SlideShare a Scribd company logo
Collaborative Security
Audits
http://www.clarifiednetworks.com/

Email/Jabber/Google Talk: jani@clarifiednetworks.com
Testimonial


"With Clarified Networks we
had true situational
awareness...
...This way we received better
return than ever before ...
...Similar agility is very seldom
achieved even with teams
working in the same room."
• - Jaan Priisalu, Head of IT Risk
  Management / Swedbank Baltic
Two Topics




2
Collaboration

1
Traffic Audits

2
What Is Collab
Why Collaboration
Tasks and Targets

                    Open Source
                   Reconnaissance
                                                       People

Social Engineering




 Laptop Security
     Review                         Corporate
                                     Laptops




Website Security
   Review


                   Robustness Testing   Traffic Audit
Bring In The Teams
And Collaborate
Get Synthesis Of Results
Example
Get Situational Awareness
Example
Get Comprehensive
                                Understanding
                           Trained
                          Caller ID
                         verification




                                                   Access
                                                          l
                                                   Contro
                  Access
                  Control


               s
         tiviru ention
     -An Prev
        on       g
    rusi ewallin
-Int -Fir
                                            n  g
                                     lt eri                                             ns
                                 t Fi                                                ke
                            n ten -exe                                             To
                         Co         -zip                                      eN
                                        -...                        red ls   N
                                                               ecu ina
                                                              S m
                                                                  r
                                                               Te
Why Traffic Audits

2
Networks Used To Be Simple
Then We Evolved
Why Traffic Audits (1/2)
Why Traffic Audits? (2/2)
Why Not Earlier?
c06 / 2005-04-19
                                                                                                                                      Mikko Hiltunen
                                       FRONTIER-COMPAT: IPSec-bridges & Probes                                                        University of Oulu




                                                                                                               Internet


              Tampere                                                                                         13
       8                                                                                                           Logserver
WLAN-probe                                                              Access Network
192.168.0.6
                   3                                      WLAN-probe     WLAN-probe
                       IPSec-
                                                          192.168.0.5    192.168.0.4     Access
                       bridge
                                                         8              8                Controller
                                                                                        5                              Backbone


                                                                                                                   6
                                                                                                                    RADIUS
                                             4
                                            IPSec-                                Probe3 10                         Server
                                            hub                                   192.168.0.3

                                                                                                      7
                                       IPSec-                                                     User
                                       bridge                                                     Database                      Backbone2
                                Oulu    3                                                                    11                14
                                                                                                                               RADIUS- /
                                                                                                             Probe4            SS7-GW
                          Access
                   2      Point                 9    Probe2
                                                     192.168.0.8



                                                                                         12
 1             8   WLAN-probe
     Client                                                        Probenet      Supervisor
                                                                                                                                     Legend:
                   192.168.0.9
                                                                                                                                               ethernet
                                                                                                                                               ipsec-tunnel
                                                                                                                                               probe-net
Data Flows/Demo
What you are able to Find
Leaks From Isolated Nets




                            NTP
                          updates
                         from the
                        competing
          Failing DNS    operator
Windows
Updates     queries
Tunneling Leaks
   Internet

         IP
   Gi
              GGSN
   Gn


              GTP
    “Core”
VoIP issues
Compromised Hosts




RADIUS
         IRC
End-to-End Testing
Malware Analysis
Questions?
Hacknet Special




https://www.clarifiednetworks.com/hacknet/
How We Can Collaborate?


• Tools (now)
 • Clarified Analyzer
 • Codenomicon Defensics
• Whitelabeled SecAudit
 Collabs (~6 months)

More Related Content

PDF
PLNOG 13: Marek Janik: Rings in Ethernet Networks
PDF
Harvard referencing examples
PDF
Monitoring An Enterprise Uc Environment
PDF
Cansec West 2009
PDF
Attacking SS7 - P1 Security (Hackito Ergo Sum 2010) - Philippe Langlois
PPT
Lecture 5 ip security
PDF
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
PDF
OCCI status update
PLNOG 13: Marek Janik: Rings in Ethernet Networks
Harvard referencing examples
Monitoring An Enterprise Uc Environment
Cansec West 2009
Attacking SS7 - P1 Security (Hackito Ergo Sum 2010) - Philippe Langlois
Lecture 5 ip security
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
OCCI status update

