4.3 Data Sources for Investation Flashcards

1
Q

Identify vulnerability
• The scanner looks for everything
– Well, not everything
– The signatures are the key
• The vulnerabilities can be cross-referenced online
– Almost all scanners give you a place to go
– National Vulnerability Database: http://nvd.nist.gov/
– Microsoft Security Bulletins:
– https://docs.microsoft.com/en-us/security-updates/
• Some vulnerabilities cannot be definitively identified
– You’ll have to check manually to see if a
system is vulnerable
– But the scanner gives you a heads-up

A

Identify vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Vulnerability scan results
• Lack of security controls
– No firewall
– No anti-virus
– No anti-spyware
• Misconfigurations
– Open shares
– Guest access
• Real vulnerabilities
– Especially newer ones
– Occasionally the old ones

Dealing with false positives
• False positives
– A vulnerability is identified that doesn’t really exist
• This is different than a low-severity vulnerability
– It’s real, but it may not be your highest priority
• False negatives
– A vulnerability exists, but you didn’t detect it
• Update to the latest signatures
– If you don’t know about it, you can’t see it
• Work with the vulnerability detection manufacturer
– They may need to update their signatures
for your environment

A

Vulnerability scan results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
• [this]
– Logging of security events and information
• Security alerts
– Real-time information
• Log aggregation and long-term storage
– Usually includes advanced reporting features
• Data correlation
– Link diverse data types
• Forensic analysis
– Gather details after an event
Getting the data
• Sensors* and logs
– Operating systems
– Infrastructure devices
– NetFlow sensors

• Sensitivity settings*
– Easy to be overwhelmed with data
– Some information is unnecessary
– Informational, Warning, Urgent

Viewing the data
• Trends*
– Identify changes over time
– Easily view constant attack metrics

• Alerts*
– Identify a security event
– View raw data
– Visualize the log information

• Correlation*
– Combine and compare
– View data in different ways

A

SIEM (Security Information and Event Management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the primary data source for network observability.
• Switches, routers, access points, VPN concentrators
– And other infrastructure devices
• Network changes
– Routing updates
– Authentication issues
– Network security issues

A

Network log files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
a record of operating system events. It includes startup messages, system changes, unexpected shutdowns, errors and warnings, and other important processes. Windows, Linux, and macOS all generate syslogs.
• Operating system information
– Extensive logs
– File system information
– Authentication details
• Can also include security events
– Monitoring apps
– Brute force, file changes
• May require filtering
– Don’t forward everything
A

System log files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a file that contains information about events that have occurred within a software application. These events are logged out by the application and written to the file. They can include errors and warnings as well as informational events.
• Specific to the application
– Information varies widely
• Windows - Event Viewer / Application Log
• Linux / macOS - /var/log
• Parse the log details on the SIEM
– Filter out unneeded info

A

Application log files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
created in response to security events that take place on the computer. These can include a variety of events such as failed log-ins, password changes, failed authentication requests, file deletion and more.
• Detailed security-related information
– Blocked and allowed traffic flows
– Exploit attempts
– Blocked URL categories
– DNS sinkhole traffic
• Security devices
– IPS, firewall, proxy
• Critical security information
– Documentation of every traffic flow
– Summary of attack info
– Correlate with other logs
A

Security log files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a file to which the Web server writes information each time a user requests a web. site from that particular server.
• Web server access
– IP address, web page URL
• Access errors
– Unauthorized or non-existent folders/files
• Exploit attempts
– Attempt to access files containing known
vulnerabilities
• Server activity
– Startup and shutdown notices
– Restart messages

A

Web log files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
provides extremely detailed data about all DNS information that is sent and received by the DNS server, similar to the data that can be gathered using packet capture tools such as network monitor.
• View lookup requests
– And other DNS queries
• IP address of the request
– The request FQDN or IP
• Identify queries to known bad URLs
– Malware sites, known command
and control domains
• Block or modify known bad requests
at the DNS server
– Log the results
– Report on malware activity
A

DNS log files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
• Know who logged in (or didn’t)
– Account names
– Source IP address
– Authentication method
– Success and failure reports
• Identify multiple failures
– Potential brute force attacks
• Correlate with other events
– File transfers
– Authentications to other devices
– Application installation
A

Authentication log files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a snapshot that shows the process that was executing and modules that were loaded for an app at a point in time. A dump with heap information also includes a snapshot of the app’s memory at that point.
• Store all contents of memory into a diagnostic file
– Developers can use this info
• Easy to create from the
– Windows Task Manager
– Right-click, Create dump file
• Some applications have their own dump file process
– Contact the appropriate support team for
additional details

A

Dump files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a subset of telephone recording or voice logging, first used by call centers and now being used by all types of businesses.

  • monitors the services to determine the status of the system. If something is wrong with a service, an alarm gets written to an alarm monitor. After viewing this alarm information, a system administrator can run a trace on the service.
  • the process of collecting, analyzing, and recording data on telephone calls. The data can include the call origin, call destination, the length of the call, and other transmission details. Other characteristics might include the call start and end times and the specific network used.
• View inbound and outbound call info
– Endpoint details, gateway communication
• Security information
– Authentications, audit trail
• SIP traffic logs
– Session Initiation Protocol
– Call setup, management, and teardown
– Inbound and outbound calls
– Alert on unusual numbers or country codes
A

VoIP and Call Manager logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Log Management -
a standard for message logging. It allows separation of the software that generates messages, the system that stores them, and the software that reports and analyzes them. Each message is labeled with a facility code, indicating the type of system generating the message, and is assigned a severity level.
• Standard for message logging
– Diverse systems create a consolidated log
• Usually a central logging receiver
– Integrated into the SIEM (Security Information and
Event Manager)
• Each log entry is labeled
– Facility code (program that created the log) and
severity level

• Syslog* daemon options
– Rsyslog* -“Rocket-fast System for log processing” - the default logging program in Debian and Red Hat. It is an extension of the original syslog protocol, with additional features such as flexible configuration, rich filtering capabilities and content-based filtering.
- Daemon - a program that runs continuously and exists for the purpose of handling periodic service requests that a computer system expects to receive. The daemon program forwards the requests to other programs (or processes) as appropriate.

– syslog-ng* - A popular syslog daemon with additional
filtering and storage options
– NXLog - Collection from many diverse log types (multi-platform log collection and centralization tool)

A

Syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Log Management -
a command for viewing logs collected by systemd. The systemd-journald service is responsible for systemd’s log collection, and it retrieves messages from the kernel, systemd services, and other sources. These logs are gathered in a central location, which makes them easy to review.
- Systemd provides a standard process for controlling what programs run when a Linux system boots up.

• Linux has a lot of logs
– The OS, daemons, applications, etc.
• System logs are stored in a binary format
– Optimized for storage and queries
– Can’t read them with a text editor
• Journalctl provides a method for querying the system
journal
– Search and filter
– View as plain text
A

Journalctl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Log Management -
a tool for measuring the actual available bandwidth on a local system. End users can use bandwidth monitors to get a true picture of what bandwidth may actually be available due to various factors involved in the provision of high-speed Internet.
• The fundamental network statistic
– Percentage of network use over time
• Many different ways to gather this metric
– SNMP, NetFlow, sFlow, IPFIX protocol analysis,
software agent
• Identify fundamental issues
– Nothing works properly if bandwidth is highly utilized

A

Bandwidth monitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Log Management -
a set of data that describes and gives information about other data.

• [This]
– Data that describes other data sources

• Email
– Header details, sending servers, destination address

  • Mobile - Type of phone, GPS location,
  • Web - Operating system, browser type, IP address
  • Files - Name, address, phone number, title
A

Metadata

17
Q
Log Management -
a one-way technology, so when the server responds to the initial client request, the process works in reverse and creates a new flow record. Using a [this] monitoring solution can allow you to monitor and analyze these flow records more efficiently and effectively for traffic within the network.
• Gather traffic statistics from all traffic flows
– Shared communication between devices
• [this]
– Standard collection method
– Many products and options
• Probe and collector
– Probe watches network communication
– Summary records are sent to the collector
• Usually a separate reporting app
– Closely tied to the collector
A

NetFlow

18
Q

Log Management -
a protocol designed for collection and analysis of flow data from supported network devices.
• [this]
– A newer, NetFlow-based standard
– Evolved from NetFlow v9
• Flexible data support
– Templates are used to describe the data

A

IPFIX (Internet Protocol Flow Information Export)

19
Q

Log Management -
a multi-vendor, packet sampling technology used to monitor network devices including routers, switches, host devices and wireless access points. [this] is an embedded technology – it is implemented through dedicated hardware chips embedded in the router/switch.
• [this]
– Only a portion of the actual network traffic
– So, technically not a flow
• Usually embedded in the infrastructure
– Switches, routers
– Sampling usually occurs in hardware/ASICs
• Relatively accurate statistics
– Useful information regarding video streaming and
high-traffic applications

A

sFlow (Sampled Flow)

20
Q

Log Management -
a measurement tool or device used to capture and monitor the data over communication channel. It captures the data on the communication channel and coverts the data bits into meaningful protocol sequence.

• Solve complex application issues
– Get into the details
• Gathers packets on the network
– Or in the air
– Sometimes built into the device
• View detailed traffic information
– Identify unknown traffic
– Verify packet filtering and security controls
– View a plain-language description of the
application data
A

Protocol analyzer output