Security Basics mailing list archives

RE: unusual user activities


From: "Wayne Wheeles" <wwheeles () cablespeed com>
Date: Fri, 26 Aug 2011 13:44:52 -0400

Concur with Bill

   >   Traffic to the internet using the SMB protocol. (what is the pattern
SAMBA or something else)
   >   Monitoring ports and protocol combinations
   >   Bounce back emails from recipients you never contacted
   >   Connections to thousands of hosts from a single workstation (Critical
indicator that is always ignored)
   >   Look for traffic such as port scanning (Active and passive)

-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On
Behalf Of William Baltas
Sent: Friday, August 26, 2011 12:59 PM
To: Voulnet
Cc: security-basics () securityfocus com
Subject: RE: unusual user activities

   SMB is the protocol Microsoft uses for file sharing.  As a general rule,
a file share should never be allowed on the Internet (at least I've never
seen a good case for this).  If SMB traffic is coming and going to the
Internet, a file share is exposed to the Internet.
   
   Bill
   
   -----Original Message-----
From: Voulnet [mailto:voulnet () gmail com] 
Sent: Friday, August 26, 2011 9:54 AM
To: William Baltas
Cc: security-basics () securityfocus com
Subject: Re: unusual user activities
   
   What does internet traffic through SMB usually means?
   
   On Fri, Aug 26, 2011 at 7:49 PM, William Baltas
   <bill.baltas () cleanwaterteam com> wrote:
   >   Unusual behavior is difficult to define if you don't define normal
behavior first.  For example, several years ago I worked for a police
agency.  When IT started analyzing traffic patterns we noticed items we
thought very unusual (traffic to adult/porn sites, download of suspicious
files, etc.)  We contacted the Detective Bureau with our findings, and found
that the officers in question were conducting ongoing investigations; this
traffic was normal.  In my current position, this traffic would be grounds
for termination.
   >
   >   The following might be considered unusual:
   >
   >   Traffic to the internet using the SMB protocol.
   >   Sending email directly from a workstation, bypassing smtp servers
   >   Connections to thousands of hosts from a single workstation
   >   Anti-Virus/Malware alarms on a workstation over a period of time
(it's not unusual for someone to get infected from time to time)
   >   Users that have A/D accounts consistently locked out (this is
probably not the user with the locked account, but someone trying to access
the locked account.)
   >   Be aware of staff that asks for permissions to files and directories
where they are not authorized.
   >   Look for traffic such as port scanning
   >   Watch for applications such as sam spade, angry IP scanner, cain and
able, nmap and others
   >   If you have port security set on your switches, watch for ports that
are continually disabled
   >   Look for DNS zone transfers from workstations and servers that are
not your DNS servers.
   >
   >   I hope this helps.
   >
   >   Bill
   >
   >
   >   -----Original Message-----
   > From: listbounce () securityfocus com
[mailto:listbounce () securityfocus com] On Behalf Of websicher () googlemail com
   > Sent: Friday, August 26, 2011 1:03 AM
   > To: security-basics () securityfocus com
   > Subject: Re: unusual user activities
   >
   >   Hi,
   >
   >   "unusual behaviour" is a very wide field from my perspective - but
let's give it a try:
   >
   >   #1: Use of (web) proxy:
   >   You could monitor the URLs the user called. If ofentimes a web proxy
website is visited (e.g. hidemyass.com) it could be hint for illegal web
activities (e.g. trying to hack sth.)
   >
   >   #2: Online bookmarks:
   >   Primarily it's not a network topic but a security issue I witnessed
some years ago. A company's employee stored his bookmarks to internal
servers (including port numbers, etc.) on a publicly accessible external
bookmarking website.
   >
   >   #3: Number of uploads:
   >   If there's a remarkable number of uploads from the user's PC it may
be the case that he "exports" company data to his own storage area, e.g.
Google Docs. You should monitor the upload traffic.
   >
   >   #4: Upload / Download volume:
   >   You should compare the user's upload and download data volumes
compared to the average of employees with the same job position or in the
same department. (e.g. an IT person will probably have a higher volume than
an HR employee)
   >   If the volumes are significantly above the average you should closely
monitor the traffic.
   >
   >   Well that's all I can think of at the moment. If you provide more
details on which areas you'd specifically like to cover maybe we can add
more ideas.
   >
   >   Cheers,
   >   Pascal
   >
   >  
------------------------------------------------------------------------
   >   Securing Apache Web Server with thawte Digital Certificate
   >   In this guide we examine the importance of Apache-SSL and who needs
an SSL certificate.  We look at how SSL works, how it benefits your company
and how your customers can tell if a site is secure. You will find out how
to test, purchase, install and use a thawte Digital Certificate on your
Apache web server. Throughout, best practices for set-up are highlighted to
help you ensure efficient ongoing management of your encryption keys and
digital certificates.
   >
   >  
http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727
d1
   >  
------------------------------------------------------------------------
   >
   >
   >
------------------------------------------------------------------------
   > Securing Apache Web Server with thawte Digital Certificate
   > In this guide we examine the importance of Apache-SSL and who needs an
SSL certificate.  We look at how SSL works, how it benefits your company and
how your customers can tell if a site is secure. You will find out how to
test, purchase, install and use a thawte Digital Certificate on your Apache
web server. Throughout, best practices for set-up are highlighted to help
you ensure efficient ongoing management of your encryption keys and digital
certificates.
   >
   >
http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727
d1
   >
------------------------------------------------------------------------
   >
   >

------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL
certificate.  We look at how SSL works, how it benefits your company and how
your customers can tell if a site is secure. You will find out how to test,
purchase, install and use a thawte Digital Certificate on your Apache web
server. Throughout, best practices for set-up are highlighted to help you
ensure efficient ongoing management of your encryption keys and digital
certificates.

http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727
d1
------------------------------------------------------------------------


------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.  We look at how SSL works, how 
it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, 
install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are 
highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.

http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1
------------------------------------------------------------------------


Current thread: