https://sansorg.egnyte.com/dl/oQm41D67D6
pratice
https://app.letsdefend.io/training/lesson_detail/checklist
https://elearning.securityblue.team/login
Log
https://cybersecuritynews.com/windows-event-log-analysis/
https://amr-git-dot.github.io/forensic investigation/Linux_Forensics/
https://tryhackme.com/r/room/introtologs
https://medium.com/@joseruizsec/soc-analyst-level-2-tryhackme-log-analysis-intro-to-logs-b7b2bfbc66b5
Common log types include:
- Application Logs: Messages related to application activities.
- Audit Logs: Operations significant for compliance.
- Security Logs: Security-related events like logins and firewall actions.
- Server Logs: Diverse logs generated by servers.
- System Logs: Logs detailing system activities and hardware status.
- Network Logs: Logs about network traffic and related events.
- Database Logs: Records of activities within databases.
- Web Server Logs: Web server activity, such as processed requests
Semi-structured Logs: These logs may contain structured and unstructured data, with predictable components accommodating free-form text. Examples include:
Example of a log file utilising the Syslog Format:
- Example of a log file utilising the Windows Event Log (EVTX) Format
Practical Activity: Log Collection with rsyslog
https://medium.com/@joseruizsec/soc-analyst-level-2-tryhackme-log-analysis-intro-to-logs-b7b2bfbc66b5
This activity aims to introduce rsyslog and demonstrate how it can enhance the centralisation and management of logs. As part of the collection process, we will configure rsyslog to log all sshd messages to a specific file, such as /var/log/websrv-02/rsyslog_sshd.log
. The steps below can be followed to achieve this:
- Open a Terminal.
- Ensure rsyslog is Installed: You can check if rsyslog is installed by running the command: sudo systemctl status rsyslog
- Create a Configuration File: Use a text editor to create the following configuration file: gedit /etc/rsyslog.d/98-websrv-02-sshd.conf, nano /etc/rsyslog.d/98-websrv-02-sshd.conf, vi /etc/rsyslog.d/98-websrv-02-sshd.conf, or vim /etc/rsyslog.d/98-websrv-02-sshd.conf
- Add the Configuration: Add the following lines in /etc/rsyslog.d/98-websrv-02-sshd.conf to direct the sshd messages to the specific log file:
$FileCreateMode 0644
:programname, isequal, "sshd" /var/log/websrv-02/rsyslog_sshd.log
- Save and Close the Configuration File.
- Restart rsyslog: Apply the changes by restarting rsyslog with the command: sudo systemctl restart rsyslog
- Verify the Configuration: You can verify the configuration works by initiating an SSH connection to localhost via ssh localhost or by checking the log file after a minute or two.
Expected Output after rsyslog configuration to monitor sshd
Image Not Showing
Possible Reasons
- The image was uploaded to a note which you don't have access to
- The note which the image was originally uploaded to has been deleted
Learn More →
IMPORTANT: If remote forwarding of logs is not configured, tools such as scp / rsync, among others, can be utilised for the manual collection of logs.
Storage, Retention, and Deletion
Log Retention
- Hot Storage: Logs from the past 3-6 months that are most accessible. Query speed should be near real-time, depending on the complexity of the query.
- Warm Storage: Logs from six months to 2 years, acting as a data lake, easily accessible but not as immediate as Hot storage.
- Cold Storage: Archived or compressed logs from 2-5 years. These logs are not easily accessible and are usually used for retroactive analysis or scoping purposes.
Practical Activity: Log Management with logrotate
Log purpose
https://tryhackme.com/r/room/logoperations
Questions To Ask In Planning Meeting/Session
- What will you log, and for what (asset scope and logging purpose)?
- Is additional commitment or effort required to achieve the purpose (requirements related to the purpose)?
- How much are you going to log (detail scope)?
- How much do you need to log?
- How are you going to log (collection)?
- How are you going to store collected logs?
