Zeroska
  • 🐱Zeroska - The Bold
  • Computer/Cyber Security
    • ⭐Fresh off the boat - for new Blue Teamer/ SOC Analyst
    • 💀Necromancer (DFIR)
      • 🕵️DFIR and DFIR case
        • 🗃️Case Files
          • Misconfiguration 0x01
      • 📔My own DFIR notes
        • The Mark of The Web (MOTW)
        • LNK Shortcut
        • Prefetch, AmCache, ShimCache in Windows
        • Malicious Document (VBA, Office, PDF, ...)
        • SRUM (System Resource Usage Monitor)
        • Volatility notes
        • Understand Logon Session in Windows
        • "Very" Hidden sheets in Excel
        • Hidden Processes
      • 📔Notes
        • Useful Resources
        • Useful Resources DFIR
        • Saved Content (Backup for the OG content get deleted)
          • How to be best SOC analyst ever
    • 🧙‍♂️Defense Witchcraft
      • Data Analysis as a Defender
      • Active Directory
      • Windows Event Logs
        • Authentication (Windows Account Life Cycle Events)
      • MS Exchange
      • Windows
    • 💙My Current Blue Team Operation
      • VLAN Monitoring Template
      • Daily Monitoring Report
      • General Playbook
      • JupyterHub Configuration Guide
      • How to train your Blue Team
    • 🏭ICS/OT
      • Setup ICS/OT Simulation Learning Lab
      • Smart Grids
      • Learning Modbus TCP
      • Learning DNP3
      • Resources/Blogs/Links
    • 🥷Threat Intelligence
      • Small Cyber Threat Intelligence Program
      • Intelligence Analysis [VN]
      • OSINT Information Monitoring
        • Telegram Info-Stealer Monitoring
      • C2 Tracker
      • Fake Website Tracker
      • Dark Web Investigation Attempt
      • Threat Intelligence Quick Win
      • Resources/Blogs/Links
  • 😒Computer and Technology
    • My Home Lab Setup
    • 🐴ELK Stack
      • Useful Resources
      • ELK Stack - Container - Docker Compose - AWS ECS
      • ECS - Elastic Common Schema
      • Elasticsearch
      • Logstash
      • Troubleshooting and Problems
    • 🐧Linux
      • Setting up good SSH Authentication
      • Configure Auditd and how to leverage it
      • ELF Format
      • Useful Links
    • 📦Containers
      • Docker container logs is quite big
      • Worth Reading
    • 🪠Splunk Learning Experience
      • Splunk Test Lab
      • Data Collection Tier (How to get the data)
      • SC4S Custom Filter For Windows Event Log in Syslog Format (NXLog)
      • Useful Resources
  • Threat Hunting
    • Hunting for Implant
    • Using STRIDE and DREAD
    • 🐳Predators and Preys (Computing)
      • Tracks or Hunting Artifacts
    • 📦Network Packet Analysis
      • The Basic
      • Tshark | Zeek Copy & Paste
      • Network Analysis Resources
    • Grep | Powershell Search | Regex
    • Hunting Resources
  • 🎵In my remains
    • Choices
    • The Art of Facing Unknown Problems
    • Build the best DFIR team
    • Reverse Engineering - Đồ án hướng ngành A "Hụt" của tôi
Powered by GitBook
On this page
  • Overview
  • 1. Internet-facing servers/services
  • 2. Understand Windows and Linux
  • 3. Email
  • 4. Logging
  • Log Format
  • How much log is enough?
  • 5. Build your own dashboard
  • 6. Familiar with the ticketing system
  • Dashboard Design
  • Data Statistic
  • 7. Get to know the people
  • 8. Learning Structured Analytic
  • Conclusion

Was this helpful?

  1. Computer/Cyber Security

Fresh off the boat - for new Blue Teamer/ SOC Analyst

When you are on the new system and you don't know a thing about it, here is a checklist to improve your visibility and its condition or you just a fresher blue team and just want to learn.

PreviousZeroska - The BoldNextNecromancer (DFIR)

Last updated 1 year ago

Was this helpful?

Cyber Kill Chain is the keyword you should look at -> it describes how an attacker will normally do, MITRE ATT&CK will help you know about the detail of each step of the Kill Chain (the ATT&CK  is not a list of all threat actor techniques in the world but it is a list of known techniques)

NIST Framework is the place you want to look for first, get the guideline clear and correct, and play it to your system, for me the first important step is to IDENTIFY your environment.

