Incident Handling Process¶
- Preparation
- Covers The readiness of an organization of an attack
- Documenting requirements
- Defining Policies
- Incorporating controls to monitor like EDR/SIEM/IDS/IPS
- Hiring / Training staff
- Detection and Analysis
- Detecting an incident
- Analysis process of the incident
- Alerts from Security controls like SIEM/EDR investigating the alert to find the root cause
- Hunting for the unknown threat
- Containment, Eradication, and Recovery
- Actions needed to prevent the incident from spreading
- Securing the network from the attack
- Isolating the infected host
- clearing the network from the infected traces
- gaining control back from the attack
- Post-incident Activity / Lessons Learnt
- identifying the loopholes in the security posture that led to the intrusion
- Improving so that the attack does not happen again
- Indetifying weaknessess that lead to the attack
- Adding detection rules so that similar breach does not happen again
- Training staff
Cyber Kill Chain¶
- Reconaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- Command and Control
- Actions on Objectives
Interesting log sources¶
- Wineventlog
- contains windows events logs
- winregistry
- contains logs related to the registry creation/modification/ deletion
- XmlWinEventLog
- contains stsmon event logs
- important log source from an investigation point of view
- Fortigate_utm
- contains Fortinet Firewall logs
- iis
- contains IIS web server logs
- Nessus:scan
- contains results from the Nessus vulnerability scanner
- Suricata
- Contains the details of the alerts from the Suricata IDS.
- This log source shows which alert was triggered and what caused the alert to get triggered— a very important log source for the Investigation.
- stream:http
- contains the network flow related to http traffic
- stream: DNS
- contains the network flow related to DNS traffic
- stream:icmp
- contains the network flow related to icmp traffic
Reconnaissance Phase¶
- an attempt to discover and collect info about a target
- knowledge about the system in use
- the web app
- employees or location
- To identify IP address
sample searches¶
- query
- index=botsv1 imreallynotbatman.com
-
explanation
- looking for event logs in the index "botsv1" which contain the term imreallynotbatman.com
-
query
- index=botsv1 imreallynotbatman.com sourcetype=stream:http
- explanation
- this