Scenarios, Applications & Methods Flashcards
Protocol Analyzer
Example: Wireshark Protocol Analyzer
Use: Analyze wireless traffic performance to find IOC:s.
A protocol analyzer is a tool that can capture and analyze wired or wireless traffic passing over a given communications channel. This might also be called a packet sniffer, network analyzer, or packet analyzer.
Network Scanner
Example: NMAP/Wireshark
Use: To identify unauthorized traffic, open ports etc.
Network scanners can help identify which servers are running on which hosts, and on which ports. After you’ve scanned, determine if those services should be running at all.
Scanners can be used for rogue system detection. You can actively scan for unauthorized devices. Alternatively, you can passively inspect traffic logs for communication with unauthorized devices.
Network scanners can also be used to create network diagrams of how machines are connected to one another.
Password Cracker
Example: John The Ripper
Use: Analyzing passwords
These are tools used by attackers to find weak passwords. Admins could also use them to test the password health of their own users and detect problems early.
Vulnerability Scanner
Example: Tenable
Use: Find Vulnerabilities
These are programs designed to scan a system for issues. These issues might include misconfiguration, old software versions, and so on. They can operate at the network level, host level or application level.
SIEM
Example: Splunk
Use: Automated, to discover and treat security threats using logs.
SIEM stands for security information and event management. SIEM systems are hardware and software meant to analyze aggregated security data. They rely on a few different concepts
Configuration compliance scanner
Example: Qualys
Use: A protocol for managing information related to security configurations, and validating them in an automated way.
Exploitation frameworks
Example: Metasploit
Use: Used by attackers to exploit systems.
Data Sanitization Tool
Use: allow you to “destroy, purge or otherwise identify for destruction” data on systems.
Anti-Malware Tool
Example: Bitdefender, Norton, Cylance, Mcafee
Use: Anti-Malware programs scan a computer system to prevent, detect and remove malware.
Troubleshoot common security issues - Unencrypted credentials/clear text
The problem: sending credentials from one machine to another in cleartext. This means that the unencrypted information could be subject to eavesdropping for use in later attacks. Cleartext credentials could also show up in logs.
The solution: don’t send credentials in clear text.
Troubleshoot common security issues - Logs and events anomalies
The problem: Logs are meant to show event anomalies. You don’t want to dump ALL events into logs unless that information has a potential security implication or will be used in some form, later.
The solution: be conscientious about what needs to go into your logs so that you have a better signal-to-noise ratio. Log events that matter for security, specific to your organization.
Troubleshoot common security issues - Permission issues
The problem: incorrect setting of user rights and permissions, such that people have more or fewer permissions than they should.
The solution: periodic reviews and audits of rights and permissions.
Troubleshoot common security issues - Access violations
The problem: when someone tries to access a resource that they don’t have permission to access. This might be because they’re making a mistake or deliberately trying to get past security. It also might be that permissions are set inappropriately.
The solution: track access violations through a SIEM system to be aware of and act on violations.
Troubleshoot common security issues - Certificate issues
The problem: when a user attempts to use a certificate that does not have a complete chain of trust back to a trusted root.
The solution: Manage trusted certificates well so that users are not “fixing” the issue by trusting the cert anyway.
Troubleshoot common security issues - Data exfiltration
The problem: an attacker tries to steal data and export it out of your system.
The solution: don’t store data that doesn’t need to be stored. Use data loss prevent (DLP) tools as described in earlier chapters. Use firewalls and network segmentation to make it more difficult to exfiltrate.