Cyber Security
Cyber Security
Cyber Security
Cyber /IT security is the technique of protecting computers, networks, programs and data
from unauthorized access or attacks that are aimed for exploitation.
SOC is operational in the live environment, the team will have to carry out its mission and
will have to react to incidents. This is the phase where the SOC has the opportunity to show
the value it provides the business with when an incident arises, a ticket is opened and a
case will be investigated. Many parts of the team will be involved, maybe someone external
to the SOC (part of the same organization or even a third-party actor) will be concerned,
depending on the nature, extent and the severity of the incident. Different levels of
escalations, leading possibly to the CSIRT, could be put in place and the team must
collaborate leveraging all the available tools and procedures until the closure of the case.
What is SIEM(security information and event management)?
Splunk
RSA Envision and so on
Retention: Storing data for long periods so that decisions can be made off of more
complete data sets.
Dashboards: Used to analyze (and visualize) data in an attempt to recognize patterns
or target activity or data that does not fit into a normal pattern.
Correlation: Sorts data into packets that are meaningful, similar and share common
traits. The goal is to turn data into useful information.
Alerting: When data is gathered or identified that trigger certain responses - such as
alerts or potential security problems - SIEM tools can activate certain protocols to alert
users, like notifications sent to the dashboard, an automated email or text message.
Data Aggregation: Data can be gathered from any number of sites once SIEM is
introduced, including servers, networks, databases, software and email systems. The
aggregator also serves as a consolidating resource before data is sent to be correlated
or retained.
Tier 3: Regional Analyst who performs higher order analysis and quality assurance
(QA) with respect to the activity derived from Tiers 1 and 2, among other activities
including hunting
Alert: An event (or collection of events) that is or has the potential to be a cyber
security incident
Monitor: Process by which analysts receive and observe cyber security events and
alerts from technical and non-technical sources.
Triage: Process of validating an alert through the analysis of data.
Incident Type: Incidents can be classified as malicious code, misuse, denial of service,
attempted access or successful unauthorized access.
Threat Type: Threats are internal or external to the organization and are done
intentionally or unintentionally
Incident Severity: The degree to which the incident impacts the organization, the
likelihood of recovery, and the level of response necessary
Incident Scope: The level to which users, assets, data, and/or member firms are
impacted.
True Positive: Outcome of security event analysis indicating that a defined risk is
intercepted
True Negative: Outcome of security event analysis indicating the presence of a normal
transaction
False Positive: Outcome of security event analysis indicating a false alarm
False Negative: Outcome of security event analysis indicating the possible presence of
an undefined risk.
Detection Time: Time at which the observation of an event took place
Alerting Time: Time at which the observation of an event is reported into the SIEM,
email, or hotline system
Acknowledgement Time: Time at which the analyst picks up an alert
Self-Description:
This is XXXXXXXXXX, has done graduation on XXXXXXXXXX and having XXyears of
experience in security operations center (SOC) as an information security analyst in
XXXXXXXXXXX.
Palo-Alto or Sourcefire -IPS - This has been configured in inline mode on the network.
It monitors the entire network for suspicious traffic by analyzing or comparing the
event data with pre-configured and pre-determined attack patterns or signatures.
Bluecoat or Cisco WSA - web proxy - This monitors all the web traffic and correlates
the traffic in real time by tapping into the Cisco Talos security intelligence.
McAfee or Cisco ESA - email security - This protects against ransomware, business
email compromise, spoofing, and phishing. It uses advanced threat intelligence and a
multilayered approach to protect inbound messages and sensitive outbound data.
McAfee ePO - endpoint protection - This runs daily scans in the network. If any of the
systems detected with infections should be reviewed by SOC and will necessary steps to
mitigate the detected issue.
Antivirus – McAfee
Active channels provide live streaming of event data; through the Active Channels we
monitor firewall logs, Sourcefire IPS logs, McAfee ePO logs and Cisco WSA logs.
Dashboards provide the summary of the event data, through which we can quickly
identify and investigate if any abnormal logs reported.
Monitoring the Arcsight smart connectors. If any of the connector goes down, we are
taking the responsibility to create a ticket and assign to NSO team.
We are also responsible for monitoring SOC mailbox, where it has been forwarded with
suspicious/ spam/ phishing emails by the employees whenever they receive any
suspicious email. SOC analyzes such emails with the help of online tools like
virustotal.com, urlquery.net, mxtoolbox.com, mal wr.com etc and blocking the domains
and attachments at ESA & WSA level.
If any potential security incident identified while monitoring the security devices
then immediately will create a security incident response plan (SIRP):
Mainly there are 6 phases involved in Preparing security incident response plan (SIRP)
Preparation
Identification
Containment
Eradication
Recovery
Lessons Learned
1. Preparation
incident response planning, and in the end, the most crucial phase to protect your business.
Part of this phase includes:
Ensure employees are properly trained regarding their incident response roles and
responsibilities in the event of data breach Develop incident response drill scenarios and
regularly conduct mock data breaches to evaluate incident response plan.
Ensure that all aspects of your incident response plan (training, execution, hardware and
software resources, etc.) are approved and funded in advance
Your response plan should be well documented, thoroughly explaining everyone’s roles
and responsibilities. Then the plan must be tested in order to assure that your employees
will perform as they were trained. The more prepared your employees are, the less likely
they’ll make critical mistakes.
2. Identification
This is the process where you determine whether you’ve been breached. A breach, or
incident, could originate from many different areas.
It’s important to discover the breach quickly, where it’s coming from, and what it has
affected.
3. Containment
When a breach is first discovered, your initial instinct may be to securely delete everything
so you can just get rid of it. However, that will likely hurt you in the long run since you’ll be
destroying valuable evidence that you need to determine where the breach started and
devise a plan to prevent it from happening again.
Instead, contain the breach so it doesn’t spread and cause further damage to your business.
If you can, disconnect affected devices from the Internet. Have short-term and long-term
containment strategies ready. It’s also good to have a redundant system back-up to help
restore business operations. That way, any compromised data isn’t lost forever.
This is also a good time to update and patch your systems, review your remote access
protocols (requiring mandatory multi-factor authentication), change all user and
administrative access credentials and harden all passwords.
4. Eradication
Once you’ve contained the issue, you need to find and eliminate the root cause of the
breach. This means all malware should be securely removed, systems should again be
hardened and patched, and updates should be applied.
Whether you do this yourself, or hire a third party to do it, you need to be thorough. If any
trace of malware or security issues remain in your systems, you may still be losing valuable
data, and your liability could increase.
5. Recovery
This is the process of restoring and returning affected systems and devices back into your
business environment. During this time, it’s important to get your systems and business
operations up and running again without the fear of another breach.
6. Lessons Learned
Once the investigation is complete, hold an after-action meeting with all Incident Response
Team members and discuss what you’ve learned from the data breach. This is where you
will analyze and document everything about the breach. Determine what worked well in
your response plan, and where there were some holes. Lessons learned from both mock
and real events will help strengthen your systems against the future attacks.
Networking Concepts
It enables computers to connect to network.it turns data into electrical signals that can
be transmitted over network.
MAC(media access control)address
Eg: 00:0a:83:ab:cf:67
Eg:192.145.2.3
1.Public ip address
2.Private ip address
*Classes of public ip address and range
Class A 0.0.0.0-126.255.255.255
Class B 128.0.0.0-191.255.255.255
Class C 192.0.0.0-223.255.255.255
Class D 224.0.0.0-239.255.255.255
Class E 240.0.0.0-255
Class A 10.0.0.0-10.255.255.255
Class B 172.16.0.0-172.31.255.255
Class C 192.168.0.0-192.168.255.255
NETWORK DEVICES
SWITCH:
A switch is considered a Layer 2 device, operating at the data link layer; switches use
packet switching to receive, process and forward data.
HUB:
Network hubs — also called repeaters-are even less advanced that switches.
While a hub broadcasts the same data to all its ports, a network switch forwards data
only to those devices that the data is intended for.
Network hubs do not manage any traffic coming through them; they only broadcast —
or repeat — packets from an incoming port to all other ports.
PACKET:
A packet is the unit of data that is routed between an origin and a destination on the
Internet.
It turns out that everything you do on the Internet involves packets. For example, every
Web page that you receive comes as a series of packets, and every e-mail you send
leaves as a series of packets. Networks that ship data around in small packets are
called packet switched networks.
ROUTER
A router is hardware device designed to receive,analyze and move incoming data packets
to another network. It determines the best way for a packet to be forwarded to its
destination.
Computer Network:
A network is defined as a group of two or more computer systems linked together.
LAN, which stands for local area network, and WAN, which stands for wide area
network, are two types of networks that allow for interconnectivity between
computers.
LANs are for smaller, more localized networking — in a home, business, school, etc. —
EX: Switches and Hubs
WANs cover larger areas, such as cities, and even allow computers in different nations
to connect. LANs are typically faster and more secure than WANs, but WANs enable
more widespread connectivity.
SUBBNETTING:
The practice of dividing a larger network into two or more smaller networks is called
subnetting.
Encoding: Encoding converts the data in a desired format required for exchange between
different systems. This doesn’t convert it into a secret data, but usable data. It can be
further decoded through the same tools when necessary.
Hashing: This serves for maintaining the integrity of a message or data. This way if any day
it is hampered or changed, you will get to know.
Encryption: Encryption ensures that the data is secure and one needs a digital verification
code or image in order to open or access it.
Encryption:
Symmetric encryption:
Asymmetric encryption:
OSI Concepts
eg:http,ftp,smtp
PDU:formatted data
PDU:formatted data
Transport layer:it does reliable data transport through network.it maintains proper
delivery and error correction of data.it gives port number.
Eg:TCP,UDP
PDU:segments
Network layer: it does routing(transmitting packet over the best path to exact
destination).it give ip address to packet
Eg:router PDU:packets
Data link layer: Reliable transfer of data across physical layer.switching(redirects packet to
exact system)takes place here.it gives MAC address.
Eg:switch PDU:frames
Ports: ports are physical numbers use by tcp/ip to identify what services/application
should handle data received by system. Tcp having 65536(0-65535) ports.
0-1023 are well known ports
SSH(secure shell) 22
Syslog 514
A horizontal scan is described as scan against a group of IPs for a single port
Flags
TCP FLAGS:
To start tcp session, the client sends a SYN packet and the server responds with SYN ACK
packet,and the client completes the third part of handshake with ACK packet, at this point
connection is established.
After completion of transmission of data client sends the FIN packet and server reply back
with ACK, at this point connection is terminated.
Difference Between TCP & UDP
NETWORK ARCHITECTUURE
Server LAN
Active Directory
Application server
File server
File server is computer responsible for central storage and management of data files so that
other computer on the same network can access files.
Exchange server
A popular email messaging system from Microsoft that runs on windows server. The server
side is Microsoft exchange server and feautered client program is Microsoft outlook.
DNS(domain name system)
DNS Working
1. Browser checks www.google.com web request in its cache memory, if it won’t find
send it to the resolver server.
2. Resolver is basically ISP(internet service provider),when it receives query it checks
into its cache memory, if it can’t find ip address sends it to next level i.e root server.
3. Root server is top or the root of dns hierarchy, 13 sets of these root servers placed
around the world,each set having own unique ip address. If it is not going to know
where the ip address but it know where to direct resolver to help it to find ip. It
direct resolver to TLD for the .com domain.
4. TLD stores the address information for the top level domains. Such as .com .net .org
.in etc. Even it is not going to know the ip address so it directs resolver to
authoritative name server.
5. Authoritative name server is responsible for everything knowing about the domain
which includes ip address. it receives the query for resolver and respond with ip
address for yahoo.com and once resolver receives ip add ,stores it in its cache
memory in case of another query for yahoo.com, it doesn’t need go for all steps
again.
Ports:
Client-Side port: 68
Antivirus
● It is an application install to protect computer from malware
● Works on signatures(database of known malware file)
● Stops/cleans/delete malware excecution
● Actions of AV :Clean/delete/quarantine files after malware detection.
