Incident Response & Forensics Flashcards
Incident Management Program
Program consisting of the monitoring and detection of security events on a computer network and the execution of proper response to those security events
Incident Response Team
- Incident Response Manager
- Security Analyst
- Triage Analyst
- Forensic Analyst
- Threat Researcher
- Cross-functional Support
Out-of-Band Communication
Signals that are sent between two parties or two device that are sent via a path or method different from that of the primary communication between the two parties or devices
journalctl
A Linux command line utility used for querying and displaying logs from journald, the systemd logging service on Linux
nxlog
A multi-platform log management tool that helps to easily identify security risks, policy breaches or analyze operational problems in server logs, operation system logs and application logs
nxlog is a cross-platform, open-source tool that is similar to rsyslog or syslog-ng
netflow
A network protocol system created by Cisco that collects active IP network traffic as it flows in or out of an interface, including its point of origin, destination, volume and paths on the network
sflow
Short for “sampled flow”, it provides a means for exporting truncated packets, together with interface counters for the purpose of network monitoring
Only a portion of actual network traffic (not technically a flow)
Lower resource requirements
Usually embedded in the infrastructure
Relatively accurate statistics
IPfix
Internet Protocol Flow Information Export:
Newer netflow-based standard (evolved from Netflow v9)
Flexible data support
Templates are used to describe data
IETF standardization for how IPflow information gets formatted and transferred from an exporter to a collector
Forensic Procedures
Identification
Ensure the scene is safe, secure the scene to prevent evidence contamination, and identify the scope of evidence to be collected
Collection
Ensure authorization to collect evidence is obtained, and then document and prove the integrity of evidence as it is collected
Analysis
Create a copy of evidence for analysis and use repeatable methods and tools during analysis
Reporting
Create a report of the methods and tools used in the investigation and present detailed findings and conclusions based on the analysis
Legal Hold
A process designed to preserve all relevant information when litigation is reasonably expected to occur
A computer or server could be seized as evidence
nmap
An open-source network scanner that is used to discover hosts and services on a computer network by sending packets and analyzing their responses
hping
An open-source packet generator and analyzer for the TCP/IP protocol that is used for security auditing and testing of firewalls and networks
Send crafted frames
Modify all IP, TCP, UDP, & ICMP values
netcat
Utility for reading from and writing to network connections using TCP or UDP which is a dependable back-end that can be used directly or easily driven by other programs and scripts
Can be used for Banner Grabbing; used for shell connections as well
curl
A command line tool to transfer data to or from a server, using any of the supported protocols (HTTP, FTP, IMAP, POP3, SCP, SFTP, SMTP, TFTP, TELNET, LDAP or FILE)
Client URL
Retrieve data using a URL (web pages, FTP, emails, databases)
Grabs raw data (search, parse, automate)
The Harvester
A python script that is used to gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN database
Gather OSINT Scrape info from Google/Bing List people on LinkedIn DNS brute force VPN, chat, mail
sn1per
An automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities across a network
Combines many recon tools into a single framework
Dnsenum, metasploit, nmap, theHarvester, & more
Both non-intrusive and very intrusive scanning options
Another tool that can cause problems (brute force, server scanning)
scanless
Utility that is used to create an exploitation website that can perform open port scans in a more stealth-like manner
Stealth because you will appear as the web server, and not yourself
dnsenum
Utility that is used for DNS enumeration to locate all DNS servers and DNS entries for a given organization
Nessus
A proprietary vulnerability scanner that can remotely scan a computer or network for vulnerabilities
Cuckoo
An open source software for automating analysis of suspicious files
A sandbox for malware
A virtualized environment (Windows/Linux/macOS/Android)
Track & trace
API calls, network traffic, memory analysis