- Is there a standard, process, legislation, or law that you must comply with due to the data you log?
- How are you going to protect the logs?
- How are you going to analyse collected logs?
- Do you have enough resources and workforce to do logging?
- Do you have enough budget to plan, implement and maintain logging?
Alert
https://www.mindpointgroup.com/blog/what-types-of-alerts-could-i-receive-from-a-soc
https://www.linkedin.com/pulse/how-conduct-initial-triage-security-alerts-soc-abdullahi-ali/
Establish a Triage Process,Prioritize Alerts,Collect Contextual Information,Analyze the Alert,Escalate or Remediate,Document and Review
https://medium.com/@Mx0o14/tryhackme-incident-handling-with-splunk-1f21fa04b644
https://storage-vnportal.vnpt.vn/lci-ubnd-responsive/7404/QuangVinh/slide_tap_huan_quy_trinh_ung_pho_su_co_attt_lci_2023.pdf
Incident response
https://vnhacker.substack.com/p/ieu-tra-su-co-la-lam-gi?utm_source=profile&utm_medium=reader2
https://medium.com/@Mx0o14/tryhackme-incident-handling-with-splunk-1f21fa04b644
Log
Image Not Showing
Possible Reasons
- The image was uploaded to a note which you don't have access to
- The note which the image was originally uploaded to has been deleted
Learn More →
Investigation
Reconnaissance
- Reconnaissance Phase
- Validate the IP that is scanning
Exploitation Phase
- Check ip scanned server
- Check http_method
Installation Phase
- Find what uploaded to server
- That's file is executed as which user ?
- Find the same in Virus total
Action on Objectives
Command and Control Phase
https://www.youtube.com/watch?v=4Jau-Wj-mkE&list=PLqM63j87R5p42cBwRwI24FQeF7oEBFmka
Interview
Technology
Technology Reports - Firewalls, Malware, Account Management, Authentication, Email, Proxy
Malware Reports
- No of infections in last(24Hr/12Hr/4Hr/15min)- Gets clarity on any ongoing Cyber Intrusion
- Hots Infected (24Hr/12Hr/4Hr/15min) - Top list or stats of Systems that are infected users accounts that are infected
- Malware Type ordred stats
- Malware Name - Which malware is affecting Mostly - list stats to be displayed
- Action taken by AV - whether a specific virus is Blocked ot allowed (Top 10)
- Top infected Filenames and Paths
Firewall Summary Reports
- Inbound Allowed - Destination Port, Destination IP, Source IP, Source Country
- Inbound Deny - Destination Port, Destination IP, Source IP, Source Country
- Outbound Allowerd - Destination Port, Destination IP, Source IP, Source Country
- Outbound Deny - Destination Port, Destination IP, Source IP, Source Country
Account Management - Any Device(Firewall, IDS,Linux,Windows,AV Mangement servers, DB or so on)
- Accounts Created, Deleted, Account Enabled, Account disabled, Accout Lockout
- Privilege change(Access level change)
Authentication Summary reports - Any Device(Firewall, IDS,Linux,Windows,AV Mangement servers, DB or so on)
Successful Logons, Failed Logons, Admin Logons and so on …
Proxy - To check the we traffic activity
- Top 10 User who are sent Most no of URL request
- Top 10 visited websites
- Top 10 Blocked websites
- Top 10 Malecious Websites and Theire action
Email Summary Reports -
- Top 10 - Senders
- Top 10 - Receives
- Top 10 External domain names sent
- Top 10 blocked domain names sent
- Top 10 blocked resons
- List of Malicious attachment and action
SIEM Reports
- Logs - EPS(Events Per Seconds)
- What are new Log sources - Nessus report displaying some IP address which SOC is not monitoring
- No receving of logs from the Source
- Correlations/Alerts triggered in last duration of time
SOC Reports:
- No of Alerts Worked on by SOC Team
- No of Incedents by Severity
- SLA adherences
- Escalations