2012-09-04 01:36 PM
NetWitness NextGen can actually detect compromised endpoints on your network by detecting connection attempts to known Command and Control servers- connection attempts that are being blocked by your firewall or smart proxy. Also, if known C&C hosts get blackholed, those bots out there will still try to communicate, and we can see these. Here's how you do it.
When deployed in the field, I typically see several connection attempts to known bad destinations. And since it is a chart, you will begin to see the timed pattern of the traffic as well. What this usually represents is a compromised source IP address that is attempting to connect to a blocked or blackholed destination, or you have orphaned malware that is trying to call home. Those sources should be pulled from the network for re-imaging or similar internal IR process.
2013-04-18 01:58 PM
As Fielder said, even if you could that list wouldn't work, there's no payload on these sessions so there will be no information about those domains.
You really need to rely on the org.dst or domain.dst keys as these are based out of GeoIP information.
Hope that helps!
2013-04-18 04:17 PM
OK I think you guys lost me somewhere.
I removed the names on that list. I still have the list in informer, but this is the only thing in it:
//List of acceptable download sources
//If listed name matches org.dst, filter from charting
The rule now looks like this:
alert='botnet beacon' && org.dst exists && org.dst != '$goodorgs' && threat.source exists && threat.source!='netwitness'
I am still getting the error when I look at Define Dashboards and when I look at my normal Dashboard view, it still says no results.
.
2013-04-18 04:25 PM
It looks right. Do you get results when you test the rule? Did you turn it into a chart and activate it?
2013-04-18 04:45 PM
i get no results when i test the rule.
i get no results when i test the chart.
i still get this msg when i look at Define Dashboard.
2013-04-18 04:54 PM
So step it back and make sure your rule is working first defining the botnet beacon rule. Do you see the rule fire in the alert meta in Investigator? If not, move that rule to the top of your decoder rule order. Wait a while to see if it fires.
When it does, and I'm certain it will, test your informer rule to get results without the where clause except for alert='botnet beacon.' With Informer you will have to wait until the top of the hour rollover to see results in the test rule.
By the way, I went up to the rules you had posted and you have some interesting stuff about redkit and IE8 exploits. Do those rules work? If so, feel free to post those in a thread on here!
2013-04-18 04:56 PM
Also, I think your dashboard chart is referencing a rule no longer there. Delete that dashboard item and recreate it and it should get rid of that error.
2013-04-18 04:59 PM
actually i have deleted it from the dashboard several times.
im checking those other things now but i do see it in the Alerts bucket in investigator.
to be honest i have so much on my plate with netwitness i cannot confirm if those other 2 rules you asked about work or not.
i think those were set up by PS when they were here.
i am the only one doing NetWitness so when i get a chance i will take a look and see if they work or i can post them for everyone to play with.
and being new to this whole forensics field makes it all the more fun...(sarcasm)... actually i love learning this stuff. it is a lot of fun playing detective.
i will have to continue this tomorrow and post updates.
thanks so much guys.
2013-04-18 05:05 PM
My bad. The chart is referencing a rule that has been changed or deleted. Delete that chart and recreate it from your rule. If you are seeing the alert in investigator, copy and paste that into your informer rule to be sure of spelling and run the test. You should see results.
2013-04-19 11:57 AM
I think I am going to have to give up on this one.
I have deleted everything and started from scratch, but still get no results when I test the chart.
We do have a Decoder App rule that's the same as the one you posted in the article called zero payload, so we will just use that one I guess.
I was curious to see if we would get different results with this rule.
Thanks for all the help.
2013-04-19 12:04 PM
If you have the "Zero Payload" rule already I would try with that just to be sure. It might a simple typo that we are missing somewhere or something like that.
It won't hurt to try if you have the time.