● We can set exclusion on AV
● There are 2 types scanning
1.On access-real time scanning(automatically)
2.On demand-scheduled/manual scan
Antivirus software detects and removes malware, such as viruses, Trojans,
and worms. Signature-based antivirus software detects known malware
based on signature definitions. Heuristic-based software detects previously
unknown malware based on behavior.
Vendor: Symantec,McAfee
Use Cases
1.Malware outbreak(same malware found in ‘n’ systems)
2.Multiple Viruses in single system
3.AV services are stopped
4.Trojan_ghost_CnC
MALWARE ANALYSIS:
Malware analysis is the study or process of determining the functionality, origin and
potential impact of a given malware sample such as a virus, worm, trojan horse, rootkit,
or backdoor
Malware or malicious software is any computer software intended to harm the host
operating system or to steal sensitive data from users, organizations or companies.
Malware may include software that gathers user information without permission.
Static Analysis: Basic static analysis examines malware without viewing the actual
code or instructions. It employs different tools and techniques to quickly determine
whether a file is malicious or not, provide information about its functionality and collect
technical indicators to produce simple signatures. Technical indicators gathered with
basic static analysis can include file name, MD5 checksums or hashes, file type, file size
and recognition by antivirus detection tools.
Dynamic Analysis: Basic dynamic analysis actually runs malware to observe its
behavior, understand its functionality and identify technical indicators which can be
used in detection signatures. Technical indicators revealed with basic dynamic analysis
can include domain names, IP addresses, file path locations, registry keys, additional
files located on the system or network.
In short Static VS Dynamic: In Short: Static analysis examines malware without
actually running it by different tools and techniques. Dynamic analysis (also known as
behavior analysis) executes malware in a controlled and monitored environment to
observe its behavior.
HTTP RESPONSE CODES:
Firewall
● It does allow/block any traffic
● It is ip and port filtering device
● It works on ACL(access control list) rules
● It has implicit deny rule by default
zone to zone src ip dest ip port action
INT EXT 10.1.1.1 53.3.3.4 80/443 deny/allow/drop
● It does stateful Inspection
● It works at layer 3 and layer 4
● It is inline with traffic
A Firewall is a device (or software feature) designed to control the flow of traffic into
and out of a network to prevent network attacks.
Vendor:Cisco ASA ,Symantec,Juniper,Fortigate
USE CASES
5.Bad ip communication
Use cases
1.High severity attack on several machines
Proxy(web security)
Reverse proxy:
As its name implies, a reverse proxy does the exact opposite of what a forward proxy
does. While a forward proxy proxies in behalf of clients (or requesting hosts), a reverse
proxy proxies in behalf of servers. A reverse proxy accepts requests from external
clients on behalf of servers stationed behind it just like what the figure below
illustrates.
HONEY POTS:
A honeypot is a form of trap security specialists use to detect hacking attacks or collect
malware samples.
Use cases
Web application firewalls help keep your servers safe from hackers by scanning activity
and identifying probes and attacks.
External-facing servers, resources and services are located in the DMZ so they are
accessible from the Internet but the rest of the internal LAN remains unreachable.
Use cases
1.Too many mails from /to a user
2.Too many large attachments
3.Sudden increase in spam mails
SYSLOG:
Syslog is a way for network devices to send event messages to a logging server – usually
known as a Syslog server. The Syslog protocol is supported by a wide range of devices
and can be used to log different types of events. For example, a router might send
messages about users logging on to console sessions, while a web-server might log
access-denied events.
Most network equipment, like routers and switches, can send Syslog messages. Not only
that, but *nix servers also have the ability to generate Syslog data, as do most firewalls,
some printers, and even web-servers like Apache. Windows-based servers don’t
support Syslog natively, but a large number of third-party tools make it easy to collect
Windows Event Log or IIS data and forward it to a Syslog server.
Malware includes a wide range of software that has malicious intent. Malware is not
software that you would knowingly purchase or download and install. Instead, it is
installed onto your system through devious means. Infected systems give various
symptoms, such as running slower, starting unknown processes, sending out email without
user action, random reboots, and more.
You might hear people use the term virus to describe all types of malware, but that isn’t
accurate. A virus is a specific type of malware, and malware includes many other types of
malicious software, including worms, logic bombs, Trojans, ransomware, rootkits, spyware,
and more.
Viruses
A virus is a set of malicious code that attaches itself to a host application. The host
application must be executed to run, and the malicious code executes when the host
application is executed. The virus tries to replicate by finding other host applications to
infect with the malicious code. At some point, the virus activates and delivers its payload.
Typically, the payload of a virus is damaging. It may delete files, cause random reboots, join
the computer to a botnet, or enable backdoors that attackers can use to access systems
remotely.
Worms
Logic Bombs
A logic bomb is a string of code embedded into an application or script that will execute in
response to an event. The event may be a specific date or time, when a user launches a
specific
program, or any event the programmer decides on.
Backdoors
Trojan
Botnets
A botnet combines the words robot and network. It includes multiple computers that act as
software robots and function together in a network (such as the Internet), often for
malicious
purposes. The computers in a botnet are called zombies and they will do the bidding of
whoever
controls the botnet.
Bot herders are criminals who manage botnets. They attempt to infect as many computers
as
possible and control them through one or more servers running command-and-control
software. The infected computers periodically check in with the command-and-control
servers, receive direction, and then go to work. The user is often unaware of the activity.
Most computers join a botnet through malware infection. For example, a user could
download
pirated software with a Trojan or click a malicious link, resulting in a drive-by download.
The malware then joins the system to a botnet.
● Send spam.
● Launch a distributed denial-of-service attack.
● Download additional malware, adware, or spyware such as keyloggers.
Rootkits
A rootkit is a group of programs (or, in rare instances, a single program) that hides the fact
that
the system has been infected or compromised by malicious code. A user may suspect
something is wrong, but antivirus scans and other checks may indicate everything is fine
because the rootkit hides its running processes to avoid detection.
In addition to modifying the internal operating system processes, rootkits often modify
system
files such as the Registry. In some cases, the rootkit modifies system access, such as
removing users’ administrative access.
