mirror of
https://github.com/zeek/zeek.git
synced 2025-10-02 14:48:21 +00:00
806 lines
35 KiB
Text
806 lines
35 KiB
Text
|
|
This section explains the contents of the various output files and reports
|
|
that Bro creates.
|
|
|
|
@menu
|
|
* Alarm File::
|
|
* Connection Summary File::
|
|
* Analyzer-specific Files::
|
|
* Tracefiles::
|
|
* Bro Summary Reports::
|
|
@comment add someday? * Creating your own Custom Output::
|
|
@end menu
|
|
|
|
@section Rotating Log Files
|
|
|
|
There are a number of ways to control the rotation of Bro's log files.
|
|
Here are some examples:
|
|
|
|
@verbatim
|
|
|
|
# if using one log, must open append (default = truncate )
|
|
@load log-append
|
|
|
|
@load rotate-logs
|
|
|
|
# rotate at midnight
|
|
redef log_rotate_base_time = "0:00";
|
|
|
|
# do not rotate on shutdown (default = T)
|
|
redef RotateLogs::rotate_on_shutdown = F;
|
|
|
|
# rotate frequency
|
|
redef log_rotate_interval = 24 hr;
|
|
|
|
@end verbatim
|
|
|
|
|
|
@comment ********************************************
|
|
|
|
@node Alarm File
|
|
@section Alarm File
|
|
|
|
@subsection Alarm File Format
|
|
|
|
The alarm.log is
|
|
a 'tagged' format that is fairly self descriptive. This is
|
|
an example from the alarm.log file:
|
|
|
|
@verbatim
|
|
t=1000057981.940712 no=AddressScan na=NOTICE_ALARM_ALWAYS sa=10.1.1.1 sp=2222/tcp da=10.2.2.2 dp=3333/tcp msg=10.1.1.1\ has\ scanned\ 2000\ hosts\ (3333/tcp
|
|
) tag=@42
|
|
@end verbatim
|
|
|
|
Where the tags indicate the following:
|
|
@itemize
|
|
@item t: time
|
|
@item no: notice
|
|
@item na: notice action
|
|
@item sa: source address
|
|
@item sp: source port
|
|
@item da: destination address
|
|
@item dp: destination port
|
|
@item msg: message (in this case a host has scanned 20 hosts)
|
|
@item tag: identifier to match this to lines in notice.log and conn.log:
|
|
@end itemize
|
|
|
|
The alarm file format is designed to be easy to parse and interpret by programs, not humans.
|
|
|
|
@subsection Sample Alarm File Contents
|
|
|
|
@emph{NOTE: the examples in this section still use the old log format. This needs to be updated}
|
|
|
|
@c XXX fix these
|
|
|
|
Bro generates a number of types of alarms, such as suspicious connection attempts directed
|
|
at your systems (address scanning), port scans, and attempts to gain access to user accounts.
|
|
We describe some of these in more detail here.
|
|
|
|
@strong{Vulnerability scans directed against systems}
|
|
|
|
The first category of suspicious connection attempts that Bro identifies and reports is vulnerability scans directed against systems.
|
|
Instead of burdening you with every vulnerability scan (no matter how tiny) against systems that occurs,
|
|
it reports only scans that occur at or above its threshold in terms of a specified size, such as the number of vulnerability scan attempts per second.
|
|
The following entry indicates that IP address 66.243.211.244 has scanned 10000 of your systems on tcp port 445, the port used by newer Windows systems such as Windows 2000, XP and Server 2003 for share access:
|
|
|
|
@smallexample
|
|
Nov 16 06:30:49 AddressScan 66.243.211.244 has scanned 10000 hosts (445/tcp)
|
|
@end smallexample
|
|
|
|
Important note: If the source of a scan is an IP address within your own network, the probability that this system is infected or has been taken over by an attacker is very high.
|
|
|
|
At the bottom portion of each Bro report summaries of scan activity also will appear for your convenience (see the bottom part of Figure 1). Scan summaries look like the following:
|
|
|
|
@smallexample
|
|
Nov 16 8 01:30:11 ScanSummary 194.201.88.100 scanned a total of 145 hosts
|
|
@end smallexample
|
|
|
|
@strong{Port scanning }
|
|
|
|
Port scanning means that a system has targeted one system, connecting to one port, then another, until it has scanned a whole range of ports. In the following example a system with an IP address of 218.204.91.85 has scanned 50 ports of a system named diblys.dhcp within an internal network:
|
|
|
|
@smallexample
|
|
Nov 16 06:30:50 PortScan 218.204.91.85 has scanned 50 ports of siblys.dhcp
|
|
@end smallexample
|
|
|
|
An address dropped entry is likely to appear shortly after a port scan is reported. In the following entry, the system with an IP address of 218.204.91.85 was systematically probing low ports, that is, ports in the range from 0 to 1023, on sibyls.dhcp:
|
|
|
|
@smallexample
|
|
Nov 16 06:30:52 AddressDropped low port trolling 218.204.91.85 403/tcp
|
|
@end smallexample
|
|
|
|
|
|
@strong{Connection attempts}
|
|
|
|
Bro finds attacks against user accounts, such as password guessing attempts. When it does, it reports them as follows:
|
|
|
|
(Need example here)
|
|
|
|
@strong{Weird events}
|
|
|
|
Bro labels unusual or exceptional events as @emph{weird} Weird events include a wide range of events, including malformed connections,
|
|
attacker's attempts to confuse or evade being detected, malfunctioning hardware, or misconfigured systems or network devices such as routers.
