By Peter Hadač
This article is all about how to prepare ASA 8.4 in GNS3 simulation (on Windows 10, but compatible with other OS ) using QEMU.
By Peter Hadač
This article is all about how to prepare ASA 8.4 in GNS3 simulation (on Windows 10, but compatible with other OS ) using QEMU.
Moloch consists of three components:
All of the components can be located and run on a single node, however this is not recommended for processing of larger data flows. Whether the data flow is too large can be determined by requests taking too long to respond, in that case, transition to multi-node architecture is advised. The individual components have distinct requirements, Capture requires large amounts of disk space to store received PCAP files, by contrast, Elasticsearch requires large amount of RAM for idexing and searching. The viewer has the smallest requirements of the three, allowing it to be located anywhere.
Moloch can be easily scaled to multiple nodes for Capture and Elasticsearch components. One or several instances of Capture can run on a single or multiple nodes, while sending data to the Elasticsearch database. Similarly, single one or multiple instances of Elasticsearch can run on either one or several nodes to increase the amount of RAM capacity for indexing. This architecture type is therefore recommended for data flow capture and real-time indexing.
We recommend deploying Moloch behind a mirrored switch interface, in our case a Cisco SPAN port. Click here for more information on port mirroring.
When we have Wi-Fi adapter in our PC, we may use it as a network interface of VM, but the VM will recognize it just as another wired interface. But there is possibility to connect an USB Wi-Fi dongle adapter and enable it to the VM. VM then will see dongle as native USB Wi-Fi adapter and it allows to work with WiFi networks natively.
For example, we have the TP-LINK Archer T2UH USB dongle, Windows 10 as base system, Lubuntu 19.04 as the virtual machine and VirtualBox 6.0.8.
In this article we take a closer look at the ISCX IDS 2012 dataset created by the Canadian Institute for Cybersecurity.
Network datasets serve for the purpose of training of network security systems, namely IDS and IPS.
Analysis of the ISCX dataset from June 15th in Moloch
The size of PCAP data from this day is 24.5 GB. The dataset is described in three XML files, with the attack being described in the file TestbedTueJun15-3Flows. The description implies a DDoS attack using an IRC botnet.
According to PCAP data, the most intense part of the attack lasted for one hour from 21:05 to 22:05. In the XML file, the attack is recorded at 16:04, therefore there is a 5-hour delay between the data.
The attack originated from infected devices in a private network, with the target being the device with IP address 192.168.5.122. Other sessions marked as attacks were of too low intensity to be visibly displayed. According to the XML description, the attack commenced roughly one hour before the start of the most intense part and lasted for five more hours after its end.
This is an illustration of the most intense part of the attack. IP address with the highest traffic representing the device being attacked is located in the center of the graph. Network communication that was not a part of the attack is being displayed too
This illustration shows only the originating addresses of sessions with destination address 192.168.5.122 – target of the attack.
Analysis of the dataset in IDS Suricata
Immediately, Suricata detected high amounts of P2P bittorrent traffic (this does not necessarily imply an attack, rather than a violation of network terms).
In the early morning hours (3 a.m. to 4 a.m. ) of the following day (16.6.), several brute force attack attempts on the aforementioned IP address (192.168.5.122) were detected. Several attempts of the same attack in the opposite direction were also detected (internal IP address was attempting to reach an external IP address via SSH).
In addition, Suricata detected several possible Trojans and Malwares (about 60), e.g. Blue Botnet for attack generation and Sality for infection of files in OS Windows. In the afternoon and evening hours, an access to website Regnow.com was also detected. This site is linked to typical scammers from India who pose as MS support and demand your credit card number for cleaning of a purportedly infected computer.
Suricata failed to directly detect an ongoing DDoS attack, the only sign which was generation of “STREAM 3way handshake with ack in wrong dir” alert between IP addresses 192.168.5.122 and 192.168.4.120 150x per second. However, since the alert always regarded the same IP addresses, we should have been dealing with a DoS attack, rather than a DDoS attack. The aforementioned TCP anomaly occurred for unknown reasons, if it were not for this, there would be no sign of an attack.
Suricata supports rule thresholding, which can be used to detect DDoS attacks. These thresholds have parameters which define the number of sessions, timeframe, maintaining count by source or destination IP address etc. A signature for detecting DDoS attacks using this rule is located online. However, the test performed on this dataset was unsuccessful even after editing of the aforementioned parameters. Dataset analysis revealed that the malicious packets contain TCP flags PUSH and ACK, while the signature expected packets with SYN flag (TCP SYN flood detection). After the removal of the rule, the signature was unusable, since its rules have been met even for normal traffic. I have tried editing the rule’s TCP flags to PUSH and ACK and tested its functionality.
