WebApp Sec mailing list archives
Re: Intrusion Detection
From: Daniel Cid <danielcid () yahoo com br>
Date: Mon, 10 Jul 2006 22:50:23 -0300 (ART)
Hi David, There are many things you can do to "try" to detect intrusions on your systems. I say "try", because if the attacker succeeded, he can do a lot of tricks to hide himself. In my opinion, the three most important things you need to do at a host level are: -Watch your logs and send them as close to real time as possible to an external system for analysis. I think that most admins do not care about their logs and they miss a lot of useful information. Having the logs on an external system make them harder to be deleted or altered. *and yes, I mean httpd logs, mail logs, syslogs, ids logs, etc. -Monitor your system and kernel for anomalies. If you see similar system calls having different results or strange files or anything else "weird", you may need to check for rootkits. -Monitor your binaries and configuration files for changes and store the baseline outside of each system. Besides host-based detection, you may need to watch your network traffic for weird ports (I like to bottom 20 concept -- the least accessed ports) and run an NIDS to detect any know-attacks. *Ok, now some propaganda. I think ossec is the only system that does all the three aspects I mentioned about host-based intrusion detection. It analyses your logs in *real time (very closed to it at least), it does rootkit detection and file integrity checking. All these information is stored on an outside box and the communication between the server and the "agents" (which you install on every box you want to monitor) is done with compression and encryption. you can check it out here: http://www.ossec.net latest version: http://www.ossec.net/files/ossec-hids-0.8-6.tar.gz Paper I wrote about the log analysis and intrusion detection. Maybe helpful too: http://www.ossec.net/en/loganalysis.html Thanks, -- Daniel B. Cid dcid ( at ) ossec.net --- David Robert <david31900 () rogers com> escreveu:
Hello all, I've been reading this list for some time and I can't help but notice that there is a lot of information and discussion about securing systems, but very little about how to detect if you *are* compromised. This one of my major concerns. I can advocate all kinds of practices and procedures, but eventually someone will get through. So how can I tell? Especially if they are trying not to leave traces? Is there a few very simple, dumb things that everyone should do in this regard? If so, then I haven't heard them. If you could list them, or point me to some good resources, it would be much appreciated. Thanks,
-------------------------------------------------------------------------
Sponsored by: Watchfire Securing a web application goes far beyond testing the application using manual processes, or by using automated systems and tools. Watchfire's "Web Application Security: Automated Scanning or Manual Penetration Testing?" whitepaper examines a few vulnerability detection methods - specifically comparing and contrasting manual penetration testing with automated scanning tools. Download it today!
https://www.watchfire.com/securearea/whitepapers.aspx?id=701500000008Vmm
--------------------------------------------------------------------------
_______________________________________________________ Novidade no Yahoo! Mail: receba alertas de novas mensagens no seu celular. Registre seu aparelho agora! http://br.mobile.yahoo.com/mailalertas/ ------------------------------------------------------------------------- Sponsored by: Watchfire Cross-Site Scripting (XSS) is one of the most common application-level attacks that hackers use to sneak into web applications today. This whitepaper will discuss how traditional CSS attacks are performed, how to secure your site against these attacks and check if your site is protected. Cross-Site Scripting Explained - Download this whitepaper today! https://www.watchfire.com/securearea/whitepapers.aspx?id=701500000008Vmr --------------------------------------------------------------------------
Current thread:
- DMZ and critical data Pedro Henrique Morsch Mazzoni (Jul 08)
- Re: DMZ and critical data 蓝牙 (Jul 09)
- RE: DMZ and critical data Brian J. Bartlett (Jul 09)
- Re: DMZ and critical data Mohammad Ali Sarbanha (Jul 09)
- Intrusion Detection David Robert (Jul 09)
- Re: Intrusion Detection Ivan Ristic (Jul 10)
- Re: Intrusion Detection Jamie Riden (Jul 10)
- Re: Intrusion Detection Daniel Cid (Jul 11)
- Re: Intrusion Detection David Ryan (Jul 12)
- Re: Intrusion Detection skarvin (Jul 12)
- <Possible follow-ups>
- Re: DMZ and critical data sarbanha (Jul 09)
- Message not available
- Re: DMZ and critical data Ken Adler - QDSP, CISSP, PMP, CISA (Jul 09)
- Message not available