Rootkits have system-level access to systems. This is sometimes called root-level access, or
kernel-level access, indicating that they have the same level of access as the operating
system.
Spyware
Spywareis software installed on users’ systems without their awareness or consent. Its
purpose
is often to monitor the user’s computer and the user’s activity. Spyware takes some level of
controlover the user’s computer to learn information and sends this information to a third
party. If spyware can access a user’s private data, it results in a loss of confidentiality.
Some examples of spyware activity are changing a user’s home page, redirecting web
browsers,
and installing additional software, such as search engines. In some situations, these
changes can slow a system down, resulting in poorer performance.
Adware
When adware first emerged, its intent was usually to learn a user’s habits for the
purpose of targeted advertising. As the practice of gathering information on users became
more malicious, morepeople began to call it spyware. However, some traditional adware
still exists.
A common type of adware is pop-ups. For example, while you are visiting a site, another
browser window appears, or pops up, with an advertisement. These pop-up windows
aren’t
malicious, but they are annoying.
Sometimes pop-ups can be helpful. As a legitimate example, my online bank has interest-
rate
information that I can view. When I click on this link, it pops up another
anothe window showing
the interestrate information without taking me away from the current page I’m viewing.
Ransomware
Dos attack
It is a common dos attack used against servers on the internet,it disrupts the TCP
handshake process and can prevent legitimate client from connecting, In syn flood attack
handshake by sending the ACK packet. Additionally ,the
,attacker never completes the handshake
attacker sends a barrage of SYN packets,leaving the server with multiple half-open
half
connections.
DDOS attack
A denial-of-service (DoS) attack is an attack from one attacker against one target. A
distributed
denial-of-service (DDoS) attack is an attack from two or more computers against a single
target.
DDoS attacks often include sustained, abnormally high network traffic on the network
interface card of the attacked computer. Other system resource usage (such as the
processor and memory usage) will also be abnormally high. The goal of both is to prevent
legitimate users from accessing services on the target computer. Many DoS and DDoS
attacks attempt to consume resources on the target computer. For example, a SYN
(synchronize) flood attack consumes memory resources by flooding a system with half-
open connections.
The MAC address is the physical address, or hardwareaddress, assigned to the network
interface card (NIC). ARP resolves the IP addresses of systems to their hardware address
and stores the result in an area of memory known as the ARP cache.
TCP/IP uses the IP address to get a packet to a destination network. Once the packet
arrives on the destination network, it uses the MAC address to get it to the correct host.
ARP uses two primary messages:
ARP request. The ARP request broadcasts the IP address and essentially asks, “Who has
this
IP address?”
ARP reply. The computer with the IP address in the ARP request responds with its
MACaddress. The computer that sent the ARP request caches the MAC address for the IP. In
manyoperating systems, all computers that hear the ARP reply also cache the MAC address.
Zero-Day Attacks
A zero-day attack is one that exploits an undocumented vulnerability. Many times, the
vendor isn’t aware of the issue. At some point, the vendor learns of the vulnerability and
begins to write and test a patch to eliminate it. However, until the vendor releases the
patch, the vulnerability is still a zero-day vulnerability.
Buffer overflows occur when an application receives more data than it can handle, or
receives unexpected data that exposes system memory. Buffer overflow attacks often
include NOP instructions (such as x90) followed by malicious code. When successful, the
attack causes the system to execute the malicious code. Input validation helps prevent
buffer overflow attacks.
SQL is the structure query language which maintain data base of application like user name
, password, and permission.
SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious
SQL statements (also commonly referred to as a malicious payload) that control a web
application’s database server (also commonly referred to as a Relational Database
Management System – RDBMS). Since an SQL Injection vulnerability could possibly affect
any website or web application that makes use of an SQL-based database, the vulnerability
is one of the oldest, most prevalent and most dangerous of web application vulnerabilities.
Cross-Site Scripting
To check if the site is vulnerable or not attacker put some client-side scripting languages,
such as HTML and JavaScript.
Cross-site scripting (XSS) is another web application vulnerability that can be prevented
with
input validation. Attackers embed malicious HTML or JavaScript code into an email or web
site
error message. If a user responds to the email or error message, it executes the code. Many
times, this gives the attacker access to user cookies or other information about the user.
Cross-site request forgery (XSRF or CSRF) is an attack where an attacker tricks a user into
performing an action on a web site. The attacker creates a specially crafted HTML link and
the user performs the action without realizing it.
Phishing
Phishing is the practice of sending email to users with the purpose of tricking them into
revealing personal information or clicking on a link. A phishing attack often sends the user
to a
malicious web site that appears to the user as a legitimate site.
The classic example is where a user receives an email that looks like it came from eBay,
PayPal, a bank, or some other well-known company. The “phisher” doesn’t know if the
recipient hasan account at the company, just as a fisherman doesn’t know if any fish are in
the water where he casts his line. However, if the attacker sends out enough emails, the
odds are good that someone who receives the email has an account.
The email may look like this:
“We have noticed suspicious activity on your account. To protect your privacy, we will
suspend your account unless you are able to log in and validate your credentials. Click here
to
validate your account and prevent it from being locked out.”
Phishing is a technique that deceit people to obtain data from users. The social engineer
tries to impersonate genuine website webpage like yahoo or face-book and will ask the
user to enter their password and account ID.
It can be prevented by
A technique used to scam people for information by impersonating a genuine site like
Facebook or Hotmail, to lure the user into entering their personal account and password
information.
Phishing is a type of social engineering attack often used to steal user data, including login
credentials and credit card numbers. Attacker sends malware through email (trick user to
click on a particular link) and once victim click on the link the malware gets installed to
their system.
Spear Phishing
Spear phishing is a targeted form of phishing. Instead of sending the email out to everyone
indiscriminately, a spear phishing attack attempts to target specific groups of users, or even
a singleuser. Spear phishing attacks may target employees within a company or customers
of a company.
Whaling
Whaling is a form of spear phishing that attempts to target high-level executives.
Vishing
Vishing attacks use the phone system to trick users into giving up personal and financial
information. It often uses Voice over IP (VoIP) technology and tries to trick the user similar
to other phishing attacks. When the attack uses VoIP, it can spoof caller ID, making it
appear as though the call came from a real company.
Privilege Escalation
Privilege escalation occurs when a user or process accesses elevated rights and
permissions.
When attackers first compromise a system, they often have minimal privileges. However,
privilege escalation tactics allow them to get more and more privileges.
Social engineering is the practice of using social tactics to gain information. It’s often low-
tech
and encourages individuals to do something they wouldn’t normally do, or causes them to
reveal
some piece of information, such as user credentials.
Shoulder Surfing
Shoulder surfing is simply looking over the shoulder of someone to gain information. The
goal is to gain unauthorized information by casual observation, and it’s likely to occur
within an office environment. This can be to learn credentials, such as a username and
password, or a PIN used for a smart card or debit card. Recently, attackers have been using
cameras to monitor locations where users enter PINs, such as at automatic teller machines
(ATMs).
Dumpster Diving
Dumpster diving is the practice of searching through trash or recycling containers to gain
information from discarded documents. Many organizations either shred or burn paper
instead of
throwing it away.
Impersonating
Some social engineers often attempt to impersonate others. The goal is to convince an
authorized
user to provide some information, or help the attacker defeat a security control.
Phases of Hacking
Reconnaissance
Reconnaissance is the phase where the attacker gathers information about a target using
active or passive means. The tools that are widely used in this process are NMAP, Hping,
Maltego, and Google Dorks.
Scanning
In this process, the attacker begins to actively probe a target machine or network for
vulnerabilities that can be exploited. The tools used in this process are Nessus, Nexpose,
and NMAP.
Gaining Access
In this process, the vulnerability is located and you attempt to exploit it in order to enter
into the system. The primary tool that is used in this process is Metasploit.
Maintaining Access
It is the process where the hacker has already gained access into a system. After gaining
access, the hacker installs some backdoors in order to enter into the system when he
needs access in this owned system in future. Metasploit is the preferred tool in this process.
Clearing Tracks
This process is actually an unethical activity. It has to do with the deletion of logs of all
the activities that take place during the hacking process.
Reporting
Reporting is the last step of finishing the ethical hacking process. Here the Ethical Hacker
compiles a report with his findings and the job that was done such as the tools used, the
success rate, vulnerabilities found, and the exploit processes.
Cyber kill Chain
Cyber Kill Chain framework is a model for identification and prevention of cyber-attacks.
The vulnerability assessment is prioritized based on the severity of the vulnerabilities and
their ability to affect the high value asset items. A vulnerability assessment checks for the
existence of security controls such as a password policy and can include a user rights and
access review to identify unused accounts, or accounts with unneeded permissions.
However, a vulnerability assessment identifies these issues, but does not make changes.
Risks
A risk is the likelihood that a threat will exploit a vulnerability. A vulnerability is a
weakness, and a threat is a potential danger. The result is a negative impact on the
organization. Impact refers to the magnitude of harm that can be caused if a threat
exercises a vulnerability.
For example, a system without up-to-date antivirus software is vulnerable to malware.
Malware written by malicious attackers is the threat. The likelihood that the malware will
reach a vulnerable system represents the risk. Depending on what the malware does, the
impact may be an unbootable computer, loss of data, or a remote-controlled computer that
has joined a botnet.
A risk assessment identifies assets, asset values, threats, and vulnerabilities. It prioritizes
the results and makes recommendations on what controls to implement. Risk cannot be
eliminated.
We use ipconfig to find the router's IP number. Once you have that, you can ping the router
to test if it is responsive. The problem with the ping command is that, while it is fast, is
doesn't give you a lot of information. For that, we use the tracert command, which will be
covered next.
This command is use for identify the host name (your computer name).
The whole of the data is calculated to summarize the percentage of packet loss and other
such information and the summarized data is then displayed, showing the number of
packets transmitted, received, percentage of packet loss, total time taken, the minimum,
average and maximum round-trip time.
4->tracert (How do I find packets path to destination across multiple hops)
The tracert command is used to visually see a network packet being sent and received and
the amount of hops required for that packet to get to its destination.
Each IP packet that you send on the internet has got a field called as TTL. TTL stands for
Time To Live. Although its called as Time To Live, its not actually the time in seconds, but
its something else.
TTL is not measured by the no of seconds but the no of hops. Its the maximum number of
hops that a packet can travel through across the internet, before its discarded.
Hops are nothing but the computers, routers, or any devices that comes in between
the source and the destination.
5->netstat
Displays active TCP connections, ports on which the computer is listening, Ethernet
statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols),
and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols).
Used without parameters, netstat displays active TCP connections
Specifically, the netstat command can show details about individual network connections,
overall and protocol-specific networking statistics, and much more, all of which could help
troubleshoot certain kinds of networking issues.
6->pathping
Provides information about network latency and network loss at intermediate hops
between a source and destination. Pathping sends multiple Echo Request messages to each
router between a source and destination over a period of time and then computes results
based on the packets returned from each router.
When you run the command (Pathping), it will first display the hops that it is going
through, basically the same process as a ‘Tracert‘ command line. Once the trace is complete,
Pathping displays a busy message for the next 100 seconds, variable depending on the
numbers of hops, while it is computing the information previously gathered from the
routers and the links between them.
7->arp
Displays, adds, and removes arp information from network devices.
8->nslookup
Displays information that you can use to diagnose Domain Name System (DNS)
infrastructure. Before using this tool, you should be familiar with how DNS works. The
Nslookup command-line tool is available only if you have installed the TCP/IP protocol.
9->getmac
DOS command used to show both local and remote MAC addresses. When run with no
parameters (ie. getmac) it displays MAC addresses for the local system. When run with the
/s parameter (eg. getmac /s \\foo) it displays MAC addresses for the remote computer.
When the /v parameter is used, it also displays the associated connection name and
network adapter name.
10->telnet
Telnet is software that allows users to remotely access another computer such as a server,
network device, or other computer. With telnet users can connect to a device or computer,
manage a network device, setup a device, transfer files, etc.
If this ping test passes, it means that your client machine can see the server machine. This
does NOT mean you can connect to the server machine.
Once the ping test passes, you can use Telnet to test if your client machine can connect to
the server machine. Use the following steps to perform this test
Confidentiality
Confidentiality ensures that data is only viewable by authorized users. If there is a risk of
sensitive data falling
into the wrong hands, it should be encrypted to make it unreadable. Any data should be
protected with access
controls to enforce confidentiality.
Integrity
Integrity is used to verify that data has not been modified, and loss of integrity can occur
through
unauthorized or unintended changes. Hashing algorithms such as MD5, HMAC, or SHA1 can
calculate hashes to
verify integrity. A hash is simply a number created by applying the algorithm to a file or
message at different
times. The hashes are compared to each other to verify that integrity has been maintained.
Availability
Availability indicates that data and services are available when needed. For some
companies, this simply means
that the data and services must be available between 8 a.m. and 5 p.m., Monday through
Friday. For other
companies, this means they must be available twenty-four hours a day, seven days a week,
365 days a year.
● OWASP 10
A1:2017-Injection
Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when untrusted data is
sent to an interpreter as part of a command or query. The attacker's hostile data can trick
the interpreter into executing unintended commands or accessing data without proper
authorization.
A2:2017-Broken Authentication
Many web applications and APIs do not properly protect sensitive data, such as financial,
healthcare, and PII. Attackers may steal or modify such weakly protected data to conduct
credit card fraud, identity theft, or other crimes. Sensitive data may be compromised
without extra protection, such as encryption at rest or in transit, and requires special
precautions when exchanged with the browser.
Many older or poorly configured XML processors evaluate external entity references within
XML documents. External entities can be used to disclose internal files using the file URI
handler, internal file shares, internal port scanning, remote code execution, and denial of
service attacks.
Restrictions on what authenticated users are allowed to do are often not properly enforced.
Attackers can exploit these flaws to access unauthorized functionality and/or data, such as
access other users' accounts, view sensitive files, modify other users' data, change access
rights, etc.
A6:2017-Security Misconfiguration
Security misconfiguration is the most commonly seen issue. This is commonly a result of
insecure default configurations, incomplete or ad hoc configurations, open cloud storage,
misconfigured HTTP headers, and verbose error messages containing sensitive
information. Not only must all operating systems, frameworks, libraries, and applications
be securely configured, but they must be patched/upgraded in a timely fashion.
XSS flaws occur whenever an application includes untrusted data in a new web page
without proper validation or escaping, or updates an existing web page with user-supplied
data using a browser API that can create HTML or JavaScript. XSS allows attackers to
execute scripts in the victim's browser which can hijack user sessions, deface web sites, or
redirect the user to malicious sites.
A8:2017-Insecure Deserialization
Insecure deserialization often leads to remote code execution. Even if deserialization flaws
do not result in remote code execution, they can be used to perform attacks, including
replay attacks, injection attacks, and privilege escalation attacks.
Components, such as libraries, frameworks, and other software modules, run with the same
privileges as the application. If a vulnerable component is exploited, such an attack can
facilitate serious data loss or server takeover. Applications and APIs using components
with known vulnerabilities may undermine application defenses and enable various
attacks and impacts.
A10:2017-Insufficient Logging&Monitoring
Insufficient logging and monitoring, coupled with missing or ineffective integration with
incident response, allows attackers to further attack systems, maintain persistence, pivot to
more systems, and tamper, extract, or destroy data. Most breach studies show time to
detect a breach is over 200 days, typically detected by external parties rather than internal
processes or monitoring.
Incident Resolution:
P1 – 1 hour
P2 – 1 day
P3 – 2 days
P4 – 1 week
Recommendation:
1.Check the reason for failure in Source and if any Passwords Saved.
Backdoor activity
Impact:
1. This attack could pose a serious security threat as the source is trying to access
destination through a backdoor port 3198.
2. Target IP (10.60.1.217) seems to be an internal IP, please verify why the source is trying
to access the same through backdoor port.
3. Backdoors can be used bypass security policies and May enable hackers to take total
control over the system.
Recommendation:
3. If the port is assigned for any particular application, change the same to some other port
and block the access through backdoor port.
4. As a workaround remove the infected machines (If any) from network so that the virus
cannot propagate and Please run full system scan manually and ensure that no files are
infected with virus/worm.
5. Make sure that the antivirus is updated and network shares are protected by strong
passwords.
Web Crawlers activities
Impact:.
1.Kindly check the source address and review the contents of the robots.txt file to
check if the information is consistent with the policies of the organization. 2.If the
source is not legitimate, kindly block at perimeter firewall level.
ECS is the core service responsible for event collection and event processing for
Qradar.
ECS is comprised of three core components:
Event Collector component
Custom Rules Engine (CRE): The Custom Rules Engine (CRE) is responsible for
processing events received by QRadar and comparing them against defined rules,
keeping track of systems involved in incidents over time, generating notifications to
users and generating offenses.
• Streaming: Responsible for sending real-time event data to the Console when a
user is viewing events from the Log Activity tab with Real time (streaming).
Streamed events are not provided from the database.
• Event storage (Ariel): A time series database for events and flows where data is
stored on a minute by minute basis. Data is stored where the event is processed.
The Magistrate Processing Core (MPC) is responsible for correlating offenses with event
notifications from multiple Event Processor (EP) components. Only the Console will
have a Magistrate component.
• Offense rules: Monitors and takes actions on offenses, such as generating email
notifications.
• Offense management: Updates active offenses, transitioning inactive offenses to
active and provides access to offense information to the user through the Offenses
tab.
• Offense storage: Writes offense data to a Postgres database.
User interface tabs Functionality is divided into tabs.
The Dashboard tab is displayed when you log in. You can easily navigate the tabs to locate
the data or functionality you require.
Dashboard tab :The Dashboard tab is the default tab that is displayed when you log in. The
Dashboard tab provides a workspace environment that supports multiple dashboards on
which you can display your views of network security, activity, or data that QRadar collects.
