Results 1 to 10 of 10

Thread: Security competition Log analysis

  1. #1
    Join Date
    Oct 2009
    Location
    California
    Beans
    Hidden!
    Distro
    Ubuntu Studio 12.10 Quantal Quetzal

    Question Security competition Log analysis

    The event is for college students, the competition is being developed and this is a sort of test run for it. If you are interested there will be a spring competition starting April 30th. It seems like the focus is for US universities and colleges.
    http://www.nationalcyberleague.org/2...g/spring.shtml


    I'm taking part in a security competition as part of a class and Nov 3 we will be doing log analysis. What the teacher is teaching seems woefully inadequate so i'm wondering if all youall have any tips.


    Here is what we will be covering:

    Windows Security Log (10 flags, totaling 2,800 points)
    Corrupt Windows Security Log (10 flags, totaling 7,600 points)
    Linux Authentication Log (10 flags totaling 2,800 points)
    Corrupt Linux Authentication Log (10 flags, totaling 7,600 points)
    Apache Logs (5 flags, totaling 1,200 points)
    Network Data Capture (5 flags, totaling 8,000)



    What events in Linux logs would signify a potential intrusion attempt, or intrusion. What are some events to look for that are common in intrusion attempts (for example adding a user account). How do I know what a particular line in the logs mean.

    The part that I have no clue on is Corrupt Logs, any ideas on what or how to restore/retrieve information from corrupt logs. Even links pointing else where to learn will be helpful. It might be on inconsistency within the log (such as two logins without logging out [assuming both logins and logouts are recorded]), what might signal that?
    Last edited by duke.tim; October 31st, 2012 at 06:18 PM. Reason: Added information about the event if people would like to join. College Students only.
    User:To friend or not to friend--that is the question:
    Whether 'tis nobler to take an arrow to the knee or to suffer
    the slights and add's of outrageous fortune
    Or to take arms against a sea of trolls And by opposing feed them. www.evicsis.com

  2. #2
    Join Date
    Aug 2008
    Beans
    Hidden!

    Re: Security competition Log analysis


  3. #3
    Join Date
    Oct 2009
    Location
    California
    Beans
    Hidden!
    Distro
    Ubuntu Studio 12.10 Quantal Quetzal

    Smile Re: Security competition Log analysis

    Thanks Kinstonian, I was getting worried that no one would reply!
    User:To friend or not to friend--that is the question:
    Whether 'tis nobler to take an arrow to the knee or to suffer
    the slights and add's of outrageous fortune
    Or to take arms against a sea of trolls And by opposing feed them. www.evicsis.com

  4. #4
    Join Date
    Aug 2008
    Beans
    Hidden!

    Re: Security competition Log analysis

    No problem... Harlan's evtparse.pl would likely be useful for the corrupted Windows .EVT logs.

    http://windowsir.blogspot.com/2010/0...ine-stuff.html

  5. #5
    Join Date
    Sep 2011
    Beans
    1,531

    Re: Security competition Log analysis

    Quote Originally Posted by duke.tim View Post
    The part that I have no clue on is Corrupt Logs, any ideas on what or how to restore/retrieve information from corrupt logs. Even links pointing else where to learn will be helpful. It might be on inconsistency within the log (such as two logins without logging out [assuming both logins and logouts are recorded]), what might signal that?
    I don't know that you can. A log has become "corrupt" by an attacker I assume? This could help you in that regards: https://wiki.ubuntu.com/BasicSecurity/DidIJustGetOwned

    If they mean that the log was just somehow corrupt because of hardware or software failure, then personally I wouldn't trust them to be accurate. I can only talk about how to prevent that (use splunk, aggregate logs off-box). I have no idea how to repair logs without losing their integrity.

    edit: I read Kinstonian's last link. That would help for windows logs with an event viewer problem. It won't help for linux auth logs.
    Last edited by Ms. Daisy; November 3rd, 2012 at 02:32 AM.

  6. #6
    Join Date
    Aug 2008
    Beans
    Hidden!

