHASH OF PAYLOADS

Page 39: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

IDA PRO (HTTPS://WWW.HEX-RAYS.COM/INDEX.SHTML)

Page 40: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

ANTI-FORENSICS CODE

Page 41: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …
Page 42: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …
Page 43: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …
Page 44: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

CLAMAV HTTP://WWW.CLAMWIN.COM/

• Hash of the entire file (MD5:Size:MalwareName)

sigtool –md5 evil.exe > my_signatures.hdb

(Hashstring:Filesize:MalwareName)

• Hash of Section (Use 7zip)

.mdb (PESectionSize:MD5:MalwareName)

• Byte patterns

.ndb (MalwareName:TargetType:Offset:HexSignature)

Page 45: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

CALLING CLAMAV FROM PYTHON

Page 46: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

SUMMARY

• Traditional Antivirus programs are ineffective

• Your organization is getting hit with undetected threats

• Undetected malware can cause catastrophic damage

• You need to perform threat analysis to know your

specific threats and vulnerabilities

• “For every complex problem there is an answer that is

clear, simple, and wrong.” - H. L. Mencken

Page 47: MIND THE GAP - SANS · MIND THE GAP: BUILDING A BRIDGE FROM INTRUSION TO DETECTION . ... •yara-ctypes ( …

QUESTIONS?

Spondulas:

http://sourceforge.net/projects/spondulas/

Contact:

Twitter: @d4ncingd4n

Email: [email protected]

http://www.linkedin.com/in/barthopper