Five default dashboards are available. Each dashboard contains items that provide
summary and detailed information about offenses that occur on your network. You can also
create a custom dashboard to allow you to focus on your security or network operations
responsibilities. For more information about using the Dashboard tab, see Dashboard
management.
Offenses tab :The Offenses tab will allow you to view offenses that occur on your network,
which you can locate by using various navigation options or through powerful searches.
From the Offenses tab, you can investigate an offense to determine the root cause of an
issue. You can also resolve the issue. For more information about Offenses tab, see Offense
management.
Log activity tab: The Log Activity tab will allow you to investigate event logs being sent to
QRadar in real-time, perform powerful searches, and view log activity by using
configurable time-series charts. The Log Activity tab will allow you to perform in-depth
investigations on event data. For more information, see Log Activity investigation.
Network activity tab :Use the Network Activity tab to investigate flows that are sent in
real-time, perform powerful searches, and view network activity by using configurable
time-series charts. A flow is a communication session between two hosts. Viewing flow
information will allow you to determine how the traffic is communicated, what is
communicated (if the content capture option is enabled), and who is communicating. Flow
data also includes details such as protocols, ASN values, IFIndex values, and priorities. 6
QRadar User Guide For more information, see Network activity investigation.
Assets tab:QRadar automatically discovers assets, servers, and hosts, operating on your
network. Automatic discovery is based on passive flow data and vulnerability data,
allowing QRadar to build an asset profile. Asset profiles provide information about each
known asset in your network, including identity information, if available, and what services
are running on each asset. This profile data is used for correlation purposes to help reduce
false positives. For example, an attack tries to use a specific service that is running on a
specific asset. In this situation, QRadar can determine whether the asset is vulnerable to
this attack by correlating the attack to the asset profile. Using the Assets tab, you can view
the learned assets or search for specific assets to view their profiles.
Reports tab :The Reports tab will allow you to create, distribute, and manage reports for
any data within QRadar. The Reports feature will allow you to create customized reports
for operational and executive use. To create a report, you can combine information (such
as, security or network) into a single report. You can also use preinstalled report templates
that are included with QRadar. The Reports tab also will allow you to brand your reports
with customized logos. This customization is beneficial for distributing reports to different
audiences. For more information about reports, see Reports management.
Integration steps
Rules Creation
Arcsight siem details
ESM collects, normalizes, aggregates, and filters millions of events from thousands of assets
across your network into a manageable stream that is prioritized according to risk,
vulnerabilities, and the criticality of the assets involved. These prioritized events can then
be correlated, investigated, analyzed, and remediated using ESM tools, giving you
situational awareness and real-time incident response time.
As the name itself implies the usage of this tool is that it adds value to your organization
security policies. Using this tool, it will help the organizations to focus on the threat
detection, analysis on the triages, compliance management. All of these are done on SIEM
platform where it actually reduces the time taken to resolve a cybersecurity threat.
Smart Connector :
FlexConnector
The FlexConnector framework is a software development kit (SDK) that enables you to
create your own SmartConnector tailored to the nodes on your network and their specific
event data. FlexConnector types include file reader, regular expression file reader, time-
based database reader, syslog, and Simple Network Management Protocol (SNMP) readers.
For more information about FlexConnectors and how to use them, contact your ArcSight
customer service representative.
Forwarding Connector
Arcsight Manager :
The Correlation Optimized Retention and Retrieval (CORR) Engine is a proprietary data
storage. ESM organizes event by date and stores in Corr Engine as per event retention
period. Correlation of events takes place in Corr Engine and then archived for long term
use.
ArcSight Console:
Arcsight Web :
Pattern Discovery :
ArcSight Express :
Separately licensed. It’s a all in one appliance, a powerful threat detection, response and
compliance management platform.
Basically, ArcSight Express provides the same functionalities that they do at ArcSight ESM
but at a very much smaller scale. ArcSight Express analyzes threats within a database and
provides possible action item.
Arcsight Logger
ArcSight Logger is an event data storage appliance that is optimized for extremely high
event throughput. Logger stores security events on board in compressed form, but can
always retrieve unmodified events on demand for historical analysis-quality litigation data.
Logger can be deployed stand-alone to receive events from syslog messages or log files, or
to receive events in Common Event Format from SmartConnectors. Logger can forward
selected events as syslog messages to ESM.
Store data for long time period. Store data in compressed form but can always retrieve
historical event data for analysis purpose.
So using this solution, topics like compliance and risk management are taken into due
consideration. Also, the data can be used for searching, indexing, reporting, analysis
purposes and retention as well.
The main use of ArcSight Logger is to capture or stream real-time data and categorize them
into different buckets of specific logs.
Express ESM
Express is an appliance delivered ESM is a software install delivered
solution solution
Threat detector is not available Threat detector is available on purchase
EPS 2500 EPS 10000
Aggregation
SIEM platforms collect data from thousands of different sources because these events
provide the data we need to analyze the health and security of our environment. In order to
get a broad end-to-end view, we need to consolidate what we collect onto a single platform.
Aggregation is the process of moving data and log files from disparate sources into a
common repository. Collected data is placed into a homogenous data store – typically
purpose-built flat file repositories or relational databases – where analysis, reporting, and
forensics occur; and archival policies are applied.
The process of aggregation – compiling these dissimilar event feeds into a common
repository – is fundamental to Log Management and most SIEM platforms. Data
aggregation can be performed by sending data directly into the SIEM/LM platform (which
may be deployed in multiple tiers), or an intermediary host can collect log data from the
source and periodically move it into the SIEM system. Aggregation is critical because we
need to manage data in a consistent fashion: security, retention, and archive policies must
be systematically applied. Perhaps most importantly, having all the data on a common
platform allows for event correlation and data analysis, which are key to addressing the use
cases we have described.
There are some downsides to aggregating data onto a common platform. The first is scale:
analysis becomes exponentially harder as the data set grows. Centralized collection means
huge data stores, greatly increasing the computational burden on the SIEM/LM platform.
Technical architectures can help scale, but ultimately these systems require significant
horsepower to handle an enterprise’s data. Systems that utilize central filtering and
retention policies require all data to be moved and stored – typically multiple times –
increasing the burden on the network.
