Skip to main content

Posts

Showing posts from September, 2008

Welcome to Mark Baggett - In Depth Defense

I am the course Author of SANS SEC573 Automating Information Security with Python. Check back frequently for updated tools and articles related to course material.




Symantec Detects Symantec as virus

I love incidents caused by false positives in antivirus products. Its frustrating enough that they don't detect legitimate threats , but when they delete legitimate files its just a waste of time and energy. Today I handled an incident where 10% of an organizations machines detected ESUGRemoteSvc . exe as a Trojan.. 2008-09-19 17:13:48;2008-09-19 17:23:42;Real Time Scan;LOGGER_Real_Time;1;Virus found;Trojan Horse;1;"C:/WINDOWS/system32/ ESUG / ESUGRemoteSvc . exe ";Quarantined; Fire up the IRT engine. Gather samples, run it in a isolated machine to watch it behavior, submit it to virustotal .com and Normans Sandbox, pull it apart with Immunity Debugger, but the thing looks legit. No machines are scanning the network or making TCP connections to an unusual number of hosts, but it appeared to be spreading. So what is this evil program? ITS SYMANTECS OWN ADMIN TOOL!!! ESUG stands for " Enterprise Support Utilities Group " A call to Symantec confirme

PCI - The gaping hole in your IDS/IPS

I’ ve come to learn PCI requires business leave their network unmonitored and open to attack!!!   Specifically  on page 4 item  #13 of this document.   https://www.pcisecuritystandards.org/pdfs/pci_scanning_procedures_v1-1.pdf It reads: 13. Arrangements must be made to configure the intrusion detection  system/intrusion prevention system (IDS/ IPS ) to accept the originating IP address of the ASV . If this is not possible, the scan should be originated in a location that prevents IDS/ IPS interference. I understand what the intention of this requirement is.  If your IPS is blacklisting the scanner IP's then ASVs don't get a full assessment because they are a loud and proud scan rather than a targeted attack.    For example,  Lets say I have 1000 host on my network.   If during the assessment of host 1 of 1000 the IPS blocks the source IP of the scanner, then serious threats will remain undetected on hosts 2-1000 and portions of host 1.   An attacker who is not nearly a