Page 53 - Cyber Defense eMagazine September 2018
P. 53

53


          The Ponemon study showed that a majority of breached organization were notified by someone other than
          their own staff. Grabowski concludes that is a problem because IT people do not know the software used in
          the industry. They don’t have time to analyze the software and they don’t have time in their day to day
          operations to learn how to use the product. If it is in the classroom first we can literally send out hundreds
          of students a year with product knowledge. To be able to be a professional tester you must use the same
          techniques that a criminal hacker does to search for vulnerabilities.

          At any given moment a student can spin up a virtual workstation on VMware Virtual Center Stack using
          hybrid Nimble Technology and create an entire infrastructure. Any distribution of Linux can be used as well
          as any Microsoft Operating System. Linux distribution for security include Kali 2018, Deft, Paladin, and
          Security Onion. Grabowski also uses Syracuse’s University’s Security Education (SEED) labs provided by
          Dr. Kevin Wu, which are based off Ubuntu.  The SEED labs provide an abundance of training for information
          security education.

          IBM Qradar a SIEM runs on Redhat, AlienVault runs on Debian.  Correlog runs on anything and can be
          easily installed onto a Windows operating system. PRTG is also a self-install onto a Windows operating
          system. We are marketed these tools thoroughly in the cyber security realm. However, who has time to
          understand  what  is  going  on  with  the  product.  When  we  monitor  things  in  something  as  common  as
          Wireshark sniffer, we could literally learn something new every day.  When using something like Wireshark
          we can see everything happening we just need to learn how to filter it properly to find what we are looking
          for. Did a rogue device get an IP address from a Man in the Middle (MITM) attack? Did a Bluetooth device
          connect to the network or device? Was a door opened that was connect to a Google Hub? Did the Nest
          Smoke detector generate an encrypted alarm?

          More  importantly  as  we  start  to  understand  these  breaches,  how  did  we  detect  them?  How  did  we
          reconstruct  the  events?  Using  tools  such  as  Belkasoft  Evidence  Center,  Encase,  FTK,  Autopsy,  or
          OSForensics in conjunction with Linux Distros of Kali for Pen testing.

          Even more beneficial is determine an actual false positive in a SIEM. Recently we were trying to detect
          torrent traffic on our network and we having problems popping the alarm. Then a week later the alarm
          popped up in the executive summary dashboard as torrent traffic. The port was reporting 17500, which isn’t
          common for torrent traffic. Torrent traffic is on ports 6881-6889. Was the port obfuscated? Pinging the IP
          address of the VM we retrieved a host name which corresponded to a student ID. Upon questioning the
          student to determine if they were running torrent traffic they denied their involvement. Believable because
          the student was a trustworthy student. Research concluded that he opened Drop Box on the computer,
          which indeed uses port 17500.

          Students also participate in live hackathons or in Master the Mainframe contest. Symantec held a hack that
          included Ransomware. Students had to determine a bitcoin address, look in Wireshark to find the URL, gain
          admin  rights  of  the  website,  and  then  convert  the  encrypted  file  using  key  with  Python.  Technologies
          included Wireshark,  bitcoin,  Ransomware,  PHP,  Python,  Linux.    In that particular  hackathon there  is  a
          tremendous gain of reconstructing events, which become a valuable asset to our skill sets that reinforce the
          theory in the classroom. We learn something new every day from the products we get to use every day.
   48   49   50   51   52   53   54   55   56   57   58