Some systems scale using distributed processing, where filtering and analysis occur outside
the central repository, typically at the distributed data collection point. This reduces the
compute burden on the central server and allows processing to occur on smaller, more
manageable data sets. It does require that policies, along with the code to process them, be
distributed and kept current throughout the network. Distributed agent processes are a
handy way to “divide and conquer”, but increase IT administration requirements. This
strategy also adds a computational burden o the data collection points, degrading their
performance and potentially slowing enough to drop incoming data.
Data Normalization
If the process of aggregation is to merge dissimilar event feeds into one common platform,
normalization takes it one step further by reducing the records to just common event
attributes. As we mentioned in the data collection post, most data sources collect exactly
the same base event attributes: time, user, operation, network address, and so on. Facilities
like syslog not only group the common attributes, but provide means to collect
supplementary information that does not fit the basic template. Normalization is where
known data attributes are fed into a generic template, and anything that doesn’t fit is
simply omitted from the normalized event log. After all, to analyze we want to compare
apple to apples, so we throw away an oranges for the sake of simplicity.
Depending upon the SIEM or Log Management vendor, the original non-normalized records
may be kept in a separate repository for forensics purposes prior to later archival or
deletion, or they may simply be discarded. In practice, discarding original data is a bad idea,
since the full records are required for any kind of legal enforcement. Thus, most products
keep the raw event logs for a user-specified period prior to archival. In some cases, the
SIEM platform keeps a link to the original event in the normalized event log which provides
‘drill-down’ capability to easily reference extra information collected from the device.
Normalization allows for predicable and consistent storage for all records, and indexes
these records for fast searching and sorting, which is key when battling the clock in
investigating an incident. Additionally, normalization allows for basic and consistent
reporting and analysis to be performed on every event regardless of the data source. When
the attributes are consistent, event correlation and analysis – which we will discuss in our
next post – are far easier.
Technically normalization is no longer a requirement on current platforms. Normalization
was a necessity in the early days of SIEM, when storage and compute power were
expensive commodities, and SIEM platforms used relational database management systems
for back-end data management. Advances in indexing and searching unstructured data
repositories now make it feasible to store full source data, retaining original data, and
eliminating normalization overhead.
Connector Types
1. Smart connector
2. Flex connector
3. Forwarding connector
Smart Connectors
After collecting event data from network nodes, they normalize the data in two ways:
● Normalizing values (such as severity, priority, and time zone) into a common format
and
● Normalizing the data structure into a common schema.
Smart Connectors can then filter and aggregate events to reduce the volume of events sent
to the Manager, which increases ESM’s efficiency and accuracy, and reduces event
processing time.
Smart Connectors enable you to execute commands on the local host, such as instructing a
scanner to run a scan.
Smart Connectors also add information to the data they gather, such as looking up IP
and/or host names in order to resolve IP/host name lookup at the Manager.
SmartConnectors maintain a heartbeat with the Manager every 10 seconds. The Manager
sends back any commands or configuration updates it has for the SmartConnector. The
SmartConnector sends new event data to the Manager in batches of 100 events, or once
every second, whichever comes first. The time and event count intervals are all
configurable.
FlexConnector
The FlexConnector framework is a software development kit (SDK) that enables you to
create your own
SmartConnector tailored to the nodes on your network and their specific event data.
FlexConnector types include file reader, regular expression file reader, time-based
database reader, and syslog and Simple Network Management Protocol (SNMP) readers.
Forwarding Connector
2. Memory 16-36GB
Field Sets
Field sets are a way to limit the columns that are displayed in the active channel grid
anywhere event
fields can be selected, such as the CCE and variables editors. They are an index of certain
field names
that you can create and save so that you don't have to sift through more than 400 event
fields to get to
the ones you are interested in when monitoring and investigating, or building content for a
specific use
case.
You can also create field sets for other places where event fields appear, such as in the
resource editors
displayed in the Inspect/Edit panel for filters, rules, data monitors, and Pattern Discovery.
ESM comes with field sets already defined in the All Field Sets/ArcSight System folder,
which
you can use as is, or create your own.
ArcSight Pattern Discovery is a separately licensed module you can activate in ESM that
applies data mining techniques to event flows in order to detect patterns of behavior that
may indicate previously unknown threats.
Rules and data monitors enable you to detect patterns or specific threats you know could
happen. Pattern Discovery automatically identifies patterns that occur in the event flow
that you don't know about or suspect.
This makes Pattern Discovery a vital tool for preventive maintenance and early detection in
your ongoing security management operations. This also makes Pattern Discovery a
valuable tool for identifying normal patterns of activity on your network.
Using periodic, scheduled analysis, you can always be scanning for new patterns over
varying time intervals to stay ahead of new exploit behavior. Once the system discovers a
pattern, you can take
Action on it, such as adding a system to an active list, opening a case, or notifying another
user. Or you can discard the pattern if you determine that no threat is evident.
As part of set up and tuning, you can use Pattern Discovery to profile patterns of normal
activity on established networks or newly protected networks, such as new customer
groups, or new divisions for large corporations. Once these normal patterns are identified,
you can mask them out, so the system can then concentrate on finding patterns that are not
normal.
Pattern Discovery operates on the same events that the correlation tools do. But while
correlation runs continuously, Pattern Discovery analyzes blocks of time (hour, day, week,
month, and so on) when searching for patterns, so it is run on demand or on a regular
schedule. Depending on the volume of events going through your system, Pattern
Discovery can be run once a day or every few hours to provide complete coverage of all
system traffic.
A security event is any observable occurrence that is relevant to information security. This
can include attempted attacks or lapses that expose security vulnerabilities.
Active List
How to create report
Now Need to create a query
Push/Pull example with common connectors (one is not longer supported though):
1. Push - Syslog connector - Here you configure the source to PUSH required logs to
your log location (e.g. system where your syslog connector is installed).
2. Pull - Windows Unified Connector (not recommended anymore, please use WEF
instead) - Here you configure the connector to PULL from your desired log source
systems.
QUESTIONS