Similar to Collaborative Security Audits (20)

PDF
iptable casestudy by sans.pdf
PDF
SniffJoke 0.4
PPTX
ITSAC 2011 SCAP for Inter-networking Devices
 
PDF
Swisscom Network Analytics
PPTX
Ogce Workflow Suite Tg09
PDF
Next-gen Network Telemetry is Within Your Packets: In-band OAM
PPTX
Exploring Kali Linux Tools for Website Scanning via IP Address
PDF
PSUG 5 - 2025-01-20 - Splunk Observability And Digital Resilience
PPTX
DAC 2012
PPT
資安控管實務技術
PDF
OW2 Petals Dragon SOA Linuxtag09
PPTX
Sp livenyc dow jones_10_21_2010_edit
PDF
Network Security: Experiment of Network Health Analysis At An ISP
DOCX
Contents namp
DOCX
Contents namp
PDF
The Power of Intelligent Flows: Real-Time IoT Botnet Classification with Apac...
PDF
Openflow Stanford University - Ericsson Collaboration
PDF
Fia aalborg-statement-iopapafi-v0.5
DOCX
Rajesh - CV
PDF
How does ping_work_style_1_gv
iptable casestudy by sans.pdf
SniffJoke 0.4
ITSAC 2011 SCAP for Inter-networking Devices
 
Swisscom Network Analytics
Ogce Workflow Suite Tg09
Next-gen Network Telemetry is Within Your Packets: In-band OAM
Exploring Kali Linux Tools for Website Scanning via IP Address
PSUG 5 - 2025-01-20 - Splunk Observability And Digital Resilience
DAC 2012
資安控管實務技術
OW2 Petals Dragon SOA Linuxtag09
Sp livenyc dow jones_10_21_2010_edit
Network Security: Experiment of Network Health Analysis At An ISP
Contents namp
Contents namp
The Power of Intelligent Flows: Real-Time IoT Botnet Classification with Apac...
Openflow Stanford University - Ericsson Collaboration
Fia aalborg-statement-iopapafi-v0.5
Rajesh - CV
How does ping_work_style_1_gv
Ad

Recently uploaded (20)

PDF
KodekX | Application Modernization Development
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Empathic Computing: Creating Shared Understanding
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
MIND Revenue Release Quarter 2 2025 Press Release
DOCX
The AUB Centre for AI in Media Proposal.docx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Spectroscopy.pptx food analysis technology
PPTX
MYSQL Presentation for SQL database connectivity
PDF
cuic standard and advanced reporting.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
KodekX | Application Modernization Development
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Encapsulation_ Review paper, used for researhc scholars
Review of recent advances in non-invasive hemoglobin estimation
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Dropbox Q2 2025 Financial Results & Investor Presentation
Empathic Computing: Creating Shared Understanding
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
20250228 LYD VKU AI Blended-Learning.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Digital-Transformation-Roadmap-for-Companies.pptx
Machine learning based COVID-19 study performance prediction
MIND Revenue Release Quarter 2 2025 Press Release
The AUB Centre for AI in Media Proposal.docx
“AI and Expert System Decision Support & Business Intelligence Systems”
Spectroscopy.pptx food analysis technology
MYSQL Presentation for SQL database connectivity
cuic standard and advanced reporting.pdf
Programs and apps: productivity, graphics, security and other tools
Ad