It was necessary to find the marginal value of packets per second low enough to trigger the alert for a potential DDoS attack and high enough not to trigger the alert for common traffic and make sure that alert is triggered only for IP addresses involved in the attack.
My work was complicated by the fact that there were not just the packets incoming from the attacking IP addresses, but also packets outbound in the opposite direction because the attacked server tried to respond to all those HTTP requests. I could have set a signature rule to match destination IP address to server IP, this would, however, render the signature useless for other purposes. The solution to this was to consider only the source IP addresses of the alerts during text formatting (elimination of duplicities and other superfluous data) and ignore the destination addresses.
While counting packets by destination IP, I needed to get at least one alert. I have concluded that precisely one alert is generated at traffic exceeding 8500 packets per second. Minimal traffic involving only the attacking IP addresses was ca. 800 packets per second.
In contrast, while counting packets by source IP, it is necessary to generate at least one alert for each attacking IP address. The maximum flow at which all the attacking IP addresses were detected was ca. 200 packets per second. Minimum flow at which no attacking IP addresses were detected was ca. 100 packets per second.
Summary of attacks (excluding DDoS attacks) detected by IDS Suricata:
PCAP time | Attack | Src. IP and port | Dest. IP and port |
---|---|---|---|
05:58:34.34 | Blue Botnet | 192.168.3.115:3204 | 72.32.84.3:80 |
06:52:16.11 | Blue Botnet | 192.168.3.115:3745 | 72.32.84.3:80 |
07:00:26.37-07:01:49.75 | Blue Botnet | 192.168.2.108 | 68.178.178.33:80 |
07:26:06.70 | SSH Scan | 192.168.2.107:4611 | 112.203.155.205:22 |
09:13:55.36 | Sality | 192.168.2.107:1193 | 208.87.32.68:80 |
09:52:16.48 | Sality | 192.168.2.112:4139 | 208.87.32.68:80 |
11:52:36.59-12:20:50.57 | Blue Botnet | 192.168.4.119:3056 | 68.178.178.33:80 |
12:22:13.68 | Blue Botnet | 192.168.4.119:3071 | 68.178.178.33:80 |
13:42:37.50 | Blue Botnet | 192.168.3.115:3965 | 69.20.70.155:80 |
13:43:17.58 | Blue Botnet | 192.168.3.115:4147 | 72.32.84.3:80 |
13:43:26.02 | Sality | 192.168.3.115:4165 | 208.87.32.68:80 |
13:50:04.74 | Blue Botnet | 192.168.1.102:1033 | 67.113.14.176:80 |
13:51:41.43 | Blue Botnet | 192.168.1.102:1070 | 67.113.14.176:80 |
13:52:37.86 | Blue Botnet | 192.168.1.105:60212 | 174.137.114.60:80 |
13:52:40.68 | Blue Botnet | 192.168.1.105:60230 | 174.137.114.60:80 |
13:52:41.26 | Blue Botnet | 192.168.1.102:1035 | 67.113.14.176:80 |
13:53:53.14 | Sality | 192.168.4.121:59808 | 208.87.32.68:80 |
13:54:08.33 | Blue Botnet | 192.168.1.105:60267 | 174.137.114.60:80 |
13:55:32.63 | Sality | 192.168.1.105:60415 | 208.87.32.68:80 |
13:57:59.03 | Sality | 192.168.1.105:60542 | 208.87.32.68:80 |
14:01:57.07 | Sality | 192.168.2.113:4080 | 208.87.32.68:80 |
14:30:42.14 | Sality | 192.168.1.102:2012 | 208.87.32.68:80 |
15:00:18.78 | Sality | 192.168.4.120:1197 | 208.87.32.68:80 |
15:52:56.48 | Sality | 192.168.1.105:5486 | 208.87.32.68:80 |
16:19:14.08 | Sality | 192.168.4.120:1825 | 208.87.32.68:80 |
16:36:36.10 | Blue Botnet | 192.168.1.102:1116 | 76.74.254.123:80 |
16:39:18.07 | Blue Botnet | 192.168.1.102:1280 | 76.74.254.120:80 |
16:54:38.75 | Blue Botnet | 192.168.2.111:1629 | 68.178.178.33:80 |
16:55:15.07 | Sality | 192.168.1.102:2409 | 208.87.32.68:80 |
17:21:56.68 | Blue Botnet | 192.168.4.118:1087 | 60.199.247.118:80 |
17:56:24.79 | Sality | 192.168.3.116:2900 | 208.87.32.68:80 |
18:54:46.43 | Sality | 192.168.4.120:1365 | 208.87.32.68:80 |