|
|
Some weird events could be the result of an attack; others are just anomalies.
|
|
The better you know your own systems and networks, the more likely you will be to correctly determine whether or not weird events compromise an attack.
|
|
Weird events are divided into three categories:
|
|
|
|
@enumerate
|
|
1. Weird connections that are not formed in accordance with protocol conventions such as the way the tcp protocol should work
|
|
|
|
1. Weird flows in which data is being sent between two systems, but no specific connection between them can be identified, and
|
|
|
|
1. Weird network behavior that cannot be associated with any particular system.
|
|
@end enumerate
|
|
|
|
The following entry shows a weird connection in which packets are being sent between systems in what
|
|
appears to be an ongoing ftp session, but Bro has not identified any initial connection attempt (i.e., there is an @emph{ack above a hole}):
|
|
|
|
@smallexample
|
|
Nov 16 06:30:58 WeirdActivity window/50406 > klecker.debian.org/ftp ack above a hole
|
|
@end smallexample
|
|
|
|
The next entry (below) shows another weird traffic pattern in which eqvaadvip1.doubleclick.net has sent a flood of FIN packets, packets that tell the other system in a connection to terminate the connection, to bcig-8 within the network that Bro protects.
|
|
|
|
@smallexample
|
|
Nov 16 06:32:09 WeirdActivity bcig-8/2044 > eqvaadvip1.doubleclick.net/http: FIN_storm
|
|
@end smallexample
|
|
|
|
Here's another one --- in this case a system with an IP address of 222.64.93.208 has sent a flood of packets that have both the SYN and the ACK flags set, something that should normally happen only once in a TCP session. @command{nsx} is the destination system.
|
|
|
|
@smallexample
|
|
Nov 16 06:30:58 WeirdActivity 222.64.93.208/1115 > nsx/dns: repeated_SYN_with_ack
|
|
@end smallexample
|
|
|
|
Packets sent over networks are often broken up (or @emph{fragmented}) for various reasons.
|
|
Fragmented packets are not necessarily a sign of an attack, but large fragments can
|
|
indicate suspicious activity such as attempts to cause denial of service.
|
|
In the following example Bro has identified a very large packet fragment sent by p508c7fc5.dip.t-dialin.net to an internal system with an IP address of 131.243.3.162:
|
|
|
|
@smallexample
|
|
Nov 16 06:30:50 WeirdActivity p508c7fc5.dip.t-dialin.net -> 131.243.3.162: excessively_large_fragment
|
|
@end smallexample
|
|
|
|
Sometimes attackers attempt to evade being detected by sending malformed packets to the system they are attacking.
|
|
The receiving system cannot process them, so it informs the sending (attacking system) accordingly, asking it to resend them.
|
|
The sending system may now send packets that constitute an attack. Some intrusion detection systems (but not Bro) ignore what is resent because in theory it is unnecessary to reanalyze what has already been sent.
|
|
Bro detects this kind of retransmission inconsistency (@emph{rexmit inconsistency}) and reports it.
|
|
The following example shows that there has been retransmission inconsistency in packets
|
|
sent by a system at IP address 131.243.223.212 to origin2.microsoft.com:
|
|
|
|
@smallexample
|
|
Nov 16 06:30:59 RetransmissionInconsistency 131.243.223.212/2270 > origin2.microsoft.com/http @/ rexmit inconsistency (HTTP/1.1 200 OK^M^JDate: Tue, 16 Nov 2004
|
|
@end smallexample
|
|
|
|
|
|
@comment ********************************************
|
|
@node Connection Summary File
|
|
@section Connection Summary File
|
|
|
|
See the
|
|
@uref{http://www.bro-ids.org/Bro-reference-manual/Connection-summaries.html, Connection Summary}
|
|
section in the reference manual for a description of the @code{conn.log} files.
|
|
|
|
@comment ********************************************
|
|
|
|
@node Analyzer-specific Files
|
|
@section Analyzer-specific Files
|
|
|
|
A number of analyzers such as HTTP and FTP generate their own log files. These files are
|
|
fairly self explanatory.
|
|
|
|
coming soon: sample http.log, ftp.log, etc
|
|
|
|
@comment ********************************************
|
|
|
|
@node Tracefiles
|
|
@section Tracefiles
|
|
|
|
Bro can be configured to output captured packets that look to be part of suspicious sessions.
