Lewis University Intrusion Detection and Attack indicators Questions
Question Description
Homework: Network Security
Submission Guidelines
Please complete and submit the Submission File for your homework deliverable.
Part 1: Review Questions
Before diving into a lab exercise, complete the following review questions:
Security Control Types
The concept of defense in depth can be broken down into three different security control types. Identify the security control type of each set of defense tactics.
- Walls, bollards, fences, guard dogs, cameras, and lighting are what type of security control?
- Security awareness programs, BYOD policies, and ethical hiring practices are what type of security control?
- Encryption, biometric fingerprint readers, firewalls, endpoint security, and intrusion detection systems are what type of security control?
Intrusion Detection and Attack indicators
What’s the difference between an IDS and an IPS?
What’s the difference between an Indicator of Attack and an Indicator of Compromise?
The Cyber Kill Chain
Name each of the seven stages for the Cyber Kill chain and provide a brief example of each.
- Stage 1:
- Stage 2:
- Stage 3:
- Stage 4:
- Stage 5:
- Stage 6:
- Stage 7:
Snort Rule Analysis
Use the provided Snort rules to answer the following questions:
Snort Rule #1
alert tcp $EXTERNAL_NET any -> $HOME_NET 5800:5820 (msg:"ET SCAN Potential VNC Scan 5800-5820"; flags:S,12; threshold: type both, track by_src, count 5, seconds 60; reference:url,doc.emergingthreats.net/2002910; classtype:attempted-recon; sid:2002910; rev:5; metadata:created_at 2010_07_30, updated_at 2010_07_30;)
- Break down the Sort Rule header. What is this rule doing?
- What stage of the Cyber Kill Chain does the alerted activity violate?
- What kind of attack is this rule monitoring?
Snort Rule #2
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET POLICY PE EXE or DLL Windows file download HTTP"; flow:established,to_client; flowbits:isnotset,ET.http.binary; flowbits:isnotset,ET.INFO.WindowsUpdate; file_data; content:"MZ"; within:2; byte_jump:4,58,relative,little; content:"PE|00 00|"; distance:-64; within:4; flowbits:set,ET.http.binary; metadata: former_category POLICY; reference:url,doc.emergingthreats.net/bin/view/Main/2018959; classtype:policy-violation; sid:2018959; rev:4; metadata:created_at 2014_08_19, updated_at 2017_02_01;)
- Break down the Sort Rule header. What is this rule doing?
- What stage of the Cyber Kill Chain does the alerted activity violate?
- What kind of attack is this rule monitoring?
Snort Rule #3
Your turn! Write a Snort rule that alerts when traffic is detected inbound on port 4444 to the local network on any port. Be sure to include the msg
in the Rule Option.
Part 2: “Drop Zone” Lab
In this lab exercise, you will assume the role of a Jr. Security Administrator at an indoor skydiving company called Drop Zone.
- Your company hosts a web server that takes online reservations and credit card payments. As a result, your company must comply with PCI/DSS regulations which requires businesses who take online credit card payments to have a firewall in place to protect personally identifiable information (PII).
- Your network has been under attack from the following three IPs:
10.208.56.23
,135.95.103.76
, and76.34.169.118
. You have decided to add these IPs to the drop zone within your firewall. - The first requirement of PCI/DSS regulations is to protect your system with firewalls. “Properly configured firewalls protect your card data environment. Firewalls restrict incoming and outgoing network traffic through rules and criteria configured by your organization.” PCI DSS Quick Reference Guide
Set Up:
For this lab you will use the Network Security Lab located in Azure.
- Once logged in, launch an instance of the machine
firewalld
from the HyperV Manager and login with the following credentials:- Username:
sysadmin
- Password:
cybersecurity
- Username:
Reference: https://manpages.debian.org/testing/firewalld/firewall-cmd.1.en.html
Instructions:
The Senior Security Manager has drafted configuration requirements for your organization with the following specification.
You need to configure zones
that will segment each network according to service type.
- Public Zone
- Services: HTTP, HTTPS, POP3, SMTP
- Interface: ETH0
- Web Zone
- Source IP: 201.45.34.126
- Services: HTTP
- Interface: ETH1
- Sales Zone
- Source IP: 201.45.15.48
- Services: HTTPS
- Interface: ETH2
- Mail Zone
- Source IP: 201.45.105.12
- Services: SMTP, POP3
- Interface: ETH3
You also need to drop all traffic from the following blacklisted IPs:
10.208.56.23
135.95.103.76
76.34.169.118
ufw
Uninstall Before getting started, you should verify that you do not have any instances of ufw
running. This will avoid conflicts with your firewalld
service. This also ensures that firewalld
will be your default firewall.
- Run the command that removes any running instance of
ufw
.
firewalld
Enable and start By default, the firewalld
service should be running. If not, then run the following commands:
- Run the commands that enable and start
firewalld
upon boots and reboots.Note: This will ensure thatfirewalld
remains active after each reboot.
Confirm that the service is running.
- Run the command that checks whether or not the
firewalld
service is up and running.
List all firewall rules currently configured.
Next, lists all currently configured firewall rules. This will give you a good idea of what’s currently configured and save you time in the long run by not doing double work.
- Run the command that lists all currently configured firewall rules:
- Take note of what zones and settings are configured. You many need to remove unneeded services and settings.
List all supported service types that can be enabled.
- Run the command that lists all currently supported services to see if the service you need is available
- We can see that the
Home
andDrop
Zones are created by default.
Zone Views
- Run the command that lists all currently configured zones.
- We can see that the
Public
andDrop
Zones are created by default. Therefore, we will need to create Zones forWeb
,Sales
, andMail
.
