Sie sind auf Seite 1von 34

Is DNS a Part of Your Cyber Strategy?

20 December
12:00-13:00 GMT

Dr. Adrian Davis Gary Cox


Managing Director System Engineering Manager
(ISC)2 EMEA Infoblox
(ISC)2:
(ISC)2: Who we are

Vision
Inspiring a Safe and Secure Cyber World

Mission
Support and provide members and
constituents with credentials, resources, and
leadership to address cyber, information,
software and infrastructure security to deliver
value to society

Visit www.isc2.org and follow us


on…
Strength in Membership
Certifying the World’s Information Security Professionals

A membership community made up of certified cyber, information, software and


infrastructure security professionals making a difference and helping to advance the
industry

125,000+ 23,000+
members members
worldwide EMEA
Bringing the Professional Community Together
Tackling issues and challenges in cybersecurity

Member-Driven (ISC)² Secure Summits Chapters Events and Tools and


Initiatives and Award programmes Member Receptions Resources

Register Online
#ISC2SUMMITS

Visit www.isc2.org/memberbenefits
(ISC)2 EMEA Secure Webinars

Security Briefings

eSummits

ThinkTank Roundtables

CISO Says

Watch this space! Join the


(www.isc2.org/News-and-Events/Webinars/EMEA-Webinars) discussion
…and your emails for updates! on Twitter
#ISC2EMEA
5
Today’s Webinar

Housekeeping

• Please type your questions as we go along

• We will answer as many as we can after the presentation


• Please rate your experience!
• CPEs will be submitted on (ISC)2 members’ behalf within 5 business days
(minimum viewing time 45 minutes)
• For any questions on CPEs, email membersupportemea@isc2.org

6
More CPE Events with Infoblox
Earn automatic (ISC)2 CPEs by attending any of Infoblox’s Exchange Security & Data Center
EMEA Road Tour events

http://www.infobloxemea.com/roadtour/

7
Is DNS Part of Your Cyber Strategy?
Gary Cox, CISSP – Technical Director, UK and Ireland
December 20th 2017
8
8 || ©©2017
2013 Infoblox
Infoblox Inc.
Inc. All All Rights
Rights Reserved.
Reserved. COMPANY CONFIDENTIAL
9
9 || ©©2017
2013 Infoblox
Infoblox Inc.
Inc. All All Rights
Rights Reserved.
Reserved. COMPANY CONFIDENTIAL
About Infoblox…..

Building on almost twenty years of industry


experience with Domain Name System
(DNS), Dynamic Host Configuration Protocol
(DHCP), and IP address management
(IPAM) services (DDI), Infoblox has
developed the Actionable Network
Intelligence Platform.

This platform goes beyond DDI to enable


organizations to harness insights derived
from the rivers of core services data moving i
through their networks to enhance all
aspects of management, security, agility,
and cost control
What is DNS?

Often called the phone book of the Internet, DNS converts IP


Addresses to human readable names

You may not think you know much about the Domain Name
System (DNS) but whenever you use the Internet, you use
DNS. Every time you send electronic mail or surf the World
Wide Web, you rely on the Domain Name System.
0%
5%
10%
15%
25%
30%
35%
40%
45%
50%

20%
Threats

Ransomware

Insider threat

Denial of service (e.g., lack


of availability)

Spoofing of identity or
access credentials

Elevation of privilege into


sensitive systems

Questionable transactions

Data tampering, such as


unauthorized modification or
destruction
Identity theft (including
payment card fraud or
medical identity theft)
Breaches in cloud-based,
multitenant architectures
times in the past 12 months.

Corporate or foreign
government espionage
Compromise of DNS
infrastructure enabling
stealing and exfiltrating data
Information disclosure, such
as to Wikileaks
Once

Other
Multiple Times
What do you consider to be the top threats to the security of your sensitive data? Please indicate whether these have occurred in your organization one or more
Ransomware, DDoS and Data Loss Remain Top

12
In last 12 months:

Sensitive Data At Risk,

Data Protection Survey


Results of the SANS 2017
• 78% have seen two or

• 68% have experienced


more different types of
threats in last 12 months

same threat multiple times


How could DNS be used/exploited?
DNS Protocol Anomalies
DNS Exploits DNS Callback
DNS Hijacking DNS Tunneling
DNS kill switch

Weaponization Exploitation Command & Control (C2)


Coupling exploit with backdoor Exploiting a vulnerability to Command channel for remote
into deliverable payload execute code on victim’s system manipulation of victim

2 4 6

1 3 5 7

Reconnaissance Delivery Installation Actions on Objectives


Harvesting email Delivering weaponized Installing malware on With “Hands on Keyboard”
addresses, conference bundle to the victim via the asset access, intruders accomplish
information, etc. email, web, USB, etc. their original goal

DNS Infiltration DNS Tunneling


DNS Reconnaissance DNS Tunneling DNS Exfiltration
DNS DDoS DNS DDoS
Assessing the risk
Reviewing the gaps from outside to inside

Check good DNS practise is in place


Control DNS communication
Understand/Review how DNS is exploited
Registrar security
Risk mitigation for DDoS
Process to deal with a “kill switch”
Blocking malware C&C communication
Exfiltration of data
Leverage DNS based Indicators of Compromise
Test data exfiltration via DNS (don’t assume)
Recommendation
You will do some of this based on risk assessment
Internet
DNS

Signature
DO NOT allow
Any -> Port 53
“packet inspection”

Proxies & DMZ DNS Reputation


Choke Point
Gateways
X
Cache
“List of IoCs”
X “Rules & Policy”

Only known internal Internal DNS


DNS servers can
use the DMZ DNS VISIBILITY of Behaviour
cache query source
X ”Machine Learning”

Internal
Clients
So where does DNS fit in the Cyber Strategy?

