5 - Network Configuration Flashcards
Network Analyst
- Monitor, analyze, detect, and respond to events/incidents within infrastructure devices and netflow
- ID security risk and develop mitigation plans
Network Baseline
Defines what normal network conditions and traffic looks like
Can be used to test for abnormal conditions, rapidly deploy new networks, and ensure network is working as designed
Cyber Threat Intelligence (CTI)
- Knowledge about adversaries and their motivations, intentions, and methods
- Enables orgs to deploy measures to detect, mitigate, and possibly prevent attacks
Network Artifacts
– Definition
– Examples
- Piece of network traffic data that may be relevant to an investigation
- Helps develop network/host signatures
- Examples:
– Logs
– Files/directories
– Registry Keys
Network Triage
- Sorting network violations into groups based on:
– Response to Outages
– Level of Compromise (CAT levels)
– Leverages Artifacts
– Mission Critical Systems - Helps analyst/unit prioritize important systems
Sandbox
- Controlled environment used to test suspicious/malicious software without endangering entire network
IDS
– Definition
– Examples
Intrusion Detection System
-
Passively monitors network or systems for malicious activity/violations.
May send alerts for detections but does NOT prevent them. - Does not affect existing systems/infrastructure
- Examples:
– Snort
– Suricata
– Wireshark
IPS
– Definition
– Examples
Intrusion Prevention System
-
Detects and blocks possible network intrusion.
– Placed in-line with network traffic - Examples:
– Snort
– Suricata
SIEM
Security Info & Event Management
- Group of technologies which aggregates relevant data from multiple sources to provide birds-eye view of a network and help identify deviations from the norm.
- Examples:
– ELK
– Splunk
– AlienVault
– SolarWinds
Network Source Data Types
– 3 Types
- Full Packet Capture
- NetFlow & Related Flow-Based Collections
- Log Files
Full-Packet Capture
– Definition
– File formats
– Benefits
– Drawbacks
- File containing all original packet data as seen at collection point
- Extension Formats:
– *.pcap
– *.pcapng
– *.cap
– *.dmp - Benefits
– Holy Grail of network data collection
– Facilitates deep analysis long after communication occurred
– Variety of tools available to examine pcap files with different approaches - Drawbacks
– Files can become extremely large
– Limited availability due to legal constraints
– Limited usefulness due to encryption
NetFlow
– Definition
– Benefits
– Drawbacks
- Summary of network communication as seen at collection point
- No content, just summary and metadata
- Useful for quick triage
- Benefits
– Requires less storage
– Faster analysis process
– Fewer privacy concerns
– Analysis process applies equally to all protocols - Drawbacks
– Low level analysis may not be possible w/o content
– Many collection platforms require training/licenses
Log Files
– Definition
– Benefits
– Drawbacks
- Application or platform-centric files describing activities handled or observed by the log creator
- Benefits
– Widely available
– Processes often in place to analyze them
– May be aggregated for centralized analysis - Drawbacks
– Varying levels of detail and formats
– Often requires additional data to corroborate findings
– If not aggregated, can be time consuming to find and analyze
Port Mirror (switch)
– Definition
– Benefits
– Drawbacks
- “Software tap” that duplicates packets from one switch port to another
– Sometimes called a SPAN (Switch Port Analyzer) port - Benefits
– Simple to set up (quick config change, no downtime)
– Switch presence maximizes flexibility of platform placement - Drawbacks
– Only half-duplex, so may experience data loss with high-traffic networks
Router Netflow Export
– Definition
– Benefits
– Drawbacks
- Export router netflow data for external analysis
- Benefits
– Only requires simple config change (little to no downtime)
– NetFlow is already collected, only needs to be exported - Drawbacks
– Generally does not provide ability to perform full-packet capture
Layer 7 Devices (Network data collection)
– Definition
– Examples
– Benefits
– Drawbacks
- Any platform with control of or purview over a network link
– May provide any of the 3 types of Network Data, depending on the device - Examples:
– Web proxies
– Load balancers
– DHCP & DNS Servers - Benefits
– May offer many perspectives on the same incident - Drawbacks
– Logs may come in varying formats and levels of detail
– May require intensive parsing & analysis
– Platforms often scattered across enterprise
– Requires solid aggregation plan/platform
Tap
– Definition
– Benefits
– Drawbacks
- Hardware device which duplicates data streams and may send them to a capture/observation platform
- “Aggregating” tap merges both directions of traffic
- “Regenerating” tap duplicates data streams and sends to multiple physical ports
- Benefits
– Specifically designed for network traffic capture
– Engineered for performance and reliability
– Most taps fail open during power loss - Drawbacks
– Expensive
– Downtime during installation
Network-Based Processing Workflows
– List 6
- Establish Baselines
- Ingest and Distill
- Reduce and Filter
- Analyze and Explore
- Extract Indicators and Objects
- Scope and Scale
Establish Baselines
– Goal
– Details
- Establish normal pattern of behaviour to help ID abnormal patterns.
- Established before, during, and after a mission
- Determines cycles based on time and date
- Determine typical cycles of traffic
– Top-talking hosts
– Ports/protocols
– GET vs POST ratios
Ingest and Distill
– Goal
– Details
- Prepare for analysis and derive data that will more easily facilitate the rest of the analytic workflow
- Log source Data
- Distill pcap files to other data types
- Split data into time-based chunks
- Load data into analytic platforms
Reduce & Filter
– Goal
– Details
- Reduce volume of input data
- Use known indicators and data points to reduce data volume
– IP addresses
– Ports/protocols
– Time frames
– Volume calculations
– Domain names
– Hostnames - Build filters to reduce visible data
Analyze and Explore
– Goal
– Details
- ID traffic/artifacts that support investigative goals/hypotheses
- Analyze reduced data for suspicious traffic
– Content
– Context
– Anomalies
– Consistencies - Look for protocol anomalies
- Compare to baseline to ID deviations
Extract Indicators & Objects
– Goal
– Details
- Find artifacts that help ID malicious activity
- Look for:
– field values
– byte sequences
– files
– other objects - Maintain artifact collection
- Includes obs about network traffic itself or nature of communications
- Extract artifacts
- Protect/share data IAW policies and security constraints
Scope & Scale
– Goal
– Details
- Search more broadly within source data for behaviour that matches known indicators
- Scale up search w/ large-scale platforms/tools
- ID additional suspicious endpoints
- Pass indicators to security ops
Wireshark
Deep, protocol-aware packet exploration and analysis tool
Can extract over 140,000 data fields
TCPDump
Log or parse network traffic, similar to wireshark
Bro NSM
Creates log files to document observed network traffic
Snort/Suricata
Performs real-time traffic analysis and packet logging on IP networks
May work as an IDS or an IPS
Can detect variety of attacks/probes using sigantures
NetworkMiner
Protocol-aware object extraction tool that writes files to a disk
May trigger host defenses when writing files to disk
Network data fields can be exported to CSV
Cisco Hierarchical Network Design
– 3 Layers
Access (lowest)
Distribution (middle)
Core (Highest)
Core Layer (Cisco Hierarchical Network Design)
- Aggregates distribution switches in large LANs
- Provides high forwarding rates
Distribution Layer (Cisco Hierarchical Network Design)
- Aggregation point for access switches
- Does not connect directly to end-user devices
- Provides redundancy and interconnectivity
Access Layer (Cisco Hierarchical Network Design)
- Connection point for end user devices
- Does not typically connect to other access switches
- Controls access to intranet resources
OS used by switches
Internetwork Operationg System (IOS)
3 Ways to access switch CLI
- Console - physical port
- Telnet - IP network
- SSH - IP network
Four types of switch memory
- ROM
- Flash
- NVRAM
- RAM
Location of startup-config
NVRAM
Location of Running-config
RAM
VLAN
- Advantages
- equals…
- Advantages
– Segmentation
– Flexibility
– Security - Equals…
– Broadcast Domain
– Subnet
– Logical Network
– LAN - By nature, they inhibit communication between VLANs
802.1Q
– What is it
– Tagging method
– # VLANs supported
– Spanning Tree
– Multi-vendor support
– Native VLAN
- VLAN Trunking protocol
- Handles frame tagging (inserts 4 bytes into OG frame, modifies FCS)
- Supports 4096 VLANs (4094 in practice)
- Mono Spanning Tree
- IEEE Open Standard
- Uses native VLAN
ISL
– What is it
– Tagging method
– # VLANs supported
– Spanning Tree
– Multi-vendor support
– Native VLAN
- Inter-switch link; alternative to 802.1Q
- Adds 26 byte header and 4 byte trailer to tag VLANs
- Supports 1000 VLANs
- Uses Per VLAN Spanning Tree
- Cisco Proprietary
- Does not use native VLAN
DTP
- Dynamic Trunk Protocol
- Handles negotiation of trunk links
Trunk Modes
- Trunk - Permanent trunk mode
- Access - Permanent non-trunk mode
- Dynamic Desirable - Port actively tries to convert link to trunk link
– Becomes a trunk if neighbor is set to trunk, desirable, or auto - Dynamic Auto - Port is willing to convert to trunk link
– Becomes trunk if neighbor port is set to desirable - NoNegotiate - Permanent trunk mode, prevents port from generating DTP frames