Enterprise Incident Response Flashcards
(198 cards)
What percentage of organizations took more than 90 days to detect the intrusion?
64%
What is the median number of days attackers were present on a victim network before detection?
229 days
What is APT?
Advanced Persistent Threat
How do most organizations find out about intrusions?
Third party notifications. In many cases, law enforcement.
What are the steps of incident handling?
Preparation Identification Containment Eradication Recovery Lessons learned
What is the first step of incident response?
Identification of all the systems compromised.
What percentage of compromised systems have malware installed? Implication?
54%
Just because a system doesn’t have malware installed doesn’t mean it isn’t compromised,
What is the difference between remediation and recovery?
Remediation actions are required to be completed in a very short time, often a weekend, and are intended to mitigate the current incident. Recovery is to move the enterprise back to day to day business.
TTP?
Tactics, Techniques, and Procedures
Kill chain?
Aka Attack Progression.
Reconnaissance Weaponization Delivery Compromise/exploit C2 Exfiltration
How is persistence in APT demonstrated?
Maintaining a presence on the network and repeated attempts to gain access to areas where presence is not established.
Why has there been a switch to remotely examining systems rather than imaging?
This has happened because in an Enterprise environment it’s often more important to identify the scope of the intrusion than to preserve every last bit of evidence.
What is rip.pl
RegRipper, an automated HIVE parser for SAM, SECURITY, SYSTEM, SOFTWARE, and NTUSER.DAT HIVES. Also works on restore point registries.
What does pffexport do?
Pffexport accesses PFF (Personal Folder File) and OFF (Offline Folder File) formats.
pffexport options
Page 23, book 1.
Where are compromised images stored on the SIFT workstation?
/cases. Each case should have a separate subdirectory under /cases.
Where are filesystem mount points on the SIFT workstation?
/mnt
How should the SIFT workstation be networked?
SANS recommends it be placed on the air-gapped Host Only network
What is IR?
Incident Response
What are the 6 steps of Incident Response handling?
- Preparation
- Identification
- Containment and Intelligence Gathering
- Remediation
- Recovery
- Follow Up
Where should incident detects come from? Where do they?
They should be found by the security team, but often they’re from a third party, often law enforcement.
What is the first critical step of incident response?
Identifying all the compromised systems.
Why is it critical to identify all compromised systems?
Intruders install malware on 54% of the systems they compromise.
How often is malware installed on a compromised system?
54% of the time.