2012-09-04 01:36 PM
NetWitness NextGen can actually detect compromised endpoints on your network by detecting connection attempts to known Command and Control servers- connection attempts that are being blocked by your firewall or smart proxy. Also, if known C&C hosts get blackholed, those bots out there will still try to communicate, and we can see these. Here's how you do it.
When deployed in the field, I typically see several connection attempts to known bad destinations. And since it is a chart, you will begin to see the timed pattern of the traffic as well. What this usually represents is a compromised source IP address that is attempting to connect to a blocked or blackholed destination, or you have orphaned malware that is trying to call home. Those sources should be pulled from the network for re-imaging or similar internal IR process.
2013-04-19 12:09 PM
Hi Rui,
That Zero Payload does work but I am not sure what the difference between these 2 would be, which is what I was curious about.
This is the rule for it:
Select | org.dst |
Where | alert='zero_payload' |
2013-04-19 12:16 PM
Probably the " " versus the "_" or maybe the location of the rule in the list, the rules are evaluated sequentially and there are some rules that will cause the evaluation to stop. Namely, filter and truncate rules normally tend to stop the evaluation.
Have a look at that and see if that helps.
2013-04-19 12:38 PM
i created the rule again on the decoder and placed it above the other zero payload rule, again calling it botnet beacon.
i then created the rule again in informer, but when i test it i get nothing.
2013-04-19 12:49 PM
Can you see it in investigator, if you create a custom drill with it? Remember the cache.time.window setting can affect your results. Also for Informer in some cases the results only run from the top of the previous hour backwards so that could be causing your issues.
If you can post screen shots of the rule in Administrator, the custom drill in Investigator and Informer content that might help. Feel free to e-mail me directly if you prefer.
Thank you,
Rui
2013-04-19 12:59 PM
i will send you the screenshots offline in a few minutes.
thanks rui
2013-10-25 09:26 PM
As an additional comment on this rule/chart, I'd like to suugest you push the majority of the processing down to the decoder and make the informer/Reporter query much simpler.
First rule:
zero payload
payload='0'
(set to alert to 'risk.info')
Ssecond Rule:
zero payload to threat sources
risk.info='zero payload' && threat.source exists && threat.source!='netwitness' && org.dst exists
(set rule to alert to 'alert')
Informer/Reporter Rule
Select: ip,dst
Where: alert='zero payload to threat sources' && org.dst != '$Good Org Dests'
Create Chart from rule
This puts most of the rule load down on the decoder during capture, and you are only querying the system looking for one primary key value and the list of orgs. If the list of orgs gets too long, make a feed out of it.