|
|
These files are in @code{tcpdump} format.
|
|
|
|
@comment ********************************************
|
|
|
|
|
|
@node Bro Summary Reports
|
|
@section Bro Summary Reports
|
|
|
|
@cindex e-mail reports
|
|
|
|
@emph{NOTE: The Bro report facility is still under development. This section
|
|
may be out of date. }
|
|
|
|
Bro reports are generated using the @command{site-report.pl} script, which is
|
|
typically run as a nightly @command{cron} job.
|
|
|
|
A daily report is created that covers three sets of
|
|
information:
|
|
|
|
@itemize
|
|
@item Incident information
|
|
@item Operational status of Bro
|
|
@item General network traffic information
|
|
@end itemize
|
|
|
|
The reports will be mailed to the email addresses specified during
|
|
Bro installation. These email addresses can be changed by re-running
|
|
the @code{bro_config} script or by editing @code{$BROHOME/etc/bro.cfg} directly.
|
|
|
|
@cindex incident
|
|
@cindex incident type
|
|
@cindex report period
|
|
@cindex alarm
|
|
@cindex connection, successful
|
|
@cindex connection, unsuccessful
|
|
@cindex connection, history
|
|
@cindex scans
|
|
@cindex scan, definition
|
|
@cindex scans, successful
|
|
@cindex system statistics
|
|
@cindex traffic statistics
|
|
|
|
The report is divided into three parts, the summary, incidents, and
|
|
scans. The summary includes a rollup of incident information, Bro
|
|
operational statistics, and network information. The incidents section
|
|
has details for each Bro alarm. The scans section gives details about
|
|
scans that Bro detected.
|
|
|
|
@subsection Parts of a Report
|
|
|
|
@subsubheading Header
|
|
The header gives some basic information about the report.
|
|
@quotation
|
|
@strong{Site name} is determined by the "Site name for reports" that was
|
|
given during the installation and configuration process.
|
|
@*@*
|
|
@strong{Start time and interval} of the report are also entered during
|
|
the configuration process.
|
|
@end quotation
|
|
@xref{Bro Configuration}.
|
|
|
|
@subsubheading Summary
|
|
This section give a numeric summary of the events that have happened in
|
|
the reporting period.
|
|
@quotation
|
|
@strong{Incidents} shows the number of incidents that are recorded in
|
|
the report period. An incident is any occurrence that is deemed worth
|
|
investigating. An incident is formed by the triggering of one or more
|
|
alarms.
|
|
@*@*
|
|
@strong{Scanning Hosts} are the number of specific IP addresses that
|
|
have been detected scanning either into or out from the site.@*
|
|
@quotation
|
|
@strong{A scan can be a:}
|
|
@itemize
|
|
@item @strong{port scan:} scanning several ports of a single host.
|
|
@item @strong{network scan:} scanning several hosts for open
|
|
ports.
|
|
@item @strong{signature scan:} attacking multiple hosts with a
|
|
specific vulnerability attack (signature).
|
|
@item @strong{targeted attack:} launching multiple signatures against
|
|
a single host.
|
|
@item @strong{password scan:} attempts to guess passwords on telnet
|
|
terminals.
|
|
@end itemize
|
|
|
|
@*
|
|
@strong{A successful scan is when:}
|
|
@itemize
|
|
@item the bytes sent by a single probe of a scan against a host or
|
|
several hosts are more than three deviations away from the standard
|
|
deviation of the rest of scan. In essence, where the bytes transferred
|
|
on one connection is different than the rest of the scan other
|
|
connections involved in the scan.
|
|
@item a separate connection back to the attacker host is detected from
|
|
the local network.
|
|
@item the number of bytes sent back from the targeted victim host to
|
|
the offender during a scan connection exceeds 20480.
|
|
@end itemize
|
|
@end quotation
|
|
|
|
@comment ### it occurs to me that summarizing signatures here, but not alarms in general, probably overemphasizes the importance of signatures vs. other types of analysis.
|
|
@strong{Signature Summary} shows the total number of alarms triggered by
|
|
signatures during the report period and the number of those that are
|
|
unique. These numbers do not include alarms triggered by embedded Bro
|
|
rules. @xref{Understand What Triggered the Alarm(s)}.
|
|
@end quotation
|
|
|
|
@subsubheading Signature Distributions
|
|
This is a list of all signatures that were triggered during the report
|
|
period.
|
|
@*
|
|
NOTE: This section does not include alarms triggered by embedded Bro
|
|
rules. @xref{Understand What Triggered the Alarm(s)}.
|
|
|
|
@quotation
|
|
@strong{Count} is the number of times the signature was seen.
|
|
@*@*
|
|
@strong{Unique Sources} is the number of unique ip addresses that used
|
|
the specific signature as an attack.
|
|
@*@*
|
|
@strong{Unique Dests} is the number of unique ip addresses that were
|
|
attacked by the particular signature.
