Book 5: Defense Spotlight with RITA Flashcards
what is RITA
a sophisticated network analysis tool
What type of threat identification is used with RITA?
Statistical threat identification
Rita is primarily used for __ assessment of network activity
offline
RITA reads from __ logging data for the greatest network event fideltiy with results best with logging data collected ___+hours
Zeek
24
What are zeek logs?
the logs RITA uses to read from to create analysis reports
What is RITA?
solution to idetnify attacker C2 using statistical anomaly analysis.
Rita does not rely on packet payload inspection to identify threats like ___ platforms
IDS
RIta looks for signs of ___ activity that correspond to patterns employed by attacker __ tools. both known and unknown
network
C2
RITA does not perform live network monitoring
true
RITA performs offline network monitoring
true
RITA is an effective threat hunting tool to aid analysts in identifying and reacting to compromises within the network.
true.
What are some common behaviors of C2s?
- Long connection duration between C2 and victim endpoint
- Lots of consistent data sizes in packers for heartbeat checking
- Consistent packet intervals (C2 sleep timers)
-Consistent packet intervals within Jitter metric (skew)
session size total packer or byte count consistency
RITA does not identify specific C2 frameworks
true
Where does RITA store its parsed zeek logs?
Mongodb
What are the steps to get results from RITA?
prereq: have a mongo database
1. start the mongo database
2. create a directory that will hold the parsed zeek logs
3. start zeek and read from a packet capture file pcap
4. the parsed zeek made from the pcap will import them into my current directory to my database.
4. generate an html report