Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Deep Infrastructure Visibility with Osquery and...

Deep Infrastructure Visibility with Osquery and Fleet

From my Defcon 27 workshop at Blue Team Village

https://www.dactiv.llc/blog/defcon-deep-infrastructure-visibility/

Zach Wasserman

August 09, 2019
Tweet

More Decks by Zach Wasserman

Other Decks in Programming

Transcript

  1. Your Instructor Core osquery contributor since its inception in 2014

    Created Fleet as a cofounder of Kolide from 2016-2019 Currently consulting on osquery/Fleet deployments as well as Golang development [email protected] -- @TheZachW
  2. Prepare for Interactivity It will be convenient to install osquery

    locally: osquery.io/downloads Want a fresh Ubuntu box to play on (osquery included)?
 $ vagrant init zwass/ubuntu-osquery
 $ vagrant up
 $ vagrant ssh default Also unzip the fleetctl binary from github.com/kolide/ fleet/releases/latest
  3. Motivations Sysadmins and security folks have a huge number of

    sources for the data relevant to their operations and decision-making. How can we reliably access this data to get an understanding of the system state in the present moment, and as it changes over time?
  4. Background Open-sourced by Facebook in 2014. Now a community- supported

    project of the Linux Foundation. 5,063+ commits, 270+ contributors, 14,439+ stars on Github (github.com/osquery/osquery) Apache 2.0 License osquery.io Running on millions of hosts across hundreds of companies
  5. Goals First class support for macOS/Linux (more recently, Windows) Enable

    non-developers to access and aggregate data across disparate sources Performance/reliability to deploy across corporate and production infrastructure
  6. Unified API Flat files (/etc/hosts, /etc/crontab, ~/.ssh/known_hosts, etc.) SQLite files

    (/var/db/SystemPolicy [GateKeeper configuration], etc.) System APIs (Apple System Log, Keychain, SMC, CoreFoundation, etc.) Application APIs (Docker, Carbon Black, etc.) Event-based APIs (FSEvents, OpenBSM, etc.) Filesystem (Shared folders, file hashes, permissions, etc.) Plists (/Library/Managed\ Installs/* [Munki data], etc.)
 ... All available under the same SQL interface
  7. osqueryi osqueryi is the interactive shell. Use osqueryi to test

    queries on a local machine, or log on to another host via SSH to use osqueryi there. Integrate osqueryi into scripting pipelines.
  8. Basic SQL SELECT from a table to retrieve the results:

    SELECT * FROM users; SELECT * FROM crontab; SELECT * FROM processes;
  9. Exercise: Finding tables Use the schema documentation on https://osquery.io/schema to

    find the tables for retrieving the following data: 1. /etc/hosts file on POSIX systems 2. State of the macOS firewall 3. Trusted certificates 4. Hashes for files on the filesystem 5. Linux kernel modules 6. Disk encryption (separate tables for macOS/Linux and Windows)
  10. SQL: Filtering columns Filter which columns are returned from a

    query using the SELECT clause: SELECT * -- Return all of the columns. SELECT a, b -- Only return columns a and b. SELECT user_time + system_time -- Create derived expressions using data from the columns. SELECT user_time + system_time AS total_time -- Rename columns to make results easier to interpret.
  11. SQL: Filtering rows Filter which rows are returned from the

    query using the WHERE clause: WHERE a = 'foo' -- Return rows with column a equal to 'foo'. WHERE port < 1024 -- Return rows relating to ports in the protected range (below 1024). WHERE name LIKE '%malware%' -- Wildcard matching
  12. Wildcard matching with LIKE LIKE allows fuzzy string matching ASCII

    characters match the exact character (case insensitive) % matches any sequence of zero or more characters _ matches any single character Example: SELECT 'operator' LIKE '%per%'; -> 1 (true) SELECT 'canvas' LIKE '%per%'; -> 0 (false) When used in contexts where file paths are expected, the % symbol behaves similar to the * symbol in shell globbing.
  13. Exercise: LIKE operator 1. Find a LIKE string that matches

    all of the following: A. ‘a.out’, ‘/bin/a.out’, ‘/usr/zwass/a.out' B. ’/usr/local/lib’, ‘/usr/lib’, ‘usr/lib’, ‘/usr/zwass/lib’ 2. Write a query that finds all processes running with binaries in /bin 3. Write a query that finds only processes with binaries not in /bin, /usr, or / sbin
  14. SQL: Presentation ORDER and LIMIT clauses allow us to modify

    the presentation of the results. SELECT * FROM processes ORDER BY pid LIMIT 3 -- Return results for the 3 processes with lowest pid In osquery, this does not typically reduce the number of results that are generated, so it does not optimize performance of the running query.
  15. SQL: JOINs Use the JOIN syntax to combine data from

    multiple tables: SELECT * FROM processes JOIN users USING (uid) -- Retrieve the users associated with the processes by correlating with the uid Multiple JOINs can be combined to get results from an arbitrary number of tables.
  16. Exercise: JOINs 1. Write a query to get processes along

    with the open files for that process. 2. Write a query to get processes along with the hashes of the binary for that process.
  17. SQL: Learning More Osquery SQL is just SQLite! Utilize SQLite

    resources and tutorials to learn to write better SQL. www.sqlite.org/lang_select.html
  18. osqueryd: Introduction Schedule queries to get continuous results. Differential engine

