Web Applications Forensics
Web Applications Forensics
Log Analytics,
Monitoring,
WAF/IDS
Forensics
Automated
● ModSecurity Web Log ● Piwik
● OWASP AppSensor Forensics ● AWstats
● PHPIDS ● GoAccess
● ... ● Splunk
● PyFlag
● ...
● Signatures: [ADD00]
● RegEx: [MC08], [Hei08], [Fry11]
Array of URL
query values → → Result
De-Obfuscation, Centrifuge Magic, RegEx Matching
Basic Statistics
● Length: [KV03]
● Char Distribution: [KV03], [WS04]
P=
_____
μ|special chars|
|special chars|
● Session Identification
● Types of Sessions
→ Random Scan? (least dangerous)
→ Targeted Scan? (more dangerous)
→ Human Attacker? (most dangerous)
● Related to Robot Detection Techniques
Man-machine distinction
Geomapping Visitors and Attacks
DNSBL Information
● Attack-based
→ Training Data Poisoning: Mitigation of learning-based Detection
→ Payload Obfuscation (urlencode, UTF-7 Entities, JS Unicode, ...)
→ Use Attack Vectors not logged or not visible (POST, DOM-XSS)
→ Hide attack flow in various, separate Steps or in Mass of „Noise“
● Logfile-based
→ Manipulation of Log Files (got r00t?)
→ Denial of Service Log Server (or send 0x1A to Apache 1.3)
→ Log Flooding: reach End of Disk or overwrite Logs (Rotation)
Thanks for your Attention...
Source Code
● LORG („Logfile Outlier Recognition and Gathering“)
http://github.com/jensvoid/lorg (GPL2; pre-alpha PoC!)
Questions?