Quantcast
Channel: Blog | Dell
Viewing all articles
Browse latest Browse all 17822

IT Security – Follow the breadcrumb trail – Indicators of compromise in Part 2

$
0
0
EMC logo

95036955[1]

In a world where we need to be watching or monitoring our networks continuously knowing what to look out for may be just what we need to help us get started. These important indicators could protect your organization IT security or help you stop an attack in its tracks.  So, here is the second installment. HTML Response Sizes This follows on from Part 1 where I talked about monitoring read volumes for databases.  Attackers using SQL injection to extract data through a Web application will usually have a larger HTML response size than a normal request.  For example, if the attacker extracts the full database, then the response is going to be a much larger file then a normal query.  Large numbers of requests for the same file Attackers never give up, it takes a lot of trial and error to compromise a site -- attackers have to keep trying different exploits to find ones that work. And when they find signs that an exploit might be successful, they'll frequently use different permutations to launch it. Mismatched Port-Application Traffic Attackers often take advantage of obscure ports to get around more simple Web filtering techniques. So if an application is using an unusual port, it could be sign of command and control traffic masquerading as "normal" application traffic. Infected hosts could be sending command and control communications masked as DNS requests over port 80 which may appear to be standard DNS queries. DNS Request Anomalies One of the most effective red flags organizations can look for are tell-tale patterns left by malicious DNS queries. Command-and-control traffic is often the most important traffic to an attacker because it allows them ongoing management of the attack and it needs to be secure so that security professionals can't easily take it over. The unique patterns of this traffic can be recognized and is a very standard approach to identifying a compromise. Seeing a large spike in DNS requests from a specific host can serve as a good indicator of potentially suspect activity. Look out for patterns of DNS requests to external hosts. Unexpected Patching of Systems Patching is generally a good thing, but if a system is inexplicably patched and you don’t know anything about it then it could be a sign that an attacker is locking down a system so that other bad guys can't use it for other criminal activity. Most attackers are in the business of making money from your data -- they certainly don't want to share the profits with anyone else!   Look out for the final Part 3 coming soon.

Viewing all articles
Browse latest Browse all 17822

Trending Articles