Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ AgentSmith-HIDS - Open Source Host-based Intrusion Detection System (HIDS)

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š AgentSmith-HIDS - Open Source Host-based Intrusion Detection System (HIDS)


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


Technically, AgentSmith-HIDS is not a Host-based Intrusion Detection System (HIDS) due to lack of rule engine and detection function. However, it can be used as a high performance 'Host Information Collect Agent' as part of your own HIDS solution. The comprehensiveness of information which can be collected by this agent was one of the most important metrics during developing this project, hence it was built to function in the kernel stack and achieve huge advantage comparing to those function in user stack, such as:
  • Better performance, Information needed are collected in kernel stack to avoid additional supplement actions such as traversal of '/proc'; and to enhance the performance of data transportation, data collected is transferred via shared ram instead of netlink.
  • Hard to be bypassed, Information collection was powered by specifically designed kernel drive, makes it almost impossible to bypass the detection for malicious software like rootkit, which can deliberately hide themselves.
  • Easy to be integrated๏ผŒThe AgentSmith-HIDS was built to integrate with other applications and can be used not only as security tool but also a good monitoring tool, or even a good detector of your assets. The agent is capable of collecting the users, files, processes and internet connections for you, so let's imagine when you integrate it with CMDB, you could get a comprehensive map consists of your network, host, container and business (even dependencies). What if you also have a Database audit tool at hand? The map can be extended to contain the relationship between your DB, DB User, tables, fields, applications, network, host and containers etc. Thinking of the possibility of integration with network intrusion detection system and/or threat intelligence etc., higher traceability could also be achieved. It just never gets old.
  • Kernel stack + User stack๏ผŒAgentSmith-HIDS also provide user stack module, to further extend the functionality when working with kernel stack module.

Major abilities of AgentSmith-HIDS๏ผš
  • Kernel stack module hooks execve, connect, process inject, create file, DNS query, load LKM behaviors via Kprobe๏ผŒand is also capable of monitoring containers by being compatible with Linux namespace.
  • User stack module utilize built in detection functions including queries of User List๏ผŒListening ports list๏ผŒSystem RPM list๏ผŒSchedule jobs
  • AntiRootkit๏ผŒFrom: Tyton ,for now add PROC_FILE_HOOK๏ผŒSYSCALL_HOOK๏ผŒLKM_HIDDEN๏ผŒINTERRUPTS_HOOK feature๏ผŒbut only wark on Kernel > 3.10.
  • Cred Change monitoring (sudo/su/sshd except)

About the compatibility with Kernel version
  • Kernel > 2.6.25
  • AntiRootKit > 3.10

About the compatibility with Containers
Source Nodename
Host hostname
Docker container name
k8s pod name

Composition of AgentSmith-HIDS
  • Kernel stack module (LKM) Hook key functions via Kprobe to capture information needed.
  • User stack module Collect data capatured by kernel stack module, perform necessary process and send it to Kafka; Keep sending heartbeat packet to server so process integrity can be identitied; Execute commands received from server.
  • Agent Server(Optional) Send commands to user stack module and monitoring the status of user stack module.

Execve Hook
Achieved by hooking sys_execve()/sys_execveat(), example:
{
"uid":"0",
"data_type":"59",
"run_path":"/root/AgentSmith-HIDS/agent/target/release",
"exe":"/usr/bin/ls",
"argv":"ls --color=auto --indicator-style=classify ",
"pid":"6265",
"ppid":"1941",
"pgid":"6265",
"tgid":"6265",
"comm":"fish",
"nodename":"test",
"stdin":"/dev/pts/0",
"stdout":"/dev/pts/0",
"sessionid":"1",
"user":"root",
"time":"1575721900051",
"local_ip":"192.168.165.153",
"hostname":"test",
"exe_md5":"a0c32dd6d3bc4d364380e2e65fe9ac64"
}

Connect Hook
Achieved by hooking sys_connect(), example:
{
"uid":"0",
"data_type":"42",
"sa_family":"4",
"fd":"4",
"dport":"1025",
"dip":"180.101.49.11",
"exe":"/usr/bin/ping",
"pid":"6294",
"ppid":"1941",
"pgid":"6294",
"tgid":"6294",
"comm":"ping",
"nodename":"test",
"sip":"192.168.165.153",
"sport":"45524",
"res":"0",
"sessionid":"1",
"user":"root",
"time":"1575721921240",
"local_ip":"192.168.165.153",
"hostname":"test",
"exe_md5":"735ae70b4ceb8707acc40bc5a3d06e04"
}

DNS Query Hook
Achieved by hooking sys_recvfrom(), example:
{
"uid":"0",
"data_type":"601",
"sa_family":"4",
"fd":"4",
"sport":"53",
"sip":"192.168.165.2",
"exe":"/usr/bin/ping",
"pid":"6294",
"ppid":"1941",
"pgid":"6294",
"tgid":"6294",
"comm":"ping",
"nodename":"test",
"dip":"192.168.165.153",
"dport":"53178",
"qr":"1",
"opcode":"0",
"rcode":"0",
"query":"www.baidu.com",
"sessionid":"1",
"user":"root",
"time":"1575721921240",
"local_ip":"192.168.165.153",
"hostname":"test",
"exe_md5":"39c45487a85e26ce5755a893f7e88293"
}

Create File Hook
Achieved by hooking security_inode_create(), example:
{
"uid":"0",
"data_type":"602",
"exe":"/usr/lib/jvm/java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.x86_64/jre/bin/java",
"file_path":"/tmp/kafka-logs/replication-offset-checkpoint.tmp",
"pid":"3341",
"ppid":"1",
"pgid":"2657",
"tgid":"2659",
"comm":"kafka-scheduler",
"nodename":"test",
"sessionid":"3",
"user":"root",
"time":"1575721984257",
"local_ip":"192.168.165.153",
"hostname":"test",
"exe_md5":"215be70a38c3a2e14e09d637c85d5311",
"create_file_md5":"d41d8cd98f00b204e9800998ecf8427e"
}

Process Inject Hook
Achieved by hooking sys_ptrace(), example:
{
"uid":"0",
"data_type":"101",
"ptrace_request":"4",
"target_pid":"7402",
"addr":"00007ffe13011ee6",
"data":"-a",
"exe":"/root/ptrace/ptrace",
"pid":"7401",
"ppid":"1941",
"pgid":"7401",
"tgid":"7401",
"comm":"ptrace",
"nodename":"test",
"sessionid":"1",
"user":"root",
"time":"1575722717065",
"local_ip":"192.168.165.153",
"hostname":"test",
"exe_md5":"863293f9fcf1af7afe5797a4b6b7aa0a"
}

Load LKM File Hook
Achieved by hooking load_module(), example:
{
"uid":"0",
"data_type":"603",
"exe":"/usr/bin/kmod",
"lkm_file":"/root/ptrace/ptrace",
"pid":"29461",
"ppid":"9766",
"pgid":"29461",
"tgid":"29461",
"comm":"insmod",
"nodename":"test",
"sessionid":"13",
"user":"root",
"time":"1577212873791",
"local_ip":"192.168.165.152",
"hostname":"test",
"exe_md5":"0010433ab9105d666b044779f36d6d1e",
"load_file_md5":"863293f9fcf1af7afe5797a4b6b7aa0a"
}

Cred Change Hook
Achieved by Hook commit_creds()๏ผŒexample๏ผš
{
"uid":"0",
"data_type":"604",
"exe":"/tmp/tt",
"pid":"27737",
"ppid":"26865",
"pgid":"27737",
"tgid":"27737",
"comm":"tt",
"old_uid":"1000",
"nodename":"test",
"sessionid":"42",
"user":"root",
"time":"1578396197131",
"local_ip":"192.168.165.152",
"hostname":"test",
"exe_md5":"d99a695d2dc4b5099383f30964689c55"
}

PROC File Hook Alert
{
"uid":"-1",
"data_type":"700",
"module_name":"autoipv6",
"hidden":"0",
"time":"1578384987766",
"local_ip":"192.168.165.152",
"hostname":"test"
}

Syscall Hook Alert
{
"uid":"-1",
"data_type":"701",
"module_name":"diamorphine",
"hidden":"1",
"syscall_number":"78",
"time":"1578384927606",
"local_ip":"192.168.165.152",
"hostname":"test"
}

LKM Hidden Alert
{
"uid":"-1",
"data_type":"702",
"module_name":"diamorphine",
"hidden":"1",
"time":"1578384927606",
"local_ip":"192.168.165.152",
"hostname":"test"
}

Interrupts Hook Alert
{
"uid":"-1",
"data_type":"703",
"module_name":"syshook",
"hidden":"1",
"interrupt_number":"2",
"time":"1578384927606",
"local_ip":"192.168.165.152",
"hostname":"test"
}

About Performance of AgentSmith-HIDS
Testing Environment:
CPU Intel(R) Core(TM) i7-4870HQ CPU @ 2.50GHz 2 Core
RAM 2GB
OS/Kernel Centos7 / 3.10.0-1062.7.1.el7.x86_64
Testing Result:
Hook Handler Average Delay(us)
execve_entry_handler 10.4
connect_handler 7.5
connect_entry_handler 0.06
recvfrom_handler 9.2
recvfrom_entry_handler 0.17
fsnotify_post_handler 0.07
Original Testing Data:
Benchmark Data

Documents for deployment and testing purpose:
Quick Start

Special Thanks(Not in order)
yuzunzhi
hapood
HF-Daniel

...



๐Ÿ“Œ Ang mga umuusbong na Uso para sa Intrusion Detection System / Intrusion Prevention System ...


๐Ÿ“ˆ 49.45 Punkte

๐Ÿ“Œ Intrusion Detection System / Intrusion Prevention System (IDS / IPS)-Markt Wichtige Trends bei ...


๐Ÿ“ˆ 49.45 Punkte

๐Ÿ“Œ AgentSmith-HIDS - Open Source Host-based Intrusion Detection System (HIDS)


๐Ÿ“ˆ 48.04 Punkte

๐Ÿ“Œ Auswirkungen von Coronavirus auf den globalen Markt fรผr Intrusion Detection-Systeme / Intrusion ...


๐Ÿ“ˆ 40.4 Punkte

๐Ÿ“Œ Neueste umfassende Intrusion Detection-Systeme / Intrusion Prevention-Systeme (IDS / IPS ...


๐Ÿ“ˆ 40.4 Punkte

๐Ÿ“Œ A Deep Dive Into the Role Played by a Host Intrusion Detection System


๐Ÿ“ˆ 39.07 Punkte

๐Ÿ“Œ Intrusion Detection Honeypots: Detection Through Deception - Chris Sanders - PSW #668


๐Ÿ“ˆ 33.43 Punkte

๐Ÿ“Œ CORRECTING and REPLACING INTRUSION Begins Beta Testing of Cybersecurity Solution for Enterprises and SMBs, INTRUSION Shield


๐Ÿ“ˆ 31.59 Punkte

๐Ÿ“Œ Taking Host Intrusion Prevention System (HIPS) Apart


๐Ÿ“ˆ 30.25 Punkte

๐Ÿ“Œ Applying Machine Learning to Improve Your Intrusion Detection System


๐Ÿ“ˆ 29.13 Punkte

๐Ÿ“Œ Applying Machine Learning to Improve Your Intrusion Detection System


๐Ÿ“ˆ 29.13 Punkte

๐Ÿ“Œ Was ist ein Intrusion Detection System (IDS)?


๐Ÿ“ˆ 29.13 Punkte

๐Ÿ“Œ Snort โ€“ Free Network Intrusion Detection & Prevention System


๐Ÿ“ˆ 29.13 Punkte

๐Ÿ“Œ Snort โ€“ Free Network Intrusion Detection & Prevention System


๐Ÿ“ˆ 29.13 Punkte

๐Ÿ“Œ Perimeter Intrusion Detection System


๐Ÿ“ˆ 29.13 Punkte

๐Ÿ“Œ A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets


๐Ÿ“ˆ 29.13 Punkte

๐Ÿ“Œ Cisco Intrusion Detection System up to 4.1(5c) SSLv2 HELLO denial of service


๐Ÿ“ˆ 29.13 Punkte

๐Ÿ“Œ What is an Intrusion Detection System (IDS)? + Best IDS Tools | UpGuard


๐Ÿ“ˆ 29.13 Punkte

๐Ÿ“Œ Intrusion Detection System (IDS) And Its Detailed Working Function -SOC/SIEM


๐Ÿ“ˆ 29.13 Punkte

๐Ÿ“Œ Intrusion Detection System (IDS) and Its Detailed Working Function โ€“ SOC/SIEM


๐Ÿ“ˆ 29.13 Punkte

๐Ÿ“Œ Snort Intrusion Detection System (IDS) for Hackers, Part 1: Installing Snort


๐Ÿ“ˆ 29.13 Punkte

๐Ÿ“Œ Intrusion Detection System (IDS) โ€“ A Detailed Guide & Working Function -SOC/SIEM


๐Ÿ“ˆ 29.13 Punkte

๐Ÿ“Œ AIEngine โ€“ AI-driven Network Intrusion Detection System


๐Ÿ“ˆ 29.13 Punkte

๐Ÿ“Œ How an Intrusion Detection System Can Save Your Business


๐Ÿ“ˆ 29.13 Punkte

๐Ÿ“Œ Pinacolada - Wireless Intrusion Detection System For Hak5's WiFi Coconut


๐Ÿ“ˆ 29.13 Punkte

๐Ÿ“Œ Karma IDS: An Intrusion Detection System using eBPF and LSTM


๐Ÿ“ˆ 29.13 Punkte

๐Ÿ“Œ Vuln: McAfee Host Intrusion Prevention Services CVE-2016-8007 Local Authentication Bypass Vulnerability


๐Ÿ“ˆ 25.73 Punkte

๐Ÿ“Œ Vuln: McAfee Host Intrusion Prevention Services CVE-2016-8007 Local Authentication Bypass Vulnerability


๐Ÿ“ˆ 25.73 Punkte

๐Ÿ“Œ Intel McAfee Host Intrusion Prevention Services up to 8.0 Patch 7 Registry Key privilege escalation


๐Ÿ“ˆ 25.73 Punkte

๐Ÿ“Œ Intel McAfee Host Intrusion Prevention Services bis 8.0 Patch 7 Registry Key erweiterte Rechte


๐Ÿ“ˆ 25.73 Punkte

๐Ÿ“Œ Explained! Intrusion Detection Systems


๐Ÿ“ˆ 24.61 Punkte

๐Ÿ“Œ Explained! Intrusion Detection Systems


๐Ÿ“ˆ 24.61 Punkte

๐Ÿ“Œ Intrusion-Detection und -Prevention-Systeme


๐Ÿ“ˆ 24.61 Punkte

๐Ÿ“Œ Nchop - A TCP Session Splicing Tool Used to Rvade Intrusion Detection Systems


๐Ÿ“ˆ 24.61 Punkte

๐Ÿ“Œ A Lab on Snort and Intrusion Detection using Ubuntu


๐Ÿ“ˆ 24.61 Punkte











matomo