,ย 

Herr Langner advises against Intrusion Detection

The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) issued a security advisory for Siemens' SIMATIC Step 7 PLCs a couple of weeks ago. I've previously recommended asset owners to monitor the network traffic in their Industrial Control Systems (ICS), and ICS-CERT have followed my line of thinking by suggesting the following defensive measures:

"Configure an intrusion detection system (IDS) to monitor traffic for unusual or unauthorized activity.
  • Monitor traffic on the ISO-TSAP protocol, Port 102/TCP.
  • Monitor traffic being unexpectedly sent outside the automation network.
  • Monitor traffic between workstations. This traffic may be indicative of attacker pivoting through your network"

Siemens SIMATIC S7 PLC by Robot Plays Guitar

The German ICS security cowboy Ralph Langner has written a somewhat confused blog post where he is critisizing ICS-CERT's advisory. In this blog post Langner says the following about ICS-CERT's recommendation to monitor the ISO-TSAP traffic:

"It would be interesting to learn how the authors of the advisory suggest this should actually be done. We wonder if they have ever peeked into the data traffic of a Siemens PLCโ€™s port 102 in a real installation [...] In order to make any sense out of TCP port 102 traffic it is required to do deep packet inspection. Unfortunately, the details of the layer seven protocol that needs to be analyzed, along with certain peculiarities at layer four such as pre-defined binary TSAPs, are not documented by the vendor. So in essence what ICS-CERT suggests is that asset owners start reverse analyzing the S7 protocol in order to configure their intrusion detection systems, which seems like a far stretch."

So, is Langner saying that the Siemens S7 protocol is too complicated to be reverse engineered? If encrypted and strongly obfuscated protocols like Skype can be reversed, then the S7 protocol should be a piece of cake. I've manually reverse engineered multiple protocols when building protocol parsers for NetworkMiner, and I can testify that most unencrypted and non-obfuscated protocols can be reversed in just a few hours. It would therefore be quite simple for IDS vendors to add support for the S7 protocol to their software. I also believe that even a very rudimentary IDS functionality, which just checks which IP addresses that are communicating over TCP port 102, would provide value. Such a simple feature doesn't even require the IDS vendor to implement a parser for the S7 protocol or even the ISO-TSAP protocol.

Ralph also criticizes ICS-CERT's recommendation to "Monitor traffic being unexpectedly sent outside the automation network" by saying:

"While the advice per se might not be completely wrong, we donโ€™t see any relation to the Beresford vulns which highlight the risk of process manipulation, not the risk of industrial espionage and exfiltration of trade secrets."

A machine on an ICS network trying to contact an external IP address is typical Indicator of Compromise, but Langner fails to understand this basic principle of network security monitoring and incident response. Malware very often use outbound connections to access Command-and-Control servers as well as to download additional software to maintain its foothold on the infected machine. I'm certain that this is why ICS-CERT recommend asset owners to monitor for outgoing traffic, especially since ICS systems normally don't communicate with external systems and typically don't host any confidential data or "trade secrets".

A point that ICS-CERT failed to stress, however, is the need for asset owners to also store the full content network traffic (pcap files) from their network monitoring installations. This is an absolute necessity when investigating an alert from an IDS in order to better determine if an event is a security incident or just a false positive.

More on capturing network traffic can be read in my blog post Sniffing Tutorial part 2 - Dumping Network Traffic to Disk.

More... Share ย |ย  Facebook ย  Twitter ย  Reddit ย  Hacker News Short URL: http://netres.ec/?b=118C4C4

Posted by Erik Hjelmvik on Wednesday, 24 August 2011 14:47:00 (UTC/GMT)

Recent Blog Posts

ยป NetworkMiner 2.3.2 Released!

ยป Detecting the Pony Trojan with RegEx using CapLoader

ยป CapLoader 1.7 Released

ยป NetworkMiner 2.3 Released!

ยป Examining Malware Redirects with NetworkMiner Professional

ยป Analyzing Kelihos SPAM in CapLoader and NetworkMiner

Blog Archive

ยป 2018 August
ยป 2018 July
ยป 2018 April
ยป 2018 February
ยป 2017 December
ยป 2017 October
ยป 2017 September
ยป 2017 August
ยป 2017 April
ยป 2017 March
ยป 2017 February
ยป 2017 January
ยป 2016 November
ยป 2016 October
ยป 2016 September
ยป 2016 May
ยป 2016 March
ยป 2016 February
ยป 2015 December
ยป 2015 November
ยป 2015 October
ยป 2015 September
ยป 2015 August
ยป 2015 June
ยป 2015 March
ยป 2015 January
ยป 2014 November
ยป 2014 October
ยป 2014 September
ยป 2014 June
ยป 2014 May
ยป 2014 April
ยป 2014 March
ยป 2014 February
ยป 2013 October
ยป 2013 September
ยป 2013 August
ยป 2013 April
ยป 2013 February
ยป 2013 January
ยป 2012 December
ยป 2012 November
ยป 2012 September
ยป 2012 August
ยป 2012 July
ยป 2012 June
ยป 2012 April
ยป 2012 January
ยป 2011 December
ยป 2011 November
ยป 2011 October
ยป 2011 September
ยป 2011 August
ยป 2011 July
ยป 2011 June
ยป 2011 May
ยป 2011 April
ยป 2011 March
ยป 2011 February
ยป 2011 January

List all blog posts

Grab our FeedBurner or RSS feed

twitter

NETRESEC on Twitter

Follow @netresec on twitter:
ยป twitter.com/netresec


book

Recommended Books

ยป The Practice of Network Security Monitoring, Richard Bejtlich (2013)

ยป Applied Network Security Monitoring, Chris Sanders and Jason Smith (2013)

ยป Network Forensics, Sherri Davidoff and Jonathan Ham (2012)

ยป The Tao of Network Security Monitoring, Richard Bejtlich (2004)

ยป Practical Packet Analysis, Chris Sanders (2017)

ยป Windows Forensic Analysis, Harlan Carvey (2009)

ยป TCP/IP Illustrated, Volume 1, Kevin Fall and Richard Stevens (2011)

ยป Industrial Network Security, Eric D. Knapp and Joel Langill (2014)