Incident handling
Last updated
Last updated
aim to know the attackers' tactics, techniques, and procedures
The preparation phase covers the readiness of an organization against an attack
The detection phase covers everything related to detecting an incident and the analysis process of the incident
This phase also covers hunting for the unknown threat within the organization.
Containment, Eradication, and Recovery actions needed to prevent the incident from spreading and securing the network.
steps taken to avoid an attack from spreading into the network
isolating the infected host
clearing the network from the infection traces
gaining control back from the attack
Post-Incident Activity / Lessons Learnt
includes identifying the loopholes in the organization's security posture
improving so that the attack does not happen next time
identifying weaknesses that led to the attack
adding detection rules so that similar breach does not happen again
training the staff if required
Map the attacker's activity in each phase during this Investigation [ ]
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command & Control
Actions on Objectives
log sources showing visibility into both network-centric and host-centric activities
SPLUNK [ index=botsv1 ]
click on the Data summary and navigate the available tabs to get the information
wineventlog
It contains Windows Event logs
winRegistry
It contains the logs related to registry creation / modification / deletion etc.
XmlWinEventLog
It contains the sysmon event logs. It is a very important log source from an investigation point of view.
fortigate_utm
It contains Fortinet Firewall logs
iis
It contains IIS web server logs
Nessus:scan
It contains the results from the Nessus vulnerability scanner.
Suricata
It contains the details of the alerts from the Suricata IDS. This log source shows which alert was triggered and what caused the alert to get triggeredā a very important log source for the Investigation.
stream:http
It contains the network flow related to http traffic.
stream: DNS
It contains the network flow related to DNS traffic.
stream:icmp
It contains the network flow related to icmp traffic.
h
imreallynotbatman.com
in the stream:http log sourcepoisonivy-is-coming-for-you-batman.jpeg
was downloaded from the attacker's host prankglassinebracket.jumpingcrab.com
that defaced the site.