|
|
@*@*
|
|
@strong{Unique Pairs} are the number of unique source/dest ip address
|
|
pairs where the source used the signature to attack the destination.
|
|
@end quotation
|
|
|
|
@subsubheading Incidents
|
|
@quotation Legend
|
|
This is the legend for reading the @i{connections} portions of the each
|
|
incident. It is shown once on each report at the top of the
|
|
@i{Incidents} section.
|
|
@end quotation
|
|
@quotation Incident number
|
|
Each incident listed in the Bro report is assigned a unique, sequential,
|
|
identification number prefixed with the organization identifier. This
|
|
number is unique for all incidents, not just to the daily reports.
|
|
@end quotation
|
|
@quotation Remote and Local hosts
|
|
The Remote and Local hosts are identified by both ip address and
|
|
hostname. The local hosts are those that are in local subnets as
|
|
determined during Bro configuration. It is important to note that
|
|
@i{remote host} does not infer @i{attack host}. Attacks can come from
|
|
local hosts (indicating an inside hacker or a compromised host).
|
|
@end quotation
|
|
@quotation Alarms
|
|
The network event(s) that Bro detects and identifies as possible
|
|
attacks. There are two general types of alarms, those triggered by
|
|
signatures and those triggered by Bro rules.
|
|
@xref{Understand What Triggered the Alarm(s)}, for more information about the differences.
|
|
All alarms will include the date/time of the attack, the direction of
|
|
the attack, and the ports involved. A @code{SensitiveSignature} will
|
|
include the signature code and payload to help evaluate what triggered
|
|
the alarm. Embedded Bro rules will include the payload and a session
|
|
number which can be used for further investigation in the logs.
|
|
@xref{Examine HTTP FTP or SMTP Sessions}.
|
|
@end quotation
|
|
@quotation Connections
|
|
A list of the first 25 connections after the first alarm is triggered
|
|
that are attempted between the attacking and victim host. This
|
|
tabulation of connections can be used to see if connections were
|
|
accepted by the victim host, the amount of bytes transferred in both
|
|
directions, the timing between the connections, and the ports involved.
|
|
@end quotation
|
|
|
|
@subsubheading Scans
|
|
This is a summary of the ip addresses involved in successful scans, the
|
|
type of scans, and the attacks used by the scanners.
|
|
|
|
@subsubheading Connection Log Summary
|
|
This section gives a overview of the most prominent connections that
|
|
have occurred during the report period, as shown by way of five tables.
|
|
|
|
@quotation Site-wide connection statistics
|
|
The number of successful and unsuccessful connections and the ratio
|
|
between the two.
|
|
@end quotation
|
|
@quotation Top 20 Sources
|
|
Hosts that have initiated the most connections.
|
|
@end quotation
|
|
@quotation Top 20 Destinations
|
|
Hosts that have accepted connections.
|
|
@end quotation
|
|
@quotation Top 20 Local E-mail Servers
|
|
The most active E-mail servers.
|
|
@end quotation
|
|
@quotation Top 20 Services
|
|
The services, as determined by port number, that have been involved in
|
|
connections.
|
|
@end quotation
|
|
|
|
@subsubheading Byte Transfer Pairs
|
|
This section gives a summary of the ip address address pairs that have
|
|
transferred the most bytes during the report period.
|
|
|
|
@subsection Annotated Example Report:
|
|
|
|
@verbatim
|
|
Site Report for ORG_NAME
|
|
from 2004/11/03 00:00:00 to 2004/11/04 00:00:00
|
|
generated on Sat Nov 13 12:02:48 2004
|
|
@end verbatim
|
|
|
|
@quotation annotation
|
|
@i{ORG_NAME will normally be replaced with "Site name for reports" that
|
|
was given during the installation and configuration process.}
|
|
@end quotation
|
|
|
|
@verbatim
|
|
========================================================================
|
|
Summary
|
|
========================================================================
|
|
@end verbatim
|
|
|
|
@quotation annotation
|
|
@i{Since this report is simple and only includes two incidents, the
|
|
summary is rather uninteresting. A glance at this summary would reveal
|
|
a rather "slow" day (for which you should be thankful).}
|
|
@end quotation
|
|
|
|
@verbatim
|
|
Incidents 2
|
|
Scanning Hosts
|
|
Successful 8
|
|
Unsuccessful 15
|
|
Signature Summary
|
|
Total signatures 2
|
|
Unique signatures 2
|
|
Unique sources 2
|
|
Unique destinations 2
|
|
Unique source/dest pairs 1
|
|
@end verbatim
|
|
|
|
@quotation annotation
|
|
@i{Since the same to ip addresses were involved in both signature
|
|
attacks, there is only one unique source/dest pair.}
|
|
@end quotation
|
|
|
|
@verbatim
|
|
========================================================================
|
|
Signature Distributions
|
|
========================================================================
|
|
Unique Unique Unique
|
|
Signature ID Count Sources Dests Pairs
|
|
------------------------ -------- --------- --------- --------
|
|
bro-687-5 1 1 1 1
|
|
bro-144-3 1 1 1 1
|
|
========================================================================
|
|
Incident Details
|
|
========================================================================
|
|
@end verbatim
|
|
|
|
@quotation annotation
|
|
@i{The following legend appears once in every report at the top of the
|
|
"Incidents" section}
|
|
@end quotation
|
|
|
|
@verbatim
|
|
# legend for connection type #
|
|
------------------------------
|
|
C Connection Status
|
|
# number corresponds to alarm triggered by the connection
|
|
* successful connection, otherwise unsuccessful.