    provides visibility into changes of state over time (possible to greatly reduce log volume). Event-based tables ensure that data is not lost even when queries run on an interval.
  19. osqueryd: Schedule Osquery will run the provided queries at their

    scheduled intervals. Note that intervals only "tick" when the process is running. Two logging modes for varying purposes: Differential: Log only changes to rows since last run of the query (optionally skip logging removed rows). Snapshot: Log all rows each time the query runs. Use differential if you want to see how state changes over time. Requires multiple logs to get state at a given time. Use snapshot if you need the full state of the host when the query runs. This typically generates much higher throughput!
  20. osqueryd: Packs Packs provide a mechanism for logically grouping, sharing

    and configuring scheduled queries. Discovery queries — Gate execution of packs based on whether a set of queries return results. Query results for packs are all prefixed with the pack name. We can load packs from filesystem directories separate from the osquery config. github.com/osquery/osquery/tree/master/packs for examples
  21. osqueryd: Packs "packs": { "internal_stuff": { "discovery": [ "SELECT pid

    FROM processes WHERE name = 'ldap';" ], "platform": "linux", "version": "1.5.2", "queries": { "active_directory": { "query": "SELECT * FROM ad_config;", "interval": "1200", } ...
  22. osqueryd: Decorators Decorators allow us to define queries that will

    add data to every log line. Decorator queries should return only a single row. Three decorator types: load: Run when the configuration is loaded always: Run every time a scheduled query runs interval: Update the query on the specified interval
  23. osqueryd: Decorators { "decorators": { "load": { "query": "SELECT version

    FROM osquery_info”, }, "interval": { "3600": [“SELECT uptime FROM uptime”] } } }
  24. osqueryd: Events What happens when system state changes between runs

    of a query? eg. A process starts and terminates between runs of a query against the processes table. Event-based tables allow us to catch these events. Events are buffered, and logged later when the query executes. Look for tables in the schema ending with _events.
  25. osqueryd: Plugins Configuration: Load configuration from various sources (filesystem, TLS)

    Logging: Write logs to multiple sinks (filesystem, TLS, AWS services, Kafka, etc.) Distributed: Retrieve queries from remote and return results to that remote (TLS)
  26. Fleet Background The most widely used implementation of the osquery

    TLS APIs. Provides support for most osquery features (support for the file carving capabilities coming soon). Scales easily into the thousands of hosts. Frontend in particular begins to struggle at around 10k (to be fixed soon).
  27. Fleet Capabilities Inventory osquery nodes enrolled in the Fleet server

    Group hosts dynamically based on results of osquery queries (labels). Configure osquery options, create, and schedule query packs. Run live queries against all or a subset of hosts.
  28. Workshop Fleet Server Fleet server: https://167.71.90.111 (self-signed cert) Username: workshop

    Password: defcon-27 fleetctl config set --address https:// 167.71.90.111 && fleetctl login Please be nice! We are all sharing this server.
  29. Fleet: Labels Labels allow dynamic grouping of hosts based on

    the result of queries. We can use labels to target queries in packs (like Discovery Queries). Live queries can be targeted against the members of a label. Label membership can be viewed directly in the UI (useful for inventory purposes).
  30. Exercise: Labels Create a label in Fleet with any SQL

    you like. Name it with your username to avoid conflicts.
  31. Exercise: Responding with osquery We've received a tip that our

    servers may be compromised by a piece of malware communicating with a C2 server at 167.71.216.87. Using Fleet, let's respond to this incident.
  32. Integrating osquery How do we manage osquery configuration? What queries

    to run? What type of logs do we want to generate, and how should we aggregate them to make them actionable?
  33. Integrating osquery: Configuration How to get basic configurations, as well

    as query packs to our osquery instances? Chef, Puppet, etc. Osquery TLS server (Fleet) What if we need to use different configuration across instances? Fleet supports this.
  34. Integrating osquery: Queries Use the online resources to get a

    starting point for building query packs: github.com/osquery/osquery/tree/master/packs github.com/palantir/osquery-configuration rhq.reconinfosec.com/tactics/persistence/ It's up to you to tune which queries run, at what intervals, and the logging mode to ensure that you are getting value for the logging throughput.
  35. Integrating Osquery: Logging How to make the logs actionable and

    searchable? Get the logs off the host: Filesystem logging + log forwarders TLS logging (+ log forwarders) AWS logging Kafka logging More than one logger plugin can be used at once Specify comma separated in the config
  36. Integrating osquery: Log Aggregation We need a system to aggregate

    logs so that we can perform investigations and have a history of events that took place on our systems. Common choices: Splunk (forwarded directly from filesystem via SplunkD or from the Fleet server) ElasticSearch (forwarded directly from filesystem via FluentD, Filebeat, etc. or from the Fleet server) AWS (using the aws_kinesis and aws_firehose logger plugins)
  37. Integrating osquery: So much more File Integrity Monitoring and Process

    Auditing (available natively in osquery) File carving (available in osquery but requires a TLS server to implement the API) Build your own extensions to augment all of the capabilities of osquery (configuration, logging, distributed queries, new tables)
  38. [email protected] twitter.com/thezachw github.com/zwass osquery Slack: @zwass Thank you! Please reach

    out to inquire about professional services to maximize the value you get from osquery and Fleet.