Module 4: Hunting With Network Data
Network Data for Threat Hunters
Network IoCs
Discussing fidelity for the most part. Using threat intell to gather info for attribution. A bit about using IDS/IPS for global traffic views rather than a host for their network traffic.
Sources of Network IoCs
Exactly what the title of the section is. IDS, IPS, etc.
Practical Network Data Analysis
The Lockbit Ransomware
Using Splunk to search for the top 20 destination IPs that CLIENT2 communicated with:
Now that we've found a sus IP, narrow down the searches to communication to that IP involving e.taylor -- the user who supposedly clicked the suspicious link. Change the output into a table of time the request occured, the file involved in the request, and the PID of the process:
Full Packet Capture Analysis
Wireshark filter to filter on our previously sus IP and CLIENT2:
Gathering arp activity or smb:
Using NetWitness to dig deeper via Suricata captures.
If we click the lockbit.exe, it asks if we want to run it. This looks terrifying but follows up with a question on actual actions to take:
Getting the hash of the lockbit.exe for additional digging:
Last updated