Web
, Sales
and Mail
. (Hint look at the manpage in the instructions)
Create Zones for - Run the commands that create Web, Sales and Mail zones.
- Use the manpage link provided above for assistance.
Set the zones to their designated interfaces.
- Run the command that sets your interface to your zones.
- Use the configurations provided at the beginning of the instructions.
Add services to the active zones.
- Run the commands that add services to the public zone, the web zone, the sales zone, and the mail zone.
- Use the configurations provided at the beginning of the instructions.
Add your adversaries to the Drop Zone.
- Run the command that will add all the blacklisted IPs to the Drop Zone.
Make rules permanent then reload them:
It’s good practice to ensure that your firewalld
installation remains nailed up and retains its services across reboots. This ensure that the network remains secured after unplanned outages such as power failures.
- Run the command that reloads the
firewalld
configurations and writes it to memory.
View active Zones
Now, we’ll want to provide truncated listings of all currently active zones. This a good time to verify your zone settings.
- Run the command that displays all zone services.
Block an IP address
- Use a rich-rule that blocks the IP address
138.138.0.3
on your public zone.
Block Ping/ICMP Requests
Harden your network against ping
scans by blocking icmp ehco
replies.
- Run the command that blocks
pings
andicmp requests
in yourpublic
zone.
Rule Check
Now that you’ve set up your brand new firewalld
installation, it’s time to verify that all of the settings have taken effect.
- Run the command that lists all of the rule settings. Run one command at a time for each zone.
- Are all of the rules in place? If not, then go back and make the necessary modification before checking again.
Congratulations! You have successfully configured and deployed a fully comprehensive firewalld
installation.
Part 3: IDS, IPS, DiD, and Firewalls
Answer the following review questions.
IDS vs. IPS Systems
- Name and define two ways an IDS connects to a network.
- Describe how an IPS connects to a network.
- What type of IDS compares patterns of traffic to predefined signatures and is unable to detect Zero-Day attacks?
- Which type of IDS is beneficial for detecting all suspicious traffic that deviates from the well-known baseline and is excellent at detecting when an attacker probes or sweeps a network?
Defense in Depth
- For each of the following scenarios, provide the layer of Defense in Depth that applies:
- A criminal hacker tailgates an employee through an exterior door into a secured facility, explaining that they forgot their badge at home.
- A zero-day goes undetected by antivirus software.
- A criminal successfully gains access to HRs database.
- A criminal hacker exploits a vulnerability within an operating system.
- A hacktivist organization successfully performs a DDoS attack, taking down a government website.
- Data is classified at the wrong classification level.
- A state sponsored hacker group successfully firewalked an organization to produce a list of active services on an email server.
- Name one method of protecting data-at-rest from being readable on hard drive.
- Name one method to protect data-in-transit.
- What technology could provide law enforcement with the ability to track and recover a stolen laptop.
- How could you prevent an attacker from booting a stolen laptop using an external hard drive?
Firewall Architectures and Methodologies
- Which type of firewall verifies the three-way TCP handshake? TCP handshake checks are designed to ensure that session packets are from legitimate sources.
- Which type of firewall considers the connection as a whole? Meaning, instead of looking at only individual packets, these firewalls look at whole streams of packets at one time.
- Which type of firewall intercepts all traffic prior to being forwarded to its final destination. In a sense, these firewalls act on behalf of the recipient by ensuring the traffic is safe prior to forwarding it?
- Which type of firewall examines data within a packet as it progresses through a network interface by examining source and destination IP address, port number, and packet type- all without opening the packet to inspect its contents?
- Which type of firewall filters based solely on source and destination MAC address?
Bonus Lab: “Green Eggs & SPAM”
This bonus activity is a culmination of the topics and tools covered during the following Unit 11 activities:
- Alert – FTP File Extraction
- Alert – ET INFO Executable Download
- Alert – C2 Beacon
- Investigation, Analysis, and Escalation Activity
- Threat Hunting – Cyber Threat Intelligence
In this activity, you will target spam, uncover its whereabouts, and attempt to discover the intent of the attacker.
- You will assume the role of a Jr. Security administrator working for the Department of Technology for the State of California.
- As a junior administrator, your primary role is to perform the initial triage of alert data: the initial investigation and analysis followed by an escalation of high priority alerts to senior incident handlers for further review.
- You will work as part of a Computer and Incident Response Team (CIRT), responsible for compiling Threat Intelligence as part of your incident report.
Instructions
Log into the Security Onion VM and use the following Indicator of Attack to complete this portion of the homework.
Locate the following Indicator of Attack in Sguil:
- Source IP/Port:
188.124.9.56:80
- Destination Address/Port:
192.168.3.35:1035
- Event Message:
ET TROJAN JS/Nemucod.M.gen downloading EXE payload
Answer the following questions:
- What was the indicator of an attack?
- Hint: What do the details of the reveal?
- What was the attacker’s motivation?
- Describe observations and indicators that may be related to the perpetrators of the intrusion. Categorize your insights according to the appropriate stage of the cyber kill chain, as structured in the following table.
TTP | Example | Findings |
---|---|---|
Reconnaissance | How did they attacker locate the victim? | |
Weaponization | What was it that was downloaded? | |
Delivery | How was it downloaded? | |
Exploitation | What does the exploit do? | |
Installation | How is the exploit installed? | |
Command & Control (C2) | How does the attacker gain control of the remote machine? | |
Actions on Objectives | What does the software that the attacker sent do to complete it’s tasks? |
- What are your recommended mitigation strategies?
- Cite your references here.
"Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you "A" results."