Wow, That's a lot to look into ... will start with security-onion and explore what's included, and if I reached something useful will right back about it.
You sir have been extremely helpful! thanks again. Regards, Sherif. On Thu, Jun 7, 2012 at 7:49 AM, Liam Randall <[email protected]> wrote: > This won't get you all the way there. > > If you haven't looked at it yet maybe try setting up Bro to dissect your > network traffic in realtime. They have a fancy SSL analyzer, however it > is not going to fully decrypt all of your SSL sessions. It will report > on keys, signing, sessions, etc for nearly everything speaking ssl. > Jump right to pages 165/166 for an overview: > http://tracker.bro-ids.org/bro/export/5bf18fdb7f1d54d290728ce02b95e1579b > 3a65f0/bro/doc/ref-manual/Bro-Ref-Manual.pdf > > I would drop by #bro-ids on freenode. > > Tangently related, with the 2.0 release out of the box you can start to > get real fancy and detect things like browser plugins off the wire, dump > plain text passwords, etc. The 2.0 release has pretty good protocol > coverage and those guys are working their butts off on SMB and others. > > Other stuff you may need to capture and disassemble offline w/ Xplico, > chaosreader, wireshark, etc. > > Bro is now included in security onion; highly recommend it. It also has > daemonlogger (for full packet capture), snort/suricata, sguil, xplico, > wireshark, chaosreader... > > Best of luck. > > Liam Randall > > -----Original Message----- > From: [email protected] > [mailto:[email protected]] On Behalf Of Sherif > El-Deeb > Sent: Wednesday, June 06, 2012 11:51 PM > To: PaulDotCom Security Weekly Mailing List > Subject: Re: [Pauldotcom] Inspecting SSL traffic for free "A.K.A IDS/IPS > onSSLconnections" > > Liam, > Looks like just what I have been looking for, thanks a million! but it > will be limited to HTTPS traffic "I guess?",... no POP3s or IMAPS. > > I managed yesterday to do a workaround that handled everything SSL: > using SSLSplit "http://mirror.roe.ch/rel/sslsplit/sslsplit-latest.1.txt" > and iptables. > > After running it for few hours it works fine, will do testing for a > couple of days before pushing to production. > > Thanks again. > Sherif Eldeeb. > > On Thu, Jun 7, 2012 at 5:28 AM, Liam Randall <[email protected]> > wrote: >> squid SSl-bump might do the trick for you. >> >> http://wiki.squid-cache.org/Features/SslBump >> >> Liam Randall >> >> -----Original Message----- >> From: [email protected] >> [mailto:[email protected]] On Behalf Of Sherif >> El-Deeb >> Sent: Monday, June 04, 2012 12:50 AM >> To: PaulDotCom Security Weekly Mailing List >> Subject: [Pauldotcom] Inspecting SSL traffic for free "A.K.A IDS/IPS >> on SSLconnections" >> >> - I would like to inspect traffic for SSL(TLS?) connections, I already > >> pushed our own root CA to all machines' trusted Root certificates and >> no warnings shows up when a certificate that is signed by it gets > served. >> >> - The feature I am looking for is like "Burp's invisible proxy + >> generate CA-signed per-host certificates" where a certificate is >> generated on the fly for each host using a pre-defined pre-trusted >> root CA while being able to inspect the payload "No, ettercap is not >> production friendly and it does not allow HTTPS interception in bridge > >> sniffing, cain is no better". >> >> - I know that wireshark decrypts SSL traffic when you provide it with >> the private key, the tricky part is the >> "on-the-fly-per-host-certificate-generation". >> >> - That particular subnet's gateway is a linux machine with two NICs, >> simple iptable nat, 30 computers... >> >> - I am aware of few commercial products that does this, but I will >> appreciate telling me how to do it for free. >> >> Thanks in advance. >> Sherif Eldeeb. >> _______________________________________________ >> Pauldotcom mailing list >> [email protected] >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >> Main Web Site: http://pauldotcom.com >> _______________________________________________ >> Pauldotcom mailing list >> [email protected] >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >> Main Web Site: http://pauldotcom.com > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
