5D. Analyse Application-related IoCs obj 4.3, 4.4 Flashcards
understanding typical application behaviour requires a combination of…
- Documentation of the application’s normal behaviour
- Logging, to provide a view of normal operations
- Heuristic analysis tools to flag when behaviours deviate from the norm
Application Logs IoCs
- DNS (queries, destinations)
- HTTP (client 4xx, server 5xx, cookies, user-agent)
- FTP (log everything)
- SSH (auth issues, failed attempts)
- SQL (access attempts, query logs)
Application IoCs
1) Anomalous activity - typical behaviour deviation. Detected with log analysis, behaviour baselines, and file integrity checking.
2) New accounts - e.g., admin accounts. Can be monitored with w, lastlog, faillog commands, or by checking auth.log (linux)
3) Unexpected outputs - scanning for vulns may produce errors, signs of code injection, directory traversal etc attacks will show in app logs
4) Network connections - suspicious open ports (net stat, nmap), outbound connections
5) Unexpected outbound comms - beaconing, file transfer etc. Network monitoring software + IDSs/IPSs
6) Service interruption - DoS or compromised application. Monitor application service status + user experience.
7) Memory overflows - OS system errors and crashes. Check crash dumps. Log reboots and service restarts.
8) Service defacement - site may be defaced
Service analysis tools (windows)
- net start (running services)
- get-service (running services)
Service analysis tools (linux)
- systemctl (startup processes)
- ps (running processes)
- top (running processes)
Account and Session Management Tools (windows)
- Local Users and Groups (local account management)
- AD User and Computers (config/monitor accounts from DCs)
- net
Account and Session Management Tools (Linux)
- who (user accounts logged in)
- w (same as who, also returns more information)
- rwho (active account info for all hosts on local network)
- lastlog (log on history)
- faillog (authentication fails)
VM Introspection (VMI)
uses tools installed to the hypervisor to retrieve pages of memory for analysis
Saved State files (VMs)
Suspending the hypervisor causes it to write its contents of memory to a file, which can then be analysed using a tool such as Volatility.
persistent data acquisition (Virtualisation Forensics)
- Acquiring data from persistent devices, such as virtual hard drives and other virtualised mass storage devices to an image-based format
File-carving-deleted VM disk images (Virtualisation Forensics)
- host may use proprietary file system which can limit support for recovery tools
- image may be widely fragmented, File carving can be used to reconstruct these files
Lost system logs (virtualisation forensics)
- Virtual machines are optimised to spin up when needed and be destroyed when no longer required
- Configure virtual machines to log events to a remote logging server to prevent system logs from being lost during deprovisioning