Module 18: SIEM Part Two: Combining the Logs
Last updated
Last updated
Assumptions for this module-long lab: phase one was initiated shortly after Apr 27, 2022 @ 12:58:00.000 and ended just before Apr 27, 2022 @ 13:00:00.000.
Creating a Web Enumeration detection rule
Creating a Command Injection detection rule
Example of detection rules in action
Utilizing fields like source.ip, host.ip, and event.action can assist in identifying brute force and authentication as event.action will easily identify the action taken and then filtering on failed/successful logins will show the attack path.
Creating a detection rule to identify SSH logins as root
Creating a detection rule to identify RDP Brute Force attempts
Example of detection rules in action
Syslog rocks.
Creating a detection rule for DLL Creation by PowerShell
Creating a detection rule for finding Mimikatz
Custom query to detect PowerShell's access of lsass.exe
Example of detection rules in action
Follow the strings, OSQuery can be useful... sometimes...
Creating a detection rule to catch ntdsutil dumping registry
Custom query to detect execution of ntdsutil.exe