    Re: Security competition Log analysis

    Quote Originally Posted by Ms. Daisy View Post
    I don't know that you can. A log has become "corrupt" by an attacker I assume? This could help you in that regards: https://wiki.ubuntu.com/BasicSecurity/DidIJustGetOwned

    If they mean that the log was just somehow corrupt because of hardware or software failure, then personally I wouldn't trust them to be accurate. I can only talk about how to prevent that (use splunk, aggregate logs off-box). I have no idea how to repair logs without losing their integrity.

    edit: I read Kinstonian's last link. That would help for windows logs with an event viewer problem. It won't help for linux auth logs.
    You're right about problems with integrity. However, whether it's because of hardware or an attacker, that issue is there. That's why digital investigators rely on corroborating evidence from different sources. Something like wtmp may be modified by an attacker, but if an analyst looks at wtmp combined with netflow, and other host/network evidence, he can have more trust in wtmp if those other sources says the same thing.

  7. #7
    Join Date
    Oct 2009
    Location
    California
    Beans
    Hidden!
    Distro
    Ubuntu Studio 12.10 Quantal Quetzal

    Smile Re: Security competition Log analysis

    Ms. Daisy that is a useful link thanks for the reply

    Windows logs are a mess, or maybe I need to get better at awk. The questions asked were very similar to the ones asked at the honeypot project (which were Linux logs)
    http://www.honeynet.org/challenges/2010_5_log_mysteries

    The log competition is now over, The linux log files were corrupted within an (unnamed) gz archive with the last few bits removed. Luckily Linux isn't tricked by such things and the logs were retrievable.

    The same trick was used on the windows logs except it was the first four bits....windows refused to cooperate unless you manually added the first four bits or used another method to extract the data.

    Thanks for the help!
    User:To friend or not to friend--that is the question:
    Whether 'tis nobler to take an arrow to the knee or to suffer
    the slights and add's of outrageous fortune
    Or to take arms against a sea of trolls And by opposing feed them. www.evicsis.com

  8. #8
    Join Date
    Sep 2011
    Beans
    1,531

    Re: Security competition Log analysis

    Quote Originally Posted by duke.tim View Post
    ... The linux log files were corrupted within an (unnamed) gz archive with the last few bits removed. Luckily Linux isn't tricked by such things and the logs were retrievable.

    The same trick was used on the windows logs except it was the first four bits....windows refused to cooperate unless you manually added the first four bits or used another method to extract the data...
    Huh. I'm curious, did the administrators give any examples of when this would happen in reality? Is it something attackers do to logs on boxes they crack? Or was this something that someone would do on their own computer to try and obfuscate their own activities?

  9. #9
    Join Date
    Aug 2008
    Beans
    Hidden!

    Re: Security competition Log analysis

    Quote Originally Posted by Ms. Daisy View Post
    Huh. I'm curious, did the administrators give any examples of when this would happen in reality? Is it something attackers do to logs on boxes they crack? Or was this something that someone would do on their own computer to try and obfuscate their own activities?
    It's not uncommon to encounter corrupted files, say from unallocated space that need to be repaired. Also, attackers sometimes create corrupted malware that will run by Windows, but some kind of security software has problems interpreting it. For example, a Windows executable can be corrupted so some software has trouble dumping it from memory. I've seen ransomware that said it encrypted the user's files, but it really just modified the file signature of certain files. So this exercise would also help there as well. But as far as attackers intentionally corrupting zip files to hide, I don't think that happens much in the real world. Although, I guess it's possible...
    Last edited by Kinstonian; November 5th, 2012 at 03:50 AM.

  10. #10
    Join Date
    Oct 2009
    Location
    California
    Beans
    Hidden!
    Distro
    Ubuntu Studio 12.10 Quantal Quetzal

    Re: Security competition Log analysis

    They didn't say when it would happen in the real world, I think they did it as a way of making some of the challenges more difficult.

    Possibly could happen because of hardware failure, or from recovering deleted logs similar to what Kinstonian said.
    User:To friend or not to friend--that is the question:
    Whether 'tis nobler to take an arrow to the knee or to suffer
    the slights and add's of outrageous fortune
    Or to take arms against a sea of trolls And by opposing feed them. www.evicsis.com

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •