tag:blogger.com,1999:blog-4088979.post3894484891709021222..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: Traffic Talk 3 PostedRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger4125tag:blogger.com,1999:blog-4088979.post-64880470666356816152008-12-19T23:59:00.000-05:002008-12-19T23:59:00.000-05:00A very excellent Traffic Talk, probably my favorit...A very excellent Traffic Talk, probably my favorite so far. I particularly enjoyed your hypothesis on importance because that is one aspect of using NSM data that I had never really considered before. Thanks.<BR/><BR/>@Chris Beuchler:<BR/>I have used Arpwatch on local network segments with much success and if you are performing NSM and already collecting full-content or session data, it is trivial to run on your sensor.testhttps://www.blogger.com/profile/17843773704349620940noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-41278710963412341312008-12-19T22:13:00.000-05:002008-12-19T22:13:00.000-05:00One discovery method you didn't note is ARP scanni...One discovery method you didn't note is ARP scanning. That will get most firewalled hosts unless they have a modified network stack that won't respond to ARP queries. <BR/><BR/>Granted that's very difficult in large scale networks since you need a box on each broadcast domain, or to interact with something on each broadcast domain. But when looking at a single subnet, that's something I always like to use as part of a more comprehensive strategy. arping is one such tool<BR/>http://www.habets.pp.se/synscan/programs.php?prog=arpingChris Buechlerhttps://www.blogger.com/profile/14915136057838042206noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-32547343541064213162008-12-19T08:03:00.000-05:002008-12-19T08:03:00.000-05:00...what's actually out there, which systems are cr...<I>...what's actually out there, which systems are crucial, which systems hold sensitive data...</I><BR/><BR/>ugh, how true. As an incident responder, I see this all the time...lack of network awareness, lack of knowledge as to where sensitive data is processed (or at rest). So far, most folks want to see some kind of new-fangled, high-speed <I>thing</I> as "best practices", because for some reason they just don't get it that it's all about getting back to the basics.<BR/><BR/>How many times have I worked with a customer who swore to me that the sensitive data on a system was encrypted, only for me to find that either (a) it wasn't, or (b) there was other sensitive data on the system that wasn't encrypted?<BR/><BR/>The big driver towards all this is now regulatory and legislative requirements. Visa PCI. NCUA. HIPAA. State notification laws. Some of these imply the need for network knowledge and response, others come right out and say it!H. Carveyhttps://www.blogger.com/profile/08966595734678290320noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-18467427195270249432008-12-18T09:47:00.000-05:002008-12-18T09:47:00.000-05:00Hmmm. Marcus comments could not be any more true. ...Hmmm. Marcus comments could not be any more true. Definitely words for any network owner to adhere to.<BR/><BR/>Know your network.<BR/><BR/>My recent professional experience with large scale (>100,000 hosts) environments that were plagued with persistent intruders lead me to write a document describing the solution, at least a method of deterrence. I was almost disappointed after putting all my experience together, researching cutting edge technology to address weaknesses and organizing a fabulous deliverable. In the end, 30+ plus pages were basically summed up in one phrase - Get Back to Basics, Security 101.<BR/><BR/>Well said Marcus. Richard, thanks for getting these thoughts some publicity.Ken Bradleyhttps://www.blogger.com/profile/02333524184482740445noreply@blogger.com