当前位置:网站首页>HW primary flow monitoring, what should we do

HW primary flow monitoring, what should we do

2022-07-07 15:22:00 The end of the world and you

1. Primary monitoring tasks

Daily flow alarm detection and preliminary flow detection , Maybe sometimes the project manager asks to upgrade the equipment , And the daily newspaper of that day ( Where will the project manager have a special template , You don't need to download templates on the network or edit them yourself )

Overall process :

Generally, the monitoring group reports the monitored malicious attack traffic to the research and judgment group ( There is a special submission template ), After analyzing the reported traffic, the research and judgment team determines that the traffic is attack traffic , Then transfer to the disposal group , The disposal group will this malicious ip To ban ; If there is a successful attack , The research and judgment team needs to be synchronized to the traceability reaction team and the emergency response team , The personnel of the traceability reaction group and the research and judgment group trace the source of the event , The of the emergency response group shall carry out emergency response for the machine .


2. common HW equipment

1-  Chianxin's heavenly eye ( Flow analysis and flow monitoring , And you can use his log retrieval module to trace the source .)
2-  Chianxin's pepper map 
3-  Green alliance's missing scanning equipment 
4-  Micro step honeypot 
5-  A convincing firewall 
6-  Deeply convinced VPN
7-  Tianqing of chianxin ( The function and interface are similar to 360 Safety guard )

More about safety equipment , Please refer to this article


3. Job content

Project start , Check familiar equipment

Generally, the central console of the equipment has the usage information of the equipment , Mainly look at the equipment :

  • CPU Usage rate
  • Memory usage
  • Data throughput
  • Space storage rate

If the occupancy rate is found to be too high , It has affected the normal operation of the platform , Report to the project manager in time !

Daily flow analysis

In the threat analysis, you can see the specific information of attack traffic , Generally, you can filter the flow of the day

Attack traffic with Web Mainly attack traffic , It mainly looks at the request packets and response packets of traffic (PCAP) Content :

When there are a lot of traffic packets , Need to use the fuzzy search function of the device , Perform filter analysis

Request header :

  • url Location
  • rerfer Field source IP
  • X-Forwarded-For(XFF)
  • Cookie

Request body :

  • Is there malicious code
  • Is there any sensitive information such as user name or password

Response package :

  • Status code
  • Response Content ( Can be copied as html View in the browser )

4. dried food : Common vulnerability traffic characteristics

Catalog explosion

  1. A large number of server logs appear 404 request
  2. There are a lot of non business requests ( Such as accessing a large number of sensitive directories )

sql Inject

  1. There is obvious malice in the request sql Statements or sensitive characters
  2. Request body User-Agent There may be sqlmap identification
  3. Echo package exists sql Query results ( At this moment, it means that the injection has been successful )

Upload files

  1. The file name is script file , As malicious php file
  2. Look at the upload file Content-type Whether it has been modified
  3. Check whether the uploaded content contains malicious code ( Generally, they are encrypted Trojans )
  4. Check whether the echo status is 200, If for 200 Look at the upload path , Find the file on the corresponding server for cloud sandbox analysis ( Don't be silly to analyze locally , General manufacturers will have supporting cloud sandbox equipment ), If the malicious Trojan horse GG 了

XSS

In the attack and defense drill ,XSS Attacks are very uncommon

  1. Whether there is XSS sentence
  2. Echo whether there is XSS sentence ( The key )

Command execution

It's usually exposed RCE Vulnerability execution , More commonly, red teams use 0day The attack , If it does 0day attack , The device must not recognize the attack , The defender needs to judge according to his own experience

  1. JAVA Developed website , Pay attention to whether there is java Deserialized string format ( Such as ROOAB,abecd), If not, see if there is java Calls to sensitive execution classes ( Such as Runtime.java), Also pay attention to whether there is RMI,LDAP Wait for such sensitive characters to appear
  2. The data package has system commands ( Such as whoami
  3. Check whether the status of the response package is 200, Combine request and response to analyze

Webshell

If you encounter this traffic characteristic and judge that there is no false alarm , You can write a report GG 了

Common kitchen knives , Ice scorpion , Ant sword , Flow characteristic diagram of Godzilla :
 Insert picture description here

kitchen knife

payload features :

PHP: <?php @eval($_POST['caidao']);?>
ASP: <%eval request(“caidao”)%>
ASP.NET: <%@ Page Language=Jscript%><%eval(Request.Item[“caidao”],“unsafe”);%>

Example traffic packets :
 Insert picture description here

Leech sword

payload features :

Php Use in assert,eval perform ,
asp Use eval
 stay jsp It uses Java Class loading (ClassLoader, At the same time, there will be base64 Character features such as encoding and decoding 

Example traffic packets :

Every request body exists @ini_set(“display_errors”, “0”);@set_time_limit(0) start . And there are base64 Equal character
 Insert picture description here

Ma encryption has an obvious feature , That is, parameter names are mostly in "_0x...." In the form of

Ice scorpion

paylaod analysis :

php There will also be... In the code eval or assert And so on 
 stay aps Will be in for Loop through a segment of XOR processing 
 stay jsp Medium is used java Reflection of , So there will be ClassLoader,getClass().getClassLoader() And so on 

Ice scorpion 2.0 Flow characteristics :

 The returned package status code in the first stage request is 200, The return must be 16 A key 
 Request package exists :Accept: text/html, image/gif, image/jpeg, ; q=.2, /; q=.2
 After establishing the connection cookie There are characteristic characters , All requests  Cookie It's all in the form of : Cookie: PHPSESSID=; path=/;

Ice scorpion 3.0 Flow characteristics :

 In the request package content-length  by 5740 or 5720( May be based on Java Change with version )
 In every request header, there is 
Pragma: no-cache,Cache-Control: no-cache
Accept:text/html,application/xhtml+xml,application/xml;
q=0.9,image/webp,image/apng,/*;q=0.8,application/signed-exchange;v=b3;q=0.9

Godzilla ‍*️

payload features :

jsp There will be xc,pass Characters and Java Reflection (ClassLoader,getClass().getClassLoader()),base64 Add and decode 
php,asp Is a common sentence 

Godzilla flow analysis :

 Of all requests Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,/;q=0.8
 Of all responses Cache-Control: no-store, no-cache, must-revalidate,
 And in all requests Cookie Both the middle and the back ; features 

At present, the traffic from Godzilla can bypass the detection of security equipment if it is slightly confused , It's dangerous , Generally, the only way to take is to check and kill the virus on the ground

Common framework vulnerabilities

It mainly depends on your familiarity with the framework

For more information, please refer to this article

原网站

版权声明
本文为[The end of the world and you]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/188/202207071316563933.html