|
|
I Initiatator of Connection
|
|
> connection initiated by remote host
|
|
< connection initiated by local host
|
|
------------------------------------------------------------------------
|
|
Incident ORG_NAME-000004524
|
|
--------------------------------
|
|
@end verbatim
|
|
|
|
@quotation annotation
|
|
@i{The host domain name "org_name.org" will normally be replaced by the
|
|
local domain name. The IP addresses in this example have been
|
|
synthesized from an imaginary range outside of the octal range. (We
|
|
realize these ip addresses cannot exist). In this example the ip ranges
|
|
124.333.0.0/24 and 132.257.0.0/24 are considered the local subnets.}
|
|
@end quotation
|
|
|
|
@verbatim
|
|
Remote Host: 84.136.338.21 p54877614.dip.hacker.net
|
|
Local Host: 124.333.183.162 pooroljoe.dhcp.org_name.org
|
|
@end verbatim
|
|
|
|
@quotation annotation
|
|
@i{This attacker was successful in using an SQL attack and then
|
|
downloaded a "tool" using TFTP. Both of these were detected and created
|
|
the following alarms.}
|
|
@end quotation
|
|
|
|
@verbatim
|
|
Alarm: SensitiveSignature
|
|
1 bro-687-5: MS-SQL xp_cmdshell - program execution
|
|
7/29 12:43:31 84.136.338.21 -> 124.333.183.62
|
|
566/tcp -> 1433/tcp
|
|
signature code:
|
|
signature bro-687-5 {
|
|
ip-proto == tcp
|
|
dst-port == 1433
|
|
event "MS-SQL xp_cmdshell - program execution"
|
|
tcp-state established,originator
|
|
payload /.*[xX]\x00[pP]\x00_\x00[cC]\x00[mM]\x00[dD]\x00[sS]
|
|
\x00[hH]\x00[eE]\x00[lL]\x00[lL]\x00/
|
|
}
|
|
payload: xp_cmdshell 'echo.> c:\\temp\\bcp.cmd'
|
|
|
|
Alarm: SensitiveSignature
|
|
2 bro-1444-3: TFTP Get
|
|
7/29 12:43:31 84.136.338.21 -> 124.333.183.62
|
|
2318/upd -> 69/udp
|
|
signature code:
|
|
signature bro-1444-3 {
|
|
ip-proto == udp
|
|
dst-port == 69
|
|
event "TFTP Get"
|
|
payload /\x00\x01/
|
|
}
|
|
payload: Runtime.exe
|
|
@end verbatim
|
|
|
|
@quotation annotation
|
|
@i{Looking at the "C" column below, the alarms are signified by "1" and
|
|
"2", both occuring at 12:43:31. Since the attacks take place within one
|
|
second, this is probably an automated attack. The remote host continues
|
|
to connect to the victim host, using a different port each time to avoid
|
|
detection. The large transfers from the local host to the remote host,
|
|
subsequent to the alarmed attacks, signifies that the attack is probably
|
|
successful.}
|
|
@end quotation
|
|
|
|
@verbatim
|
|
Connections (only first 25 after first alarm are listed)
|
|
-----------
|
|
time byte remote local byte
|
|
date time duration transfer port C I port transfer protocol
|
|
----- -------- -------- -------- ------ ------ ----- -------- ----------
|
|
07/29 12:43:31 ? 566 b 4634 1 > 1433 467 b tcp/MSSQL
|
|
07/29 12:43:31 0 ? 2318 2 < 69 20 b udp/tftp
|
|
07/29 12:43:32 265.7 4 b 4638 * < 2318 3.0kb udp
|
|
07/29 12:48:56 ? ? 4640 > 2362 ? tcp
|
|
07/29 12:50:05 ? 11.4kb 4639 * < 3333 8.6kb tcp
|
|
07/29 12:53:00 0 ? 4684 * > 2362 ? tcp
|
|
07/29 12:53:07 ? ? 4685 * > 2362 ? tcp
|
|
07/29 12:53:59 ? ? 4689 * > 2362 ? tcp
|
|
07/29 12:54:14 6.1 0 4693 * < 2380 94.2kb tcp
|
|
07/29 12:54:21 .5 50 b 4694 > 2381 0 tcp
|
|
07/29 12:54:23 .7 ? 4695 < 2382 0 tcp
|
|
07/29 12:54:25 .5 51 b 4696 * > 2383 0 tcp
|
|
07/29 12:54:27 .5 61 b 4697 * > 2384 0 tcp
|
|
07/29 12:54:28 .7 39 b 4698 > 2385 0 tcp
|
|
07/29 12:54:31 .5 41 b 4699 * > 2386 0 tcp
|
|
07/29 12:54:33 1.2 4.9 kb 4700 > 2387 0 tcp
|
|
07/29 12:54:35 12.8 195.0 kb 4701 * < 2388 0 tcp
|
|
07/29 12:54:53 .2 ? 4703 < 2390 0 tcp
|
|
07/29 12:54:54 .5 37 b 4704 > 2391 0 tcp
|
|
07/29 12:54:56 3.4 23 b 4705 * > 2392 0 tcp
|
|
07/29 12:55:04 21.4 308.7 kb 4706 > 2393 0 tcp
|
|
07/29 12:55:27 50.7 ? 4707 > 2394 ? tcp
|
|
07/29 12:59:23 ? ? 4775 > 1433 ? tcp
|
|
07/29 12:59:25 ? ? 4774 * > 3333 ? tcp
|
|
@end verbatim
|
|
|
|
@quotation annotation
|
|
@i{The next Incident demonstrates alarms triggered by embedded rules,
|
|
rather than signatures.}
|
|
@end quotation
|
|
|
|
@verbatim
|
|
------------------------------------------------------------------------
|
|
Incident ORG_NAME-000004525
|
|
--------------------------------
|
|
Remote Host: 80.143.378.186 p508FB2BA.dip.t-dialin.net
|
|
Local Host: 128.333.181.191 lemonade.lbl.gov
|
|
@end verbatim
|
|
|
|
@quotation annotation
|
|
@i{Since these alarms are triggered in the HTTP protocol, the actual
|
|
trigger rules are found in the file} @file{bro/policy/http.bro}.
|
|
@end quotation
|
|
|
|
@verbatim
|
|
Alarm: HTTP_SensitiveURI
|
|
11/13 11:36:05 80.143.378.186 -> 128.333.181.191
|
|
1560/tcp -> 80/tcp
|
|
session: %4672
|
|
payload: GET http://cn.edit.vip.cnb.yahoo.com/config/login?.redir
|
|
_from=PROFILES
|
|
|
|
Alarm: HTTP_SensitiveURI
|
|
11/13 11:53:54 80.143.378.186 -> 128.333.181.191
|
|
2434/tcp -> 80/tcp
|
|
session:%7386
|
|
payload: GET http://l10.login.scd.yahoo.com/config/login?.redir_f
|
|
rom=PROFILES?&
|
|
@end verbatim
|
|
|
|
@quotation annotation
|
|
@i{In the connections shown below, all connections are from the remote
|
|
host to the local host, with no successful connections back. Also the
|
|
payload above is seeking yahoo.com. Hence the likelihood is that this
|
|
is not an attack.}
|
|
@end quotation
|
|
|
|
@verbatim
|
|
Connections (only first 25 after alarm are listed)
|
|
-----------
|
|
time byte remote local byte
|
|
date time duration transfer port C I port transfer protocol
|
|
----- -------- -------- -------- ------ ------ ----- -------- ----------
|
|
11/13 11:36:05 1.109227 297 1560 * > 80 1531 http
|
|
11/13 11:36:06 ? ? 1560 > 80 ? http
|
|
11/13 11:41:51 0.843209 301 3175 * > 80 1533 http
|
|
11/13 11:41:52 ? ? 3175 > 80 ? http
|
|
11/13 11:47:37 2.562365 281 4701 * > 80 1382 http
|
|
11/13 11:47:39 ? ? 4701 > 80 ? http
|
|
11/13 11:53:53 0.694131 293 2434 * > 80 1529 http
|
|
11/13 11:53:54 ? ? 2434 > 80 ? http
|
|
11/13 11:59:23 0.685181 301 3975 * > 80 1529 http
|
|
11/13 11:59:23 ? ? 3975 > 80 ? http
|
|
11/13 12:04:53 1.054925 289 1700 * > 80 1527 http
|
|
11/13 12:04:54 ? ? 1700 > 80 ? http
|
|
11/13 12:11:56 2.579652 283 3442 * > 80 1523 http
|
|
11/13 12:11:59 ? ? 3442 > 80 ? http
|
|
11/13 12:18:08 1.046188 289 1083 * > 80 1531 http
|
|
11/13 13:14:42 ? ? 3282 > 80 ? http
|
|
11/13 13:16:46 ? ? 4802 > 80 ? http
|
|
11/13 13:19:04 1.731771 0 2764 * > 80 0 http
|
|
11/13 13:19:07 ? ? 2764 > 80 ? http
|
|
11/13 13:20:42 0.994114 289 4142 * > 80 1527 http
|
|
11/13 13:20:43 ? ? 4142 > 80 ? http
|
|
11/13 13:22:37 1.122448 292 1732 * > 80 1523 http
|
|
11/13 13:22:38 ? ? 1732 > 80 ? http
|
|
11/13 13:24:40 1.042112 289 3179 * > 80 1531 http
|
|
11/13 13:24:41 ? ? 3179 > 80 ? http
|
|
|
|
|
|
========================================================================
|
|
Scans (only first 100 shown)
|
|
========================================================================
|
|
@end verbatim
|
|
|
|
@quotation annotation
|
|
@i{The scans show below are considered "successful". Four interesting
|
|
scans shown below are the ones originating from the 124.333 and 132.257
|
|
domains, since they are local domains. These should be investigated.
|
|
The attack against 132.257.85.96 might also be investigated further.
|
|
With each report, a review of the attacks will give an understanding of
|
|
what types of scans are becoming "popular".}
|
|
@end quotation
|
|
|
|
@verbatim
|
|
Scanning IP Victim IP Attack
|
|
132.257.70.234 multiple bro-1344-5
|
|
132.257.52.64 multiple bro-1367-5
|
|
63.251.3.51 multiple bro-2570-6
|
|
124.333.181.191 multiple bro-1599-7
|
|
210.313.36.53 132.257.85.96 >1000 port scan
|
|
211.300.24.151 132.257.85.96 >1000 port scan
|
|
124.333.95.0 62.214.34.30 >250 port scan
|
|
172.278.206.135 multiple (3128/tcp)
|
|
|
|
========================================================================
|
|
Connection Log Summary
|
|
========================================================================
|
|
@end verbatim
|
|
|
|
@quotation annotation
|
|
@i{The connection log summary gives a general idea of what hosts are
|
|
most active. The analyst may want to become familiar with any new hosts
|
|
that appear on the next three lists and services that appear or
|
|
radically change position on the fourth list}
|
|
@end quotation
|
|
|
|
@verbatim
|
|
Site-wide connection statistics
|
|
Successful: 4498748
|
|
Unsuccessful: 35941140
|
|
Ratio: 1:7.989
|
|
|
|
Top 20 Sources
|
|
Host IP Bytes Conn. Count
|
|
-------------------------------- --------------- ------ -----------
|
|
ns1.org_name.org 124.333.34.186 3.7 G 683948
|
|
ns2.org_name.org 132.257.64.2 165 M 231245
|
|
lemonade.org_name.org 124.333.181.191 88 M 217781
|
|
nsx.org_name.org 132.257.64.3 371 M 200935
|
|
cinnamon.mining.com 207.5.380.138 4.5 M 103011
|
|
node2.lbnl.nodes.planet.org 198.328.56.12 106 M 75725
|
|
node1.lbnl.nodes.planet.org 198.328.56.11 85 M 73719
|
|
microscope.dhcp.org_name.org 132.257.19.79 61 M 54024
|
|
169.299.224.1 2.3 M 40348
|
|
uhuru.org_name.org 132.257.10.97 423 M 39847
|
|
132.257.77.246 13 M 29496
|
|
googledev.org_name.org 124.333.41.57 13 M 24930
|
|
64.46.248.43 60 M 19785
|
|
...16-141.sfo4.dsl.contactor.net 66.292.16.141 6.2 M 19048
|
|
rock.es.net 198.128.2.83 2.8 G 18459
|
|
perry.Geo.college.EDU 124.32.349.11 1.7 M 17326
|
|
google.org_name.org 124.333.41.70 8.5 M 15508
|
|
egspd42212.search.com 65.264.38.212 3.1 M 15138
|
|
hmb-330-042.MSE.college.EDU 124.32.349.20 222 M 14865
|
|
1rodan.dhcp.org_name.org 132.257.19.170 7.7 M 11873
|
|
|
|
Top 20 Destinations
|
|
Host IP Bytes Conn. Count
|
|
-------------------------------- --------------- ------ -----------
|
|
nsx.org_name.org 132.257.64.3 14 G 1571638
|
|
ns1.org_name.org 124.333.34.186 1.6 G 264976
|
|
ns2.org_name.org 132.257.64.2 80 M 218740
|
|
lemonade.org_name.org 124.333.181.191 2.6 G 176788
|
|
CS.university.EDU 128.312.136.10 10 M 81622
|
|
g.old-servers.net 192.42.293.30 11 G 71407
|
|
engram.CS.university.EDU 128.312.136.12 7.5 M 61309
|
|
aulvs.realthing.com 207.288.24.156 792 M 50493
|
|
ns1.college.EDU 124.32.349.9 995 M 39977
|
|
rohan.superc.gov 128.550.6.34 4.7 G 32883
|
|
sportsmed.starship.com 199.281.132.79 17 M 32152
|
|
ns2.yoho.com 66.263.169.170 2.1 G 24361
|
|
uhuru.org_name.org 132.257.10.97 58 M 19785
|
|
g3.NSDDD.COM 192.342.93.32 488 M 19734
|
|
w4.org_name.org 124.333.7.51 447 M 19334
|
|
E.TOP-SERVERS.NET 192.303.230.10 195 M 19066
|
|
mantis.org_name.org 124.333.7.39 395 M 18811
|
|
postala.org_name.org 124.333.41.61 8.0 M 17283
|
|
vista.org_name.org 132.257.48.146 488 M 15961
|
|
calmail.college.EDU 128.32.349.103 73 M 15154
|
|
|
|
Top 20 Local Email Senders
|
|
Hostname IP Conn.
|
|
Count
|
|
---------------------------------------- --------------- -----------
|
|
mta1.org_name.org 124.333.41.24 3869
|
|
postala.org_name.org 124.333.41.61 2850
|
|
ci.org_name.org 132.257.192.220 868
|
|
postal2.org_name.org 132.257.248.26 376
|
|
ee.org_name.org 132.257.1.10 173
|
|
math.org_name.org 124.333.7.22 131
|
|
rod2.org_name.org 132.257.112.183 121
|
|
gigo.org_name.org 124.333.2.54 110
|
|
mh1.org_name.org 124.333.7.48 82
|
|
stm.org_name.org 132.257.16.51 81
|
|
|
|
Top 20 Services
|
|
Service Conn. Count % of Total Bytes In Bytes Out
|
|
------------ ------------ ---------- --------- ---------
|
|
dns 3378522 75.10 30 G 11 G
|
|
http 902573 20.06 18 G 11 G
|
|
other 92913 2.07 14 G 249 G
|
|
smtp 35942 0.80 458 M 196 M
|
|
https 33848 0.75 2.3 G 179 M
|
|
ssh 25515 0.57 977 M 1.0 G
|
|
netbios-ssn 11004 0.24 65 M 9.5 M
|
|
pop-3 5494 0.12 58 M 3.6 M
|
|
ftp-data 4495 0.10 37 G 34 G
|
|
ldap 3549 0.08 740 K 2.0 M
|
|
ftp 1061 0.02 1.3 M 873 K
|
|
ident 970 0.02 29602 9039
|
|
printer 834 0.02 837 9176
|
|
time 645 0.01 2416 166
|
|
imap4 636 0.01 28 M 47 M
|
|
nntp 308 0.01 355 M 1.5 M
|
|
pm_getport 238 0.01 13328 6664
|
|
telnet 164 0.00 469 K 7850
|
|
ntp 26 0.00 1344 1392
|
|
X11 6 0.00 652 K 64280
|
|
========================================================================
|
|
Byte Transfer Pairs
|
|
========================================================================
|
|
@end verbatim
|
|
|
|
@quotation annotation
|
|
@i{Once again, this summary gives a general idea of what hosts are most
|
|
active. Radical changes to this list may indicate malicious activity.}
|
|
@end quotation
|
|
|
|
@verbatim
|
|
Hot Report - Top 20
|
|
Local Remote Conn.
|
|
Local Host Remote Host Bytes Bytes Count
|
|
--------------- --------------- --------- --------- ---------
|
|
124.333.28.60 128.265.128.131 123 G 5327 K 3930
|
|
124.333.28.60 128.265.128.132 123 G 5159 K 3927
|
|
132.257.64.3 198.328.2.83 2855 M 11.9 G 15097
|
|
124.333.34.186 192.342.93.30 2958 M 10.7 G 40033
|
|
132.257.64.3 61.283.32.172 7469 M 10393 11
|
|
124.333.41.57 128.256.6.34 12.0 M 4490 M 22360
|
|
124.333.181.191 81.257.197.163 1350 M 4430 M 3341
|
|
132.257.64.3 130.262.101.6 276 M 2200 M 13064
|
|
124.333.34.186 66.263.169.170 389 M 2095 M 17919
|
|
132.257.195.68 140.267.28.48 91.3 M 2029 M 6275
|
|
132.257.212.232 151.293.199.65 39155 1994 M 24
|
|
124.333.41.61 206.290.82.18 3401 1853 M 22
|
|
132.257.64.3 61.278.72.30 1798 M 7 1
|
|
124.333.181.191 61.263.209.246 16.8 M 1676 M 113
|
|
132.257.64.3 261.232.163.3 1544 M 24069 9
|
|
132.257.64.3 61.273.210.110 1517 M 4140 7
|
|
124.333.34.186 128.342.121.70 1351 M 222 M 14861
|
|
132.257.64.3 258.14.200.58 1350 M 24075 14
|
|
132.257.64.3 222.330.100.28 1219 M 4077 7
|
|
132.257.64.3 210.261.41.131 1162 M 25 3
|
|
@end verbatim
|
|
|
|
|
|
@comment ********************************************
|
|
@comment node Creating your own Custom Output
|
|
@comment section Creating your own Custom Output
|
|
|