19:17:27.72 | Sality | 192.168.1.105:18681 | 208.87.32.68:80 |
20:27:20.45- 22:06:47.20 | IRC správy | * | * |
22:18:00.45 | Regnow.com | 192.168.4.118:1868 | 209.87.178.183:80 |
23:12:26.69 | Sality | 192.168.1.105:31055 | 208.87.32.68:80 |
23:13:43.47- 23:14:04.25 | Blue Botnet | 192.168.1.101:2190 | 68.178.178.97:80 |
23:18:04.48 | Regnow.com | 192.168.1.102:4394 | 209.87.178.183:80 |
00:03:06.58 | Sality | 192.168.1.105:31329 | 208.87.32.68:80 |
03:56:02.22- 03:57:15.40 | SSH Scan | 217.76.44.243 | 192.168.5.122:22 |
04:01:24.27 | MSIL/Karmen Rans. | 192.168.4.119:2376 | 208.122.215.180:80 |
04:36:30.46 | SSH Scan | 217.76.44.243:57117 | 192.168.5.122:22 |
*
192.168.1.103:4889 -> 192.168.2.112:6667
192.168.1.105:22348 -> 192.168.2.112:6667
192.168.2.109:2969 -> 192.168.2.112:6667
192.168.2.110:3311 -> 192.168.2.112:6667
192.168.2.112:6667 -> 192.168.1.103:4889
192.168.2.112:6667 -> 192.168.1.105:22348
192.168.2.112:6667 -> 192.168.2.109:2969
192.168.2.112:6667 -> 192.168.2.110:3311
192.168.2.112:6667 -> 192.168.2.113:2581
192.168.2.112:6667 -> 192.168.4.118:3761
192.168.2.112:6667 -> 192.168.4.120:4784
192.168.2.113:2581 -> 192.168.2.112:6667
192.168.4.118:3761 -> 192.168.2.112:6667
192.168.4.120:4784 -> 192.168.2.112:6667
Dataset analysis from XML file and PDF article (JU)
How we proceeded:
1. Information gathering and reconnaissance (passive and active)
Scenario 1: infiltrating the network from the inside
1.
Scenario 2: HTTP DoS
Scenario 3: DDoS using an IRC Botnet (Internet Relay Chat)
1.
First and last session that were part of the attack:
17:05:48 – 17:05:49
Scenario 4: Brute Force SSH
1.
When setting timezone, you can set interval of daylight saving time rule. In Slovakia, it is from last sunday of march up to last sunday of october, and change is being made at 2:00.
Configuration is made under regional tab on the bottom of the page. There is box “Daylight Saving Time Rule” and for Slovakia, you should put there:
This post is relevant to all Cicso SPA phones, which have “G” letter in their names. “G” means global (that you can put there languages), not gigabit ethernet (all phones have 100 Mbps interfaces).
First of all, you need to download language files from cisco support page. They are XML files and look like “spa50x_30x_en_v756.xml”. This is for english language. Important is, that you must have two files – for your desired language and for english language. Then set up TFTP server and put there files.
Scirius Community Edition is a web interface dedicated to Suricata ruleset management. It handles the rules file and updates of the associated files.
This guide will walk you through the installation of Scirius Community Edition on Ubuntu 16.04 operating system.
Before proceeding with installation of Scirius CE, you need to have IDS Suricata installed. Installation guide for Suricata can be found here.
This guide describes the individual steps of the installation process of Zabbix version 4.0 on Ubuntu 16.04 operating system.
Zabbix is a free open-source monitoring software. Zabbix provides monitoring of many metrics about the state of the administered network and its devices and services (including virtual machines).
Elastic stack is a group of products from the Elastic company built around the Elasticsearch database designed to process data from any type of source.
In this article we will show you how to monitor the state of the Elasticsearch service and server load using the Elastic Stack services.
In this post we describe how to run Fortigate FW VM appliance inside of the GNS3 (local or remote).
FortiGate VM includes a limited embedded 15-day trial license that supports: