Red ELK
Red ELK
Marc Smeets
SANS HackFest – June 2020
ABOUT YOUR SPEAKER
Outflank
• Boutique Red Teaming firm in The Netherlands, founded in 2016
• Strong advocates of the TIBER framework
• Sharing knowledge via:
• IT security trainings
• https://outflank.nl/blog
• https://github.com/OutflankNL
www.outflank.nl 1
www.outflank.nl
OFFENSIVE INFRA – GENERIC OVERVIEW
Decoy
SMB
Delivery,
tracking, etc
HTTP(S)
Corporate
Proxy Command
DNS and control
servers
Flexible
Disposable
DNS Server Resilient
OFFENSIVE INFRA – TYPICAL SETUP FOR 1 OPERATION
www.outflank.nl 4
OFFENSIVE INFRA – TYPICAL CHALLENGES
Oversight Insight
www.outflank.nl 5
TOOLING -> REDELK
+ =
https://github.com/outflanknl/RedELK/
https://outflank.nl/blog/2019/02/14/introducing-redelk-part-1-why-we-need-it/
https://outflank.nl/blog/2020/02/28/redelk-part-2-getting-you-up-and-running/
www.outflank.nl https://outflank.nl/blog/2020/04/07/redelk-part-3-achieving-operational-oversight/ 6
Redirectors / 1st line infra Reverse proxy
C2 servers
Domain fronts C2
Websites traffic
Tracking pixels
…
www.outflank.nl 10
REDIRECTOR TRAFFIC
www.outflank.nl
C2 LOGS– HISTORIC SEARCHING
www.outflank.nl
C2 SCREENSHOTS
www.outflank.nl
ALL IOCS
www.outflank.nl
INDICATORS
ONLINE SERVICES
HASH OF MALWARE
www.outflank.nl
HASH OF MALWARE
www.outflank.nl
SANDBOX CONNECTIONS
www.outflank.nl
INDICATORS
TRAFFIC TO OFFENSIVE INFRASTRUCTURE
ANALYST TRAFFIC
www.outflank.nl
PREVIEWS BY MESSAGING APPS
www.outflank.nl
INDICATORS
TARGET INTERNAL CHECKS
KRBTGT RESET
www.outflank.nl
PASSWORD RESET OF SPECIFIC ACCOUNTS
www.outflank.nl
INDICATORS OF ANALYSES / INVESTIGATION / DETECTION
TYPE OF CHECK DETAIL
Analyst traffic : traffic from analyst, e.g. TOR IP, curl, other URIs
Sec Vendor traffic : security vendor visits our infra – each with own
characteristics
Instant Messaging : ‘previews’ of Instant Messaging clients
Planning
• RedELK server is intended per operation. Do not mix clients.
• Stores high confidential data.
• 3 components: RedELK server, c2server, redirector
• Identifiers used for Attack Scenario and Component Name
• Requires modified logging by redirector, e.g. Apache or HAProxy
• Read the docs: wiki on Github and blog post series
Installation
• Get latest release at Github. Or YOLO try master or maindev branch.
• Modify config file and run ./initial-setup.sh certs/config.cnf
• Run installers for redirs, c2servers and main RedELK server
• Post installation edits (/etc/redelk/* and /etc/cron.d/redelk)
www.outflank.nl 27
SUPPORT AND ROADMAP
Version 1
• Main focus on oversight, help the RT operator with his workflow
• Alarms for basic checks
• Support for Cobalt Strike C2
• Support for HAProxy and Apache redirectors
Many people/firms reaching out with support: happy to give back to the
community
www.outflank.nl 29
SUMMARY
https://github.com/OutflankNL/RedELK
https://outflank.nl/blog/
www.outflank.nl 30
Marc Smeets
+31 6 5136 6680
[email protected]
www.outflank.nl/marc
@MarcOverIP