Threat Level: green Handler on Duty: Xavier Mertens

SANS ISC: Internet Storm Center - Internet Security | DShield Internet Storm Center


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Latest Diaries

What is really being proxied?

Published: 2017-03-08
Last Updated: 2017-03-20 11:57:06 UTC
by Richard Porter (Version: 1)
0 comment(s)

An observation from the road, was with a client recently and the discussion of proxy entered into the conversation. Now before we get all “Political” and start dropping packet bombs, a technical challenge came up that made me really think.

 

  1. What traffic is ‘really’ hitting the proxy?
  2. How many proxy ‘bypass’ rules are in place?
  3. Are you inspecting Encrypted Traffic?
  4. Who/What is in the Encryption Inspection Bypass list?

 

Google recently released some numbers on encrypted traffic and we are WELL past the 50% mark [1] [2] [3]. With the ease of getting signed certificates through organizations like Letsencrypt and the high level of privacy concerns in the world, it only makes sense [4].

The observation, proxy was politically driven, senior management did not have the right business understanding of what a proxy does. Further, the word “proxy” had become and abstract term for the concept of filtering, blocking, and proxy. This made it hard when ‘vendor’ uses industry language and organization says “yes, we understand that is what’s REALLY going on but please say proxy for that with management.”

Now to the discovery portion of our diary, how long has it been since you have looked at what is actually flowing out of your environment? Yes yes.. we know that ‘everything’ runs over ports 80 or 443, but after taking a look at my own environment? A little bit more of non 80/443tcp traffic was leaving that expected (and that was even with the cynical pre-disposition).

 

With a greater than 50% of traffic being encrypted it is clear that the topic of decryption needs to be revisited. Along with that, what is actually being picked up outbound and what is not hitting the known exit points (e.g. is it really going over 443?).

[1] http://www.pcmag.com/news/342935/77-percent-of-google-internet-traffic-now-encrypted

[2] http://www.newsfactor.com/news/Google--77--of-Traffic-Is-Encrypted/story.xhtml?story_id=111003TV6AOF

[3] https://www.inferse.com/40477/google-transparency-report-2016/

[4] https://www.nytimes.com/2017/03/07/world/europe/wikileaks-cia-hacking.html?_r=0

 

Richard Porter

--- ISC Handler on Duty

0 comment(s)

Searching for Base64-encoded PE Files

Published: 2017-03-19
Last Updated: 2017-03-19 20:57:14 UTC
by Xavier Mertens (Version: 2)
0 comment(s)

When hunting for suspicious activity, it's always a good idea to search for Microsoft Executables. They are easy to identify: They start with the characters "MZ" at the beginning of the file[1]. But, to bypass classic controls, those files are often obfuscated (XOR, Rot13 or Base64). Base64 is very common and it's easy to search for Base64 encoded PE files by searching the following characters:

TVoA
TVpB
TVpQ
TVqA
TVqQ
TVro

(Credits go to a tweet from Paul Melson[2])

I added a new regular expression to my Pastebin scrapper:

TV(oA|pB|pQ|qA|qQ|ro)\w+

It already matched against interesting pasties :-)

The same filter can be applied to your IDS config, YARA rule, email filters, etc...

[1] https://en.m.wikipedia.org/wiki/DOS_MZ_executable
[2] https://twitter.com/pmelson

Xavier Mertens (@xme)
ISC Handler - Freelance Security Consultant
PGP Key

0 comment(s)

If you have more information or corrections regarding our diary, please share.

Recent Diaries

Example of Multiple Stages Dropper
Mar 18th 2017
2 days ago by Xme (3 comments)

Retro Hunting!
Mar 15th 2017
5 days ago by Xme (2 comments)

February and March Microsoft Patch Tuesday
Mar 14th 2017
6 days ago by Johannes (4 comments)

New tool: sigs.py
Mar 13th 2017
1 week ago by Jim (0 comments)

View All Diaries →

Latest Discussions

CTI Summit Keynote - Cliff Stoll - (Still) Stalking the Wily Hacker
created Mar 11th 2017
1 week ago by Russell (0 replies)

Critical RCE on Apache Struts2 is being actively exploited [CVE-2017-5638]
created Mar 9th 2017
1 week ago by Anonymous (0 replies)

abnormal DNS queries mostly from AWS
created Mar 1st 2017
2 weeks ago by Anonymous (2 replies)

The format of BGP messages with routeviews
created Feb 22nd 2017
3 weeks ago by samara (3 replies)

Platform Markings on Headlines
created Feb 9th 2017
1 month ago by Anonymous (0 replies)

View All Forums →

Latest News

View All News →

Top Diaries

Dyn.com DDoS Attack
Oct 21st 2016
4 months ago by Johannes (9 comments)

Microsoft Patch Tuesday Delayed
Feb 18th 2017
1 month ago by Johannes (7 comments)

Critical Vulnerability in Cisco WebEx Chrome Plugin
Jan 24th 2017
1 month ago by Johannes (10 comments)

The Side Effect of GeoIP Filters
Mar 10th 2017
1 week ago by Xme (7 comments)

Port 7547 SOAP Remote Code Execution Attack Against DSL Modems
Nov 29th 2016
3 months ago by Johannes (22 comments)