Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

Uncovering SSL Anomalies In Your Network Using SecurityCenter

Note: Tenable SecurityCenter is now Tenable.sc. To learn more about this application and its latest capabilities, visit the Tenable.sc web page.

Looking in More than One Place

Nessus, PVS, and LCE offer several methods for auditing SSL protocol usage on your network(s). SSL is commonly used to secure websites, but also protects email, file sharing, and many other services. This post lists some generic SSL capabilities found in all Tenable products, and shows how you can combine them to generate useful reports and dashboards.

On the vulnerability identification side, Nessus uncovers many issues with SSL certificates, such as outdated certificates, unsigned certificates, and much more (see the screenshot below for more examples). SSL implementations shipped with appliances often use unsigned certificates, and rely on the administrator to install their own valid certificate. Without a properly signed certificate, man-in-the-middle attacks become considerably easier. If you’re an e-commerce shop, improper SSL implementations will also cause you to become non-compliant with PCI DSS standards.

SSLNessuplugins sm

A sample of Nessus plugins associated with identifying problems with SSL certificates. (Click for larger image)

Passive SSL Protocol Detection

PVS can sniff SSL traffic across your network, providing broader coverage of SSL problems since it sees traffic in real time. While network-based scanners will typically discover SSL on port 443, PVS can more easily identify SSL regardless of the port. For example, most active network scans have a tough time enumerating multiple SSL-protected websites being hosted on a single IP address. However, since PVS looks at active network traffic, enumerating all the websites hosted on a given IP address is much easier.

PVS can also identify the following situations and associated vulnerabilities in SSL:

    • PVS can aggregate SSL certificates and CNs (common names) inside web browsing traffic, allowing you to see the sites users are visiting. Often, the SSL traffic is very self-explanatory. For example, the following entry clearly identifies an Apple iPhone using SSL on the network:
      SSL_certificate_Summary since 10/2/2012 21:14:32 host 192.168.1.55 had SSL sessions involving these server certificates: Akamai 
      Technologies Inc configuration.apple.com courier.push.apple.com iphone-ld.apple.com

  • Tracking communications using SSL is a common feature for most firewalls, a requirement listed in the SANS CAG, and an integral part of your situational awareness strategy. PVS identifies hosts connecting to and listening for SSL services, and the ports being used to do so, making it easy to audit SSL usage.

  • LCE brings traditional SIEM correlation for the events uncovered by both Nessus and PVS, in addition to syslog events generated by your hosts. SSL traffic can be analyzed to detect several types of anomalies (see "Tracking SSL Activity Anomalies"). This level of analysis can be used to detect botnet activity, aid in forensic investigations, detect policy violations, and more.

For example, you can track SSL browsing activity on a per user basis:

Trackssl sm

I highlighted an individual user's activity ("rgula"). No traffic exists for the previous day because Ron was out of the office. Drilling into the actual logs provides us with some detail on Ron's SSL traffic:

Userssltrack sm

Fortunately there is nothing abnormal to report — Ron has been using Twitter, a remote instance of SecurityCenter (obfuscated for security reasons), and some Tenable resources (also obfuscated).

Tying It All Together Using SecurityCenter Dashboards

Tenable provides SecurityCenter customers with numerous dashboards free of charge. Here’s an example dashboard for customers that leverage SSL monitoring:

PVS-SSL

This dashboard graphs passively-monitored SSL traffic occurring on a variety of ports for the past 72 hours (Click for larger image).

In the above dashboard, PVS data is being used to detect SSL on non-standard ports, providing both a graph of the traffic patterns and a detailed list of ports. You can download this dashboard from our SecurityCenter Dashboard sites from the entry titled "SSL Activity Monitoring."

Conclusion

Monitoring protocol usage and traffic patterns supports the advice given by many — know your network. The ability across Tenable's products to detect vulnerabilities and anomalies in SSL traffic helps you do just that. A single vulnerability on a given host or one particular event may not be interesting on its own. However, correlating network-based vulnerabilities, passively discovered vulnerabilities, and log events allows you to see the big picture and detect anomalies that require immediate attention.

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable Lumin

Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.

Buy Tenable Lumin

Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable Nessus Professional Free

FREE FOR 7 DAYS

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

NEW - Tenable Nessus Expert
Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Pro Trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Try Tenable Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save more.

Add Support and Training