•To detect
More and block
places suspicious
than you mightand malicious traffic
think.…
•As highly focused indicators of compromise
•As part of your DLP Strategy

•Pro-active security with Newly Observed Domains

•To enhance the capabilities of other security controls

•As part of your DDoS defences

•DNSSEC / DMARC, DKIM, SPF


FQDN based Indicators of Compromise

So let’s talk about false positives…

Dnsduck10[.]duckdns[.]org – Specific C2 indicator hit


within the parent domain

192[.]169[.]69[.]25 – 415 possible domain hits!

Do you want to sift through >400 other results?


DNS based Data Exfiltration

DNS can be used as a covert back channel, to exfiltrate


data, download malware or issue remote commands.

There are many off the shelf packages available:


DNS2TCP, TCP-over-DNS, OzymanDNS, Iodine, SplitBrain,
DNScat-P/DNScat2, DNScapy, TUNS, PSUDP, YourFreedom
etc.
Not DLP! But this is exfiltration over DNS

Sophisticated (zero-day)
Infected endpoint gets access to file containing
sensitive data Attacker controller
It encrypts and converts info into encoded format server- thief.com

INTERNET
NameMarySmith.foo.thief.com
(C&C) MRN100045429886.foo.thief.com
DOB10191952.foo.thief.com
Text broken into chunks and sent via DNS using
C&C commands
hostname.subdomain or TXT records Data

Exfiltrated data reconstructed at the other end


Can use spoofed addresses to avoid detection

ENTERPRISE
Data Exfiltration via host/subdomain DNS server
Simplified/unencrypted example:
NameMarySmith.foo.thief.com
MRN100045429886.foo.thief.com
MarySmith.foo.thief.com DOB10191952.foo.thief.com

Infected
SSN-543112197.foo.thief.com endpoint
DOB-04-10-1999.foo.thief.com
MRN100045429886.foo.thief.com
DNS based Data Exfiltration (cont.)

So how can you monitor and prevent DNS tunnelling?

Signature based detection and blocking


Reputation based detection and blocking
Behavioural based detection and blocking
Newly Observed Domains (NODs)

Adding NODs into your strategy is a game changer…..

Block that Phishing domain before its campaign even starts


Prevent communication to C2 domains before they become
widely known
Leverage NODs for enhanced Spam Filtering
Newly Observed Domains (Cont.)

Here is an example….
Infoblox Cyber Security Ecosystem

ActiveTrust® - Threat Intelligence Providers ActiveTrust® – Security Operations Partners

JSON CSV
REST CEF
Data Connector STIX CEF
RPZ STIX
Custom REST

Infoblox On-Premise Ecosystem Partners


As part of your DDoS Defences

Correct architecture is critical…..

Service Separation – don’t have all your eggs in one


basket.
Leverage Anycast.
Use hardened DNS Servers which can detect and drop
attack traffic.
Other ways to leverage DNS

DNSSEC – Chain of trust for your DNS Entries

DMARC Policy – Part of your anti-spam defenses


DKIM and SPF – Key based authentication for mail servers and Sender
Policy Framework, both needed for DMARC policies to function correctly.
Summary

•To detect and block suspicious and malicious traffic


•As highly focused indicators of compromise

•As part of your DLP Strategy

•Pro-active security with Newly Observed Domains

•To enhance the capabilities of other security controls

•As part of your DDoS defences

•DNSSEC / DMARC, DKIM, SPF


Q&A

27 | | ©©2017
27 2013 Infoblox
Infoblox Inc.
Inc. All All Reserved.
Rights Rights Reserved. COMPANY CONFIDENTIAL
Further reading

•https://community.infoblox.com/t5/Security-Blog/SURBL-amp-Threat-
Intelligence/ba-p/8972
•https://www.farsightsecurity.com/solutions/threat-intelligence-
team/newly-observed-domains/
•https://www.infoblox.com/solutions/cybersecurity-ecosystem/
•https://www.infoblox.com/glossary/domain-name-system-security-
extensions-dnssec/
•https://dmarcguide.globalcyberalliance.org/#/
MARCHITECTURE: WHERE IT FITS | SOLUTION DIAGRAM

Cloud-based Recursive/Caching
(ActiveTrust® Cloud)

29 | | ©©2017
29 2013 Infoblox
Infoblox Inc.
Inc. All All Reserved.
Rights Rights Reserved. COMPANY CONFIDENTIAL
More CPE Events with Infoblox
Earn automatic (ISC)2 CPEs by attending any of Infoblox’s Exchange Security & Data Center
EMEA Road Tour events

http://www.infobloxemea.com/roadtour/

30
Q&A

31
1 CPE for this session will be uploaded to (ISC)2 members’ accounts

within 5 business days

If you have CPE related questions, email


(ISC)2 Member Support EMEA
membersupportemea@isc2.org

adavis@isc2.org @adrian_adavis Adrian Davis, MBA, FBCS CITP, CISSP


http://uk.linkedin.com/in/adriandaviscitp

https://www.isc2.org/

32
If you would like to deliver a webinar, get your company involved or have
any content related questions, email Patricia

Patricia Reiner van Heerden

preiner@isc2.org

https://www.isc2.org/

33
Thank you for listening

And Wishing You All Happy Holidays from the

(ISC)2 EMEA Team!

www.isc2.org

34

Das könnte Ihnen auch gefallen