- Exposing One of China’s Cyber Espionage Units
They begin with
These attacks fit into a cyclic pattern of activity
Attack Lifecycle model. In each stage we will discuss APT1’s specific techniques to illustrate their tenacity and the
scale at which they operate.
http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf
- 8
cyber security technologies DHS is trying to commercialize
This software runs malware within a virtual machine and records what it does so
Socrates
This software platform automatically seeks patterns in data sets, and can tease out those that represent
This is a software database system that captures packets to analyze network traffic by first organizing packet traffic into flows.
REDUCE
This is a software analysis tool to reveal relationships between malware samples and to develop signatures that can
Dynamic Flow Isolation
DFI leverages software defined networking to apply security policies on-demand based on current operational state or business needs.
TRACER
Timely Randomization Applied to Commodity Executables at
FLOWER
Network FLOW AnalyzER inspects IP packet headers to gather data about bi-directional flows that can
This platform analyzes network behaviors to identify likely malicious behavior to stop attacks including zero-days for which there are no signatures.
http://www.networkworld.com/article/3056624/security/8-cyber-security-technologies-dhs-is-trying-to-commercialize.html
- Inspection of packet captures
PCAP-for signs of intrusions, is a typical everyday task for security analysts and an essential skill analysts should develop.
ways to hide their activities on the system level (i.e.
a more passive mode, waiting for something malicious to happen that might
introduced to fill this gap.
https://www.sans.org/reading-room/whitepapers/threathunting/hunting-threats-packet-captures-37765
- Source Routing
network administrators block all source-routed packets at their border routers.
Unless a network depends on it,
Source routing is a technique whereby the sender of a packet can specify the route that a packet should take through the network. As a packet travels through the network, each router will examine the destination IP address and choose the next hop to forward the packet to. In source routing, the "source" (i.e., the sender) makes some or
Attackers can use source routing to probe the network by forcing packets into specific parts of the network. Using source routing, an attacker can collect information about a network's topology, or other information that could be useful in performing an attack. During an attack, an attacker could use source routing to direct packets to bypass existing security restrictions.
https://superuser.com/questions/924633/why-doesnt-ping-j-work
- Source routing has been around for a very long time. In fact, it’s a part of the specification of the IP protocol.
http://www.enclaveforensics.com/Blog/files/dbe04629c14a2d07495a38bbf2fc98d9-5.html
Wireshark
http://www.wireshark.org
Wireshark shows all the action in the bottom pane like this:
Ethernet II (Data Link Layer)
Internet Protocol Version 4 (Network Layer)
User
Domain Name System (response) Application Layer
So here’s the big review:
Routers are layer 3 devices because they make forwarding decisions based on layer 3 addresses.
Hubs, NICS, Wi-Fi cards, cables, and connectors are at layer 1.
Layer 2 has MAC addresses, the NIC is also a Layer 2 device because it has the MAC address. Switches are bridges with more ports they also work at layer 2 since they understand physical addresses.
At Layer 3 we use IPv4 and IPv6. Routers live here and
And here’s a quick review of the terms:
MAC address and Physical Address and Layer 2 addresses are the same thing.
Frames are Protocol Data Units (PDUs) at Layer 2
Packets are PDUs at Layer 3
Segments are PDUs at Layer 4
Data is just called a PDU at the Application Layer
http://www.fixedbyvonnie.com/2015/05/networking-101-layers-part-3-of-3/#
wireshark
https://en.wikiversity.org/wiki/Wireshark/IPv4_fragments
- Packets 8, 9, 10, 11
These are the four critical packets required by
The first pair of packets has a “replay counter” value of 1.
The second pair has a “replay counter” value of 2.
Packets with the same “replay counter” value are matching sets.
If you have only one packet for a specific “
EAPOL packets 1 and 3 should have the same nonce value. If they don't, then they are not part of the matching set.
Packets 12, 13, 14, 15
These are data packets to/from the wireless client to the LAN via the AP. You can view the TKIP Parameters field to confirm that WPA
In
http://aircrack-ng.org/doku.php?id=wpa_capture
tcpdump -nnvvS src 172.5.2.3 anddst port 3389
netcat
http://en.wikipedia.org/wiki/Netcat
For port scanning with Netcat use the following syntax:
As we said, you
http://linux.devicegadget.com/attack/netcat/167/
hping
http://www.hping.org/
PassiveDNS sniffs traffic from an interface or reads apcap -file and outputs
the DNS-server answers to a log file.
DNS answers in-memory, limiting the amount of data in the
losing the essence in the DNS answer.
https://github.com/gamelinux/passivedns
- CIRCL Passive DNS is a database storing historical DNS records from various resources including malware analysis or partners.
The DNS historical data is indexed , which makes it searchable for incident handlers, security analysts or researchers.
https://www.circl.lu/services/passive-dns/
- TCP reset attack
TCP reset attack, also known as "forged TCP resets", "spoofed TCP reset packets" or "TCP reset attacks", is a way to tamper and terminate the Internet connection by sending a forged TCP reset packet. This tampering technique can be used by a firewall in goodwill, or abused by a malicious attacker to interrupt Internet connections.
https://en.wikipedia.org/wiki/TCP_reset_attack
No comments:
Post a Comment