Collaborative Security Audits

Editor's Notes

  • #3: Validation of Collaborative Approach Customer is able to steer & participate in a lightweight manner -> higher customer satisfaction You are able to dynamically utilize several teams Your Seniors can participate in several engagements as a part of the virtual team You are able to leverage information instantly For example Social Engineers may utilize information gained from Web Application Testing in their Phishing
  • #4: Two topics today: Collaboration (Process) Traffic Audits (Technical, practical example on how tools and people collaborate)
  • #5: Infrastructure, tools and services for you to get more out from your security audits
  • #6: Based on real observations from your customer’s network you will help them with Network related fact finding, network discovery and documentation and identifying weak spots Traffic audit will help you to pinpoint: Access control leaks, misconfigured hosts and real traffic profiles.
  • #7: Tools will contribute: Tight integration: Clarified Analyzer Loose integration: Defensics, Nessus, Nmap, People: Your specialists, customer, customer’s contractors Infrastructure: A wiki-based environment, supporting XMLRPC interface for tool integration, graphingwiki for easy handling and visualization of semantic data
  • #9: Complex Networks -> we need to understand them to give more valuable/accurate results A myriad of different audit methods: we need to synthesize the results
  • #10: With Collab we are able to utilize larger teams with domain specific specialists.
  • #11: Different specialists may collaborate: For example web application testers find XSS vulnerabilities -> Social Engineers will utilize
  • #12: - We do not merely upload documents (e.g. Like in sharepoint...) - We chop the information to pieces and synthesize it in the Collab environment Analysts and customer sees the results from their viewpoint, not from the analysts viewpoint ‘Web Servers Applications were secured, however the web server runs a vulnerable FTP server, which is accessible from the proxy found in Traffic Audit’
  • #13: This example shows how NMap results and Clarified Analyzer Traffic Audit results can be shown in the context of IP-addresses. Above is a list of devices and their addresses documented with Clarified Analyzer
  • #14: Customer and your seniors can monitor the progress of the service deployment in ‘real-time’. RecentChanges RSS feeds Situational visualizations (GraphingWiki)
  • #15: Analyst A does Open Source Reconnaissance (Intelligence) and uploads the information to the right Collab instance. Phisers will utilize this information and tag the status as they go. Senior Analyst sees how testing progresses. Customer is able to comment: ‘These addresses are admins, they should not be phished as that will blow our cover.’
  • #16: Benefit: You’re understanding of Customer’s social/technical setting will grow significantly during the deployment: You are able to give more valuable results as you put them to the right context You are able to adjust your plans on the fly as you see the customer’s strong and weak spots
  • #17: - Increase system performance by removing needless traffic - Eliminate potential vulnerabilities by removing unnecessary protocols - Discover violations in Access Control - Document, or eliminate ad hoc workarounds that bypass security policies - Find hosts and protocols which do not conform to organisation policy
  • #18: It used to be simple: just servers and clients and simple protocol in between.
  • #19: Then we evolved: messages are passed within a complex system, using several different types of protocols. It is hard to: Discover weak spots (‘You have build a lots of security features but did you know that the user input travels all the way to the core of your network. These inputs may exploit the vulnerabilities inside your net’.) When something really goes wrong, the path from symptoms to root cause is long.
  • #20: A more practical example. The network in the bottom of the picture is considered totally isolated. In reality there is a number of traffic flows traveling in and out. (This example contains only few use cases: user joins to the network and updates his presence).
  • #21: Still, our assumption is this: only one well guarded route in. (Dragons and soldiers are watching.)
  • #22: Understanding complexity based on actual (and detailed) traffic has been hard.
  • #23: Thanks to the tools we’ve build it is now considerable simpler.
  • #24: Analyzer setup: Recorders collect traffic and do real-time indexing (flows vs packets) You may run the recorders on standard PC hardware with Linux-based OS (Centos distro recommended) Analyzer will give you easy access to the collected information Analyzer will transparently upload/download notes from Collab environment
  • #45: Tunneling leaks.
  • #46: Trivial vulnerabilities that were not discovered earlier due to complexity of the system under testing. The following picture is from hugely complex VoIP setup, which included a number of security features (VPNs, ACLs, etc) As we gained understanding of the target, we discoverd that forging the caller ID is simple, even when you are using standard mobile phones. As a side note: mobile phones happily showed the name even they were not in the address book. (Tarja Halonen is the president of Finland)
  • #47: Compromised servers.
  • #48: End-to-End testing. -This example runs Codenomicon Robustness Testing tools to test if SIP proxy can be bypassed with fuzzed packets
  • #49: Detailed but understandable analysis for found issues. Here we use Clarified Analyzer’s Next Gen topology view for documenting a malware ‘topology’. Once you have the documentation, you have easy access for flows and packets from certain time and certain host(s)
  • #52: Easy start: simple tool sales When you have gained experience using some of our tools, we can take the next step and deploy Infrastructure, Tools and Services for collaborative security audits.