Overview

This is the list that I would always check when I got to a new system/network. I know that this list can't give you a well-rounded look at the system but it will make you think and gain knowledge of the system that you are working with -> and plan the improvement or find something that is not right in the system

Reading the system audit checklist and book is good you should read it, the guide is my own thought before I know about system audits.

1. Internet-facing servers/services

This is the first thing hacker can get their hand on, it is public to the internet so it is crucial that you understand and know these things (How many are there in your system)

  • Server's operating system (How many Linux, Windows, Mac, and its versions?)

  • Number Web application services (What are the technologies that are being used to build those websites?)

  • Number of Web servers (IIS, Apache, Nginx)

  • Domain (how many subdomains?)

  • 5-tuples (Src, Dest IP Address, Src, Dest Port, Protocol)

  • Are there any remote access services that are public to the internet (RDP, VNC, VPN, SSH)

  • Firewall

2. Understand Windows and Linux

Set up a lab and start poking around, you can create a lab as below, don't mind the AWS part just use VMware or VirtualBox or Docker Container to do it, and you will learn a lot.

3. Email

Most of the attacks come from BES (Business Email Compromise).

Small companies don't have the luxury of buying email services, they will self-hosted and will not have a protection system so there will be no filter or any security measure against the top vector of attack which is Email Phishing -> You need to look for Email system and its data flow.

Understand Email Header and how to investigate a phishing ticket

4. Logging

That is the data that you are collecting for your SIEM (If you don't have one, build one) -> ELK is a great start, and start ingesting logs to that instance and play around with it, such as what if you use PowerShell what logs does it generate? what is event ID, and what are the best practices to use that log -> any detection that could use this log source

Ref:

It is essential, logging is an act of mercy for you and your company, if you do not collect enough logs you will lose your visibility on your system. If your SIEM can handle the sheer amount of logs that pour in then good -> You will learn a lot by analyzing those data

A better understanding of the log source or the data source will better your detection and your DFIR process later on. I mean you should know what the data source provides you information as IP Address, process execution time when it first appears on the system, does the process communicates to the Internet, and so on.

Don't be scare, you will have time and mentor to guide you, and if not then it is ok, you still have a lot of time to familiar yourself with all of this 😘.

Log Format

You must learn about the log format

  • Syslog

    • Snare

    • BSD

    • IETF

  • Windows Event Log

  • Product Logs -> which is the log that is generated specifically for your company's product or vendor's product

How much log is enough?

You need to understand which log has high value and what are their use case, for example why you collect Event ID 4688 (search the internet and come back to these blogs and tell me why)

After you understand those concepts, now you need to understand how much data is enough

The number of logs you want to ingest is based on

5. Build your own dashboard

So you don't know how to do data analysis, but you have an account on SIEM and you can create your own shit then "Hell Yah" -> Create your own shit

So why build your own dashboard and why can I use the default or someone else dashboard, oh you could use the default and be done with it but that's not why you're here, you want to be better, you hunt for hackers not the other way around -> BUILD YOU OWN DASHBOARD (For a small scope first -> build dashboard for a VLAN first)

The benefit of that is

  • You know what you are looking at, the data source, you know what you are monitoring

  • You can quickly learn how the data in that VLAN or System

  • You can statistically create a baseline (What computer is talking to, how often it does that, and many more questions that you could come up with your own)

6. Familiar with the ticketing system

Most of the time if you are a young analyst you will have to do ticketing (case management) I don't like this but this is something you must do, although it is the simplest form of security task it is also one of the most important ones)

Here is a chart for you to understand

Dashboard Design

Just don't use the pie chart

Data Statistic

I mean you need to know these, understanding how to do basic statistics will help you a lot

7. Get to know the people

Okay, It is true that you need to have a list of systems and who is the owner of it, and learn by asking what is normal to them.

Join a community and follow people on Twitter, here are some channels, and people you need to follow

Twitter

  • SANS (all of the accounts that belong to SANS Institute)

Many More will be added

Telegram

Discord

Many more will be added

8. Learning Structured Analytic

Conclusion

You don't have to learn all these things at once, pick one of them and start digging around for information using keywords that you find in other blogs, threads, or even this blog.

Don't be afraid to ask others for help.

Always asking why, no matter how dumb it is at the first time.

(Logging for application)

(NIST about logging management)

Black Hills Information Security () -> Great Team 10/10, a lot of tutorials and helpful videos, good community

vx-underground ()

Netresec (About computