Tweet
Thursday, September 12, 2013
Bejtlich Teaching at Black Hat West Coast Trainings
Tweet
Tuesday, August 13, 2013
Feedback from Network Security Monitoring 101 Classes
I wanted to share some feedback from the classes, in case any of you are considering attending an upcoming edition. Currently I'm scheduled to teach at Black Hat Seattle on 9-10 December. I plan to continue offering my class through Black Hat as they expand their training location offerings.
Student feedback from NSM101 included:
- Great tools, fun labs, very prepared -- a lot of experience from interesting real world scenarios.
- This course was everything I hoped for and more. Very impressive considering the course is new.
- One of the best training classes I have ever taken.
- Richard hosted an exemplary class.
- I thought the class was excellent, and the content was relevant and informative.
- The instructor was there when help was needed. I can easily take what I learned here and apply it to my work.
- Excellent instructor and class. It is nice to learn from true pros who are humble and willing to help.
- Richard is an excellent speaker. His use of real world examples added value to each lab. The material was easy to understand and very well thought out.
- The stories behind the scenes and the practical notes (i.e., how to create a team) really helped.
- Great balance of hands-on and theory.
- Easy to follow and inspiring, even for an NSM beginner like me.
- Great companion to the new NSM book.
- This class was fantastic. I wish I could send my whole department.
- I look forward to using your book and teaching some of your techniques to my students.
In the "constructive criticism" category, several students recommended that I modify the class description to better suit the class structure. For example, some students didn't realize they would be using Security Onion in the class. A few students told me they would have sent more people from their team if they had a better sense of what the class was going to include. I will fix that for the Seattle edition and future events.
Overall I very much enjoyed teaching the new class. I will make a few tweaks to fix typos but otherwise I am ready to teach again in December. Once the registration form is active I will post it via Twitter.
If you have any questions, please post them as comments here or via Twitter to @taosecurity. Thank you.
Tuesday, June 18, 2013
President Obama Is Right On US-China Hacking
I strongly recommend watching the excerpt on the Charlie Rose show titled Obama: Blunt Conversation With China on Hacking. I reproduced the relevant part of the transcript below and added emphasis to key points.
CHARLIE ROSE: Speaking of pushing back, what happened when you pushed back on the question of hacking and serious allegations that come from this country that believe that the Chinese are making serious strides and hacking not only private sector but public sector?
BARACK OBAMA: We had a very blunt conversation about cyber security.
CHARLIE ROSE: Do they acknowledge it?
BARACK OBAMA: You know, when you’re having a conversation like this I don’t think you ever expect a Chinese leader to say "You know what? You’re right. You caught us red-handed."
CHARLIE ROSE: You got me. Yes.
BARACK OBAMA: We’re just stealing all your stuff and every day we try to figure out how we can get into Apple --
CHARLIE ROSE: But do they now say "Look? See you’re doing the same thing. We’ve been reading about what NSA is doing and you’re doing the same thing that we’re doing and there are some allegations of that. And the man who is now unleashing these secrets who’s telling everybody is in Hong Kong.
(CROSSTALK)
BARACK OBAMA: Yes.
CHARLIE ROSE: And may be talking to the Chinese.
BARACK OBAMA: Well, let’s separate out the NSA issue which I’m sure you’re going to want to talk to and the whole full balance of privacy and security with -- with the specific issue of cyber security and our concerns --
CHARLIE ROSE: And cyber warfare and cyber espionage.
BARACK OBAMA: Right. Every country in the world, large and small, engages in intelligence gathering and that is an occasional source of tension but is generally practiced within bounds. There is a big difference between China wanting to figure out how can they find out what my talking points are when I’m meeting with the Japanese which is standard fare and we’ve tried to prevent them from --
(CROSSTALK)
CHARLIE ROSE: Right.
BARACK OBAMA: -- penetrating that and they try to get that information. There’s a big difference between that and a hacker directly connected with the Chinese government or the Chinese military breaking into Apple’s software systems to see if they can obtain the designs for the latest Apple product. That’s theft. And we can’t tolerate that.
And so we’ve had very blunt conversations about this. They understand, I think, that this can adversely affect the fundamentals of the U.S./China relationship. We don’t consider this a side note in our conversations. We think this is central in part because our economic relationship is going to continue to be premised on the fact that the United States is the world’s innovator. We have the greatest R&D. We have the greatest entrepreneurial culture.
Our value added is at the top of the value chain and if countries like China are stealing that that affects our long-term prosperity in a serious way.
This is an amazing development for someone aware of the history of this issue. President Obama is exactly right concerning the differences between espionage, practiced by all nations since the beginning of time, and massive industrial theft by China against the developed world, which the United States, at least, will not tolerate. I am so pleased that this issue is at the top of the agenda between the US and China and that the President and his team, as well as Congress, are taking it so seriously.
Thursday, June 13, 2013
Pre-Order The Practice of Network Security Monitoring Before Price Hike
When my publisher and I planned and priced my new book The Practice of Network Security Monitoring, we assumed the book would be about 250 pages. As we conclude the copyediting process and put print in layout format, it's clear the book will be well over 300. The current estimate is 328, but I think it could approach 350 pages.
Because of the much larger page count, the publisher and I agreed to reprice the book. The price will rise from the current list of $39.95 for paperback and $31.95 for ebook to $49.95 for paperback and $39.95 for ebook.
However, those prices will not go into effect until next Friday, June 21st. That means if you preorder at the NoStarch.com Web site before next Friday, you will get the current lower prices. Furthermore, use preorder code NSM101 to save 30% off list. If you use NSM101 as your discount code it shows No Starch that you got word of this from me.
Those of you who already preordered have already taken advantage of this deal. Thanks for your orders!
We're still on track for publication by July 22, in time for books on hand at my new Network Security Monitoring 101 class in Las Vegas. Seats for the two editions of the class (weekend and weekday) continue to fill.
If you live in Europe or the Middle East or Africa, you may want to attend my new class in Istanbul in September. I hope the protestors and government can manage their differences in time for this great new Black Hat event!
Monday, April 29, 2013
Practice of Network Security Monitoring Table of Contents
Since many of you have asked, I wanted to provide an updated Table of Contents for my upcoming book, The Practice of Network Security Monitoring. The TOC has only solidified in the last day or so. I delayed responding until I completed all of the text, which I did this weekend.
You can preorder the book through No Starch. Please consider using the discount code NSM101 to save 30%.
I'm still on track to publish by July 22, 2013, in time to teach two sessions of my new course, Network Security Monitoring 101, in Las Vegas. I'll be using the new book's themes for inspiration but will likely have to rebuild all the labs.
I expect the book to approach the 350 page mark, exceeding my initial estimates for 256 pages and 7 chapters. Here's the latest Table of Contents.
- Part I, “Getting Started,” introduces NSM and how to think about sensor placement.
- Chapter 1, “NSM Rationale,” explains why NSM matters, to help you gain the support needed to deploy NSM in your environment.
- Chapter 2, “Collecting Network Traffic: Access, Storage, and Management,” addresses the challenges and solutions surrounding physical access to network traffic.
- Part II, “Security Onion Deployment,” focuses on installing SO on hardware, and configuring SO effectively.
- Chapter 3, “Stand-alone Deployment,” introduces SO, and explains how to install the software on spare hardware to gain initial NSM capability at low or no cost.
- Chapter 4, “Distributed Deployment,” extends Chapter 3 to describe how to install a dispersed SO system.
- Chapter 5, “SO Housekeeping,” discusses maintenance activities for keeping your SO installation running smoothly.
- Part III, “Tools,” describes key software shipped with SO, and how to use these applications.
- Chapter 6, “Command Line Packet Analysis Tools,” explains the key features of Tcpdump, Tshark, Dumpcap, and Argus in SO.
- Chapter 7, “Graphical Packet Analysis Tools,” adds GUI-based software to the mix, describing Wireshark, Xplico, and NetworkMiner.
- Chapter 8, “Consoles,” shows how NSM suites like Sguil, Squert, Snorby, and ELSA enable detection and response workflows.
- Part IV, “NSM in Action,” discusses how to use NSM processes and data to detect and respond to intrusions.
- Chapter 9, “Collection, Analysis, Escalation, and Resolution,” shares my experience building and leading a global Computer Incident Response Team (CIRT).
- Chapter 10, “Server-Side Compromise,” is the first NSM case study, wherein you’ll learn how to apply NSM principles to identify and validate the compromise of an Internet-facing application.
- Chapter 11, “Client-Side Compromise,” is the second NSM case study, offering an example of a user being victimized by a client-side attack.
- Chapter 12, “Extending SO,” covers tools and techniques to expand SO’s capabilities.
- Chapter 13, “Proxies and Checksums,” concludes the main text by addressing two challenges to conducting NSM.
- The Conclusion offers a few thoughts on the future of NSM, especially with respect to cloud environments and workflows.
- Appendix A, “Security Onion Scripts and Configuration,” includes information from SO developer Doug Burks on core SO configuration files and control scripts.
I hope you enjoy the book and consider the new class! If you have comments or questions, please post them here on via @taosecurity.
Sunday, April 21, 2013
Bejtlich Teaching New Class at Black Hat in July
I'm pleased to announce I will teach two sessions of a brand-new two day class at Black Hat USA 2013 this summer. The new class is Network Security Monitoring 101. From the overview:
Is your network safe from intruders? Do you know how to find out? Do you know what to do when you learn the truth? If you are a beginner, and need answers to these questions, Network Security Monitoring 101 (NSM101) is the newest Black Hat course for you.
This vendor-neutral, open source software-friendly, reality-driven two-day event will teach students the investigative mindset not found in classes that focus solely on tools. NSM101 is hands-on, lab-centric, and grounded in the latest strategies and tactics that work against adversaries like organized criminals, opportunistic intruders, and advanced persistent threats.
Best of all, this class is designed *for beginners*: all you need is a desire to learn and a laptop ready to run a few virtual machines.
Instructor Richard Bejtlich has taught over 1,000 Black Hat students since 2002, and this brand new, 101-level course will guide you into the world of Network Security Monitoring.
Black Hat has three remaining price points and deadlines for registration.
- "Regular" ends 31 May
- "Late" ends 24 July
- "Onsite" starts at the conference
Seats are filling -- it pays to register early!
If you have any questions about the class, please leave a comment here or contact me via Twitter at @taosecurity. Thank you.
I'm also talking with Black Hat about teaching at their Istanbul and Seattle events later this year.
Saturday, March 2, 2013
Mandiant APT1 Report: 25 Best Commentaries of the Last 12 Days
In the twelve days that followed publication on the evening of Monday the 18th, I've been very pleased by the amount of constructive commentary and related research published online.
In this post I'd like to list those contributions that I believe merit attention, in the event you missed them the first time around.
These sorts of posts are examples of what the security community can do to advance our collective capability to counter digital threats.
Please note I avoided mass media accounts, interviews with Mandiant team members, and most general commentary.
They are listed in no particular order.
- Seth Hall (Bro): Watching for the APT1 Intelligence
- Jason Wood (SecureIdeas): Reading the Mandiant APT1 Report
- Chris Sanders: Making the Mandiant APT1 Report Actionable
- Symantec: APT1: Q&A on Attacks by the Comment Crew
- Tekdefense (NoVA Infosec): MASTIFF Analysis of APT1
- Chort Row (@chort0): Analyzing APT1 with Cuckoobox, Volatility, and Yara
- Ron Gula (Tenable): We have Microsoft Tuesday, so how long until we have Indicator Wednesday?
- OpenDNS Umbrella Labs:An intimate look at APT1, China’s Cyber-Espionage Threat
- Chris Lew (Mandiant): Chinese Advanced Persistent Threats: Corporate Cyber Espionage Processes and Organizations (BSidesSF, slides not online yet)
- Adam Segal: Hacking back, signaling, and state-society relations
- Snorby Labs: APT Intelligence Update
- Wendy Nather: Exercises left to the reader
- Brad Shoop (Mandiant): Mandiant’s APT1 Domain/MD5 Intel and Security Onion for Splunk
- Brad Shoop (Mandiant): Mandiant’s APT1 Domain/MD5 Intel and Security Onion with ELSA
- Kevin Wilcox: NSM With Bro-IDS Part 5: In-house Modules to Leverage Outside Threat Intelligence
- Cyb3rsleuth: Chinese Threat Actor Part 5
- David Bianco: The Pyramid of Pain
- Wesley McGrew: Mapping of Mandiant APT1 malware names to available samples
- Russ McRee: Toolsmith: Redline, APT1, and you – we’re all owned
- Jaime Blasco ( AlienVault Labs): Yara rules for APT1/Comment Crew malware arsenal
- Brandon Dixon: Mandiant APT2 Report Lure
- Seculert: Spear-Phishing with Mandiant APT Report
- PhishMe: How PhishMe addresses the top attack method cited in Mandiant’s APT1 report
- Rich Mogull (Securosis): Why China's Hacking is Different
- China Digital Times: Netizens Gather Further Evidence of PLA Hacking
M-Unition (Mandiant) published Netizen Research Bolsters APT1 Attribution.
I'd also like to cite Verizon for their comments and mention of IOCExtractor and Symantec for publishing their indicators via Pastebin after I asked about it.
Thank you to those who took the time to share what you found when analyzing related APT1 data, or when showing how to use APT1 indicators to do detection and response.