[Zeek] Detection Capabilities and Extensions

Brett Warrick Brett.Warrick at sensato.co
Tue Mar 5 08:19:04 PST 2019


Hi everyone!

I'm working on a project, and would like the tap the collective expertise and knowledge of the community.
I'm seeking to use Zeek to detect certain behaviors, listed below.

My questions are as follows:
(1) Is Zeek capable of detecting this behavior?
(2) Are there, to the best of your knowledge, any additional scripts I could run to extend Zeek's abilities in this regard?
(3) Are there any recommendations on how to test that these attacks can be detected?
(4) Are there any recommendations for other attacks or scripts we should add besides the default?

Your thoughts and advice are most appreciated. Thanks in advance for your time and assistance!


General
   - OpenDNS DNSCrypt
   - Session Traversal Utilities for NAT (STUN Binding Request)
   - Internal Host Retrieving External IP Address (ifconfig. me)
   - GNU/Linux APT User-Agent Outbound likely related to package management
   - Common 0a0a0a0a Heap Spray String
   - EXE IsDebuggerPresent (Used in Malware Anti-Debugging)
   - Observed SSL Cert (IP Lookup - ipify .org)
   - Delivery & Attack — Malicious website — Phishing activity

Exploitation & Installation
   — Sandworm - CVE-2014-4114
   - KuaiZip Adware CnC Checkin

Sipvicious
   - Sipvicious User-Agent Detected (friendly-scanner)
   - Sipvicious Scan

SMB2
   - SMB2 NT Create AndX Request For a DLL File - Possible Lateral Movement
   - SMB2 NT Create AndX Request For a .bat File
   - SMB2 NT Create AndX Request For an Executable File

HTTP
   - Outgoing Basic Auth Base64 HTTP Password detected unencrypted
   - Http Client Body contains passphrase= in cleartext
   - Served Attached HTTP
   - PE EXE or DLL Windows file download HTTP

Applications
   - Skype User-Agent detected
   - TeamViewer Dyngate User-Agent

Communication
   - Potential SSH Scan OUTBOUND
   - MS Remote Desktop Request RDP
   - RDP connection confirm

Environmental Awareness
   — Configuration Changed — Cisco Device
   — Desktop Software - Chat Client — IRC
   — Desktop Software - BitCoin — BitCoin client
   — Network Anomaly - Protocol on Unexpected Port — HTTP on HTTPS
   — Confidential Data - Password in Cleartext — HTTP

Reconnaissance & Probing
   — Portscan — Nmap
   — Service discovery — SIPvicious VOIP tool
   — Service discovery — Microsoft Remote Desktop

System Compromise
   — C&C Communication — ipinfo.io SSL Certificate
   — Trojan infection — BlackCarat
   — Worm infection — Internal Host scanning
   — Trojan infection — Commonly Abused File Sharing Site Domain
   — Suspicious Behaviour — Suspicious user-agent detected

Vulnerable/Outdated Version
   - Java 1.6.x Detected
   - Java 1.7.x Detected
   - Java 1.8.x Detected
   - Flash Version M1
   - Flash Version M2

Android Device Connectivity Check
   -  Android Device (KitKat OS)
   -  Android Device (Marshmallow OS)


Kindest Regards,

Brett J. Warrick






-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mailman.ICSI.Berkeley.EDU/pipermail/zeek/attachments/20190305/1ed0b1b7/attachment.html 


More information about the Zeek mailing list