Day in the Life of the Internet Storm Center 123
An anonymous reader writes "Network World Fusion has an
article about the Internet Storm Center's inner workings.
The writer follows the ISC during the day of the MyDoom-O outbreak (the one that hit Google et al.).
The article talks about running W2K in
vmware on top of SuSe Linux. A practice very common in malware analysis to isolate yourself from various ill effects of the malware. Other open
source software receiving a mention in the article is everybodies favorite packet analyzer Ethereal."
My Favourite Pony (Score:4, Informative)
DeepFreeze [faronics.com]
Just one reboot, and any malware infection is obliterated. (There are alternatives, too, but I like DeepFreeze the best)
Re:My Favourite Pony (Score:5, Interesting)
The closest I read was "Deep Freeze instantly protects and preserves original computer configurations" which reads to me that it's kind of like Ghost, except it keeps an image local on the HDD?
If so, I'd shy away from phrases like "Completely invulnerable to hacking".
XP's system restore feature gives you the same functionalities, if it's used properly (of course, it never is). I'm in the habit of making a save point before I do anything that could potentially bork my machine (testing some new driver tweak, etc), and have rolled back successfully on more than one occasion.
Re:My Favourite Pony (Score:5, Informative)
My suggestion is to use Deep Freeze with Ghost (It's a complex setup, but if you "un-freeze" the system for one reboot, then Ghost, all you have to do is cast the image, change the computer's name (we had a pretty complex naming scheme), then reboot the machine and it's ready to go.) It's a formittable combination, and far better than products like "Foolproof Security". Hope this helps.
Re:My Favourite Pony (Score:5, Interesting)
"I can't build a working EXE, my Visual Studio is screwed up!" "I can't dial into that customer, because my modem isnt working" "I can't VPN in because my computer crashes when I fire up the Cisco client".
He's incompetent, but I'm dubious he's this incompetent. I traded him the machine in my office when I got a new one, everything worked perfectly. A week later, his VPN and Visual Studio are broken. I really dont have the time to keep rebuilding his machine for him. Of course, he claims he doesn't know how to reinstall Office or VStudio, etc..
I think he does it so he won't have to do actual work. I end up doing everything because he always has an excuse. When he's on site, his laptop is broken, so he has to phone in all the code changes he wants, I have to do it, cut an EXE and email it out. Of course, it's double bonus for him. Anything he fucks up on site, he can just blame me for, since I'm actually doing the work remotely.
It's pissing me off, and it makes our company look like a bunch of morons. My archetypal PHB thinks he's just the cats ass because he comes in "early" every morning (he shows up at 8:45 to drink coffee and read the paper, we open at 9. Sheesh).
Anyhow, this sounds like a decent product. I'm downloading the evaluation version now. I'll reinstall his machine one last time, ghost it, install this. Next time I hear "I can't dial in because my modem is screwed up", I'll reboot his box and it'll be fixed.
Re:My Favourite Pony (Score:3, Interesting)
Hope it works out!
Re:My Favourite Pony (Score:1)
you also need to show him how to do it, and then here are no excuses.. However he WILL blame ghost for now fucking up his machine.
I would make him sign off something that states he is happy with it before he breaks the keyboard and cannot press 'enter' to resetup the drive.. i f**king hate people like that.
Re:My Favourite Pony (Score:2)
Re:My Favourite Pony (Score:3, Interesting)
We use DeepFreeze in the lab and it works very well. I have yet to find or hear about any way for the student
Re:My Favourite Pony (Score:2)
I took the task head on and found that Deepfreeze works (to my knowledge, I'm not exactly sure about the internals) on keeping a transaction record, and then playing it back. It also is almost continually checking checksums of access files so that it knows which ones to fix later. Destroy either the ability to keep the c
Re:My Favourite Pony (Score:2, Insightful)
Re:My Favourite Pony (Score:1)
Re:My Favourite Pony (Score:2)
Granted the average script kiddie would have dificulty in doing so but it is verry possible. Using a bios password to lock changes in boot order and such are really good for keeping people that shouldn't be on the computer in the first place off. If they have access to it in a working enviroment reguardless of user priviledges, it is hackable.
