Disk Flashcards
How should you run Kape?
from a USB drive, it’s self contained
provides the ability to forensically extract files from a mounted drive, including hidden or locked system files. (Free)
Kape
Average breakout time in 2017
~2 hrs
Primary purpose of IR
Cyber threat intelligence. What is happening? Otherwise, they will come back. Qualifying what the adversary wants and does will stop future attacks.
Primary output of the exercise.
What is the containment phase of IR?
Preventing additional adversary actions while monitoring activity. Active defense.
Not pulling the plug while creating cyber threat intelligence.
Manual and automated scanning looking for evil
Hunting
Why is baselining important to hunting?
Have to be able to establish what “normal” looks like before you can see what abnormal is.
How does threat intelligence get to the SOC?
Generated by HFS/NFS/CFS as part of Hunt/Incident detection, signatures created are put into intelligence as a product, fed back to the SOC.
Proper threat intelligence team will arm a hunt team with:
Where to look, based on APT type activity
What to look for: signatures. Reg keys, malware footprints, IP/domains, hashes, utilities used, TTPs…
Likelihood of attack
Hunt teams should have, at a minimum
Trusted visibility into endpoints and networks across the org. (Ability to use powershell or an EDR tool to sweep the entire enterprise)
Remediation should, at minimum:
Deny adversary access to the environment
Eliminate the ability for the adversary to impact remediation efforts
Remove presence of adversary from the environment
Degrade the future ability of adversary to return
Atomic Indicators
Pieces of data that are indicators of adversary activity all on their own, such as emails, IPs, strings from C2 channnels, FQDN, etc.
Computed Indicators
Hashes of malicious files, data included decoded C2 protocols, some IDS signatures
Behavior indicators
A profile of behaviors. Bad guy likes to tunnel traffic through think tanks, use macros for word documents, targets these types of targets, and uses these types of specific computed and atomic indicators. Like a CrowdStrike profile.
How many stages is the MITRE tactic categories, and where was it derived from?
10 stages, derived from the 7 stage Kill Chain.
Control, Maintain, and Execute are broken out from the latter stages of the Kill Chain.
What is STIX?
Structured Threat Information Expression (STIX™) is a language and serialization format used to exchange cyber threat intelligence (CTI). STIX is open source and free allowing those interested to contribute and ask questions freely.
The equivalent of narrowing down a human suspect through identifying characteristics, but for adversaries
IOCs.
Open sourced community driven standard format for IoC’s
STIX
Tool aimed at (but not limited to) helping Malware researchers identify and classify malware samples. Create descriptions of malware families based on textual or binary patterns>
YARA
What is a YARA rule?
A description of strings/boolean values that help determine a Malware variant.
Tools for making IoC rules
YARA, STIX, OpenIOC
Mandiant tool for standardizing IOC’s
OpenIOC
an antivirus signature that you can control, basically
an IOC
Free tool that provides host investigative capabilities to users to find signs of malicious activity through memory and file analysis and the development of a threat assessment profile.
FE Redline