504.1 Flashcards
PICERL
Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned
Preparation
All the things an organization does before an incident. Including policy, procedure, introducing internal monitoring, security best practices, etc.
Identification
When the incident is identified. Maybe through an IDS, customer report
Containment
There are several ways to contain an incident. short and long term containment with evidence collection.
Eradication
Undoing the damage the attackers did. Killing attacker processes, changing passwords, removing malicious data, launching fraud investigations etc
Recovery
Steps taken to get business systems back up and running.
Lessons Learned
When the final report is written, and the vulnerabilities the threat actors exploited are fixed.
Cyber Chef
Tool for transforming encoded data to its natural state for analysis.
wmic
used to search for processes. search for running processes that have base 64 encoded command line options, especially powershell.
netstat
use to search for listening and active tcp and udp ports.
ASEPs
registry and file locations that can be used to start software without a user taking a specific action to activate it.
Process explorer
gives detailed information for running processes
Autoruns
gives list of autostart extensibility points
process monitor
Shows file system,registry, network, and process information in real time
TCPView
maps listening and active tcp and udp activity to the associated applications