Maybe,in cases with school children or the existance of co-workers that
Re:My Favourite Pony (Score:2)
Re:My Favourite Pony (Score:2)
Assume that a competent system administrator has already disabled floppy/cd-rom booting and password-protected the bios. For the annoying people in a public place ("Ooh! Bonzai Buddy!"), that would be sufficient to prevent almost all malware.
Re:My Favourite Pony (Score:2)
Re:My Favourite Pony (Score:2)
Try it, they have a free demo. Try and see if you can break it (let me know if you can
That offer good for the OS X version of their product, too? If so, you're on.
I'll also stipulate to disabling external booting via Firmware lock, disabling single user mode, and not having the root user enabled. I'll pretend that I can't defeat that by not changing the RAM--which is plausible on a workstation with a padlock (but not on a portable.)
Re:My Favourite Pony (Score:5, Interesting)
So from my independent analysis, I'd say DeepFreeze is good. I haven't done any code-tracing, though, so I don't know if some buffer overflow would ruin the whole thing. It wouldn't surprise me, though.
Closed source is what it is.
Re:My Favourite Pony (Score:3, Interesting)
I don't really know if that makes sense, but basically what I'm saying is I think instead of allowing changes to the stuff that's already on the drive, instead it makes the system write the changes to a "scratch space", as it were,
Re:My Favourite Pony (Score:2)
I suspect that the 2MB requirement is for installation only. Whether it keeps a transaction log or saves the changes temporarily to a different location, that information still needs to be saved somewhere.
Otherwise you'd end up with a read-only hard drive. From personal experience, I can tell you that the hard drive is writable while you're using the system. The first time I saw it, I just thought that the computer was being reimaged upon boot.
Re:My Favourite Pony (Score:4, Insightful)
"Never trust a product that includes the phrase:
Completely invulnerable to hacking..."
Re:My Favourite Pony (Score:1)
I hate that this kind of software has to exist, but if DF doesn't do it for you, GoBack works just right.
My 'ounce of prevention' solution... (Score:1)
Why use products like DeepFreeze after the malware has run and (irreperable?) damage is done when you can stop the malware from running in the first place.
Since malware by email is extremely popular, my approach simply treats all file attachments as 'text files'. 'Running' a text file on an uncompromised machine will cause the file to be loaded into another (trusted?) program.
These 'text files' can be safely handled, scanned for malware by trusted antivirus software, then deleted if inf
Re:My Favourite Pony (Score:2, Interesting)
Just last week at my college I thought I'd throw a knoppix disc and not use their 2 year old installation of Windows 98. Knoppix was slow as fuck with the little amount of RAM it had, so I thought I'd install it to the hard drive so it would run faster, DeepFreeze is on this machine, when I reboot win98 will be right back where it was, right? Wrong. I hope nobody finds out that I did that or I'll get banned from using the college network... again. DeepFreeze wasn't deep enough.
Correct link (Score:5, Informative)
Re:Correct link (Score:1, Offtopic)
... and a nice Ethereal add-on... (Score:5, Informative)
Has some neat additional features, such as conversation tracking and I believe it has a few more decodes. Only for Windoze, however, thus encouraging the VMWare machines.
Malware (Score:5, Funny)
Best description of Windows I've heard in ages...
Re:Malware (Score:5, Interesting)
However, if anyone out there is running a honeypot as a hobby or are new to setting them up, some good advice on a more secure [keyfocus.net] Windows configuration can be found here [keyfocus.net]. Specifically, it details how to cripple DCOM using a hex editor and reconfiguring other networking services. Good advice, even if you don't use their product. Be careful, you may lose some desktop functionality.
More "fun" than running viruses in vmware... (Score:5, Funny)
Re:More "fun" than running viruses in vmware... (Score:5, Interesting)
Re:More "fun" than running viruses in vmware... (Score:2)
Re:More "fun" than running viruses in vmware... (Score:1)
wine my_virus_executable.exe
I keep a seperate account on my machine specifically for running untrusted programs, so no worries for me.
ND
virus (Score:5, Interesting)
Re:virus (Score:5, Interesting)
Re:virus (Score:2, Funny)
Re: virus (Score:5, Interesting)
I guess a major factor is that many exploits are created by reverse engineering patches. As Microsoft has ended active support for Win9x systems, that also means no new patches for hackers to reverse engineer. Then there was this source code leak, wasn't it Win2k source code? So different code from what's in Win9x. And as Win9x systems are replaced with Win2k/XP, their smaller market share makes Win9x a less interesting target.
On duty, 24/7 (Score:5, Funny)
From TFA :
He is the only full-time staffer among the 30 ISC handlers who span the globe and are on duty 24-7. The rest are volunteers who take turns watching over the Internet. Most have other jobs and aren't expected to be awake for their entire 24-hour shift.
Who the hell is this Ulrich guy? R2D2?
Re:On duty, 24/7 (Score:3, Funny)
Funny you should ask...
Here's a pic of Ullrich [homepc.org] and here's one of R2D2 [boomersint.org]. Although the picture of R2D2 is a bit old (taken june 12:th, Long Time Ago), it's still obvious that the two are identical or that I am full of shit.
QED.
Virus naming conventions (Score:5, Funny)
Re:Virus naming conventions (Score:2, Funny)
Three links I just can't live without as an admin: (Score:5, Informative)
Provides current Internet port graph history and advisories
CERT's Vulnerabilities page [cert.org]
Provides current Internet virus history and news.
Keynote Internet Health Report [internetpulse.com]
Provides a table of ping times between various Internet backbones and providers. Great for checking if it's your ISP, or the backbone they are attached to that's having a slow day.
I advise everyone to check these out, as they provide a great wealth of information in a nice organized format.
Re:Three links I just can't live without as an adm (Score:2)
-Adam
Mirror (Score:1)
http://www.google.co.uk/search?q=cache:jo3aRe29uH
i know, i know...
Re:Three links I just can't live without as an adm (Score:2, Informative)
OT: your .sig (Score:2)
[*makes note to disable fork()]
That is one of the funniest
Still chuckling.
The Storm Center is excellent (Score:5, Informative)
What about the rest of you? What links do you check out, and what am I missing?
Re:The Storm Center is excellent (Score:1, Funny)
Re:The Storm Center is excellent (Score:2, Informative)
Re:The Storm Center is excellent (Score:1)
Re:The Storm Center is excellent (Score:2)
I have a set of tabs that I load every morning precisely for this; some of them are:
ISC is definitely the main one to get but these are useful. I didn't list virus sites but those may be useful as well depending on your environment.
I'm sure today will not be a typical day.. (Score:4, Funny)
Small code ... ? (Score:5, Interesting)
"It's amazing how these virus writers get such small code," Ullrich says. "They should be working for some of the commercial code vendors."
Why not: s/should/could
And for the conspiracy-minded: s/working for/commanded by
Really twisted addon to the latter: s/code vendors/anti-virus vendors
Another episode in "preaching to the converted".
Since when... (Score:2, Insightful)
...are the "commercial code vendors" interested in small code size?
Redefining protocols? (Score:4, Interesting)
From the article...
Like previous versions of MyDoom, this one too seems to be listening on certain ports for commands. Ullrich pings each port, but the virus does not react.
That's a neat trick.
I guess they mean "ping" as in "connected to a TCP or UDP port in some manner", and not the usual "send ICMP ECHO_REQUEST", which I don't believe has anything to do with "ports".
Ah, journalism.
Re:Redefining protocols? (Score:1)
Packet Inter Net Groper.
As long as the hairs are splitting, I would never ping a port, but I might try to open a connection to it. You ping a host, you connect to a port. UDP is another story.
Re:thats SuSE and _not_ SuSe (Score:1)
See: SUSE LINUX [suse.com]
Re:thats SuSE and _not_ SuSe (Score:1)
Another good product is.... (Score:2)
Re:Another good product is.... (Score:1)
"Virtual PC 2004 does not support universal serial bus (USB) connections. "
(From the online help for Virtual PC 2004)
Re:Another good product is.... (Score:2)
Well, not complete. Virtual PC is great if you need to run multiple versions/copies of Windows for testing purposes. However, VirtualPC isn't a complete VM -- if total isolation is required, Virtual PC isn't a good choice. However, if you don't need the total isolation of something like VMware, Virtual PC will probably work (and it performs better than VMware because it's not a complete VM).
I use VMware for isolation testing (
Re:Another good product is.... (Score:1, Informative)
As for performance, although Virtual PC may have marginally better performance on Windows OSes than VMware, under Linux OSes, the reverse is often true. The products are truely very similar on the desktop. VPC has slightly better general compatibility, and VMware has an edge in USB and network configurability, either of
Forecast (Score:5, Funny)
Hahahhaha (Score:2, Interesting)
To paraphrase Dave Aitel, "handler = someone without a CS degree".
$ans is all about cash. That is why their classes are packed to the brim, so people can watch powerpoint presentations...
(yes I have attended one)
Half of the SANS hardening guides were ripped straight from the US government (NSA/DISA STIGs). No credit given either btw.
Re:Hahahhaha (Score:2, Informative)
Re:Hahahhaha (Score:1)
Re:Hahahhaha (Score:2)
Northcutt is one guy. Don't know of the actual situation being described, but there are more holes in that post than a piece of coagulated swiss dairy product.
SANS _is_ a non-profit. It does pay it's people (most of the handlers are volunteers--so don't be too big of a tool, please.) and it's speakers, and has a heck of a lot of infrastructure to support. All things that cost $$. They're not the only non-profit org that actually makes (and then uses) a fair amount of money. Take a
Re:Hahahhaha (Score:2)
The GIAC certifications are also one of the few cert programs that I think are worth pursuing. You have to prove a decent command of the material before you can complete
Re:Hahahhaha (Score:1)
Re:Hahahhaha (Score:1)
Just to clear the air - I am in no way affiliated with SANS, I just attended one of their classes recently.
$ans is all about cash.
Now, clever use of the dollar sign I agree - sure to lend much needed credibility to your ideas, but listen:
Where does it say on their site that SANS is a charitable organization dedicated to bringing practicall
Worms topic icon... (Score:1)
caterpillars aren't worms (Score:1)
Re:Ethereal is for the weak (Score:5, Funny)
Real admins plug the network cable directly into their brains to perform packet analysis
Re:Ethereal is for the weak (Score:5, Funny)
You mis-spelled brains. Its spelled 'ass'
Re:Ethereal is for the weak (Score:2)
Re:Ethereal is for the weak (Score:3, Funny)
Real admins don't need the cable. They are already one with the network.
Re:Ethereal is for the weak (Score:1, Funny)
I really don't want to know what type of viruses you have!
Re:Ethereal is for the weak (Score:2)
You mean like this? [userfriendly.org]
Re:The difference between this and real storm chas (Score:3, Funny)
Internet storm chasing leads to porn.
You mean to say porn isn't really cool pictures?
Re:The difference between this and real storm chas (Score:1, Offtopic)
Sorry.
Mark
Re:SuSE and VMware (Score:3, Informative)
Re:Similar Article (Score:5, Informative)
Re: (Score:2)
Re:Similar Article (Score:3, Interesting)
This is something like the third article where someone has posted that link, then it has been modded up as informative.
Maybe a lot of Slashdotters don't pay attention when they Mod, but it smells to me of some organised trolling.
Re:Similar Article (Score:1, Interesting)
Re:Similar Article (Score:2)
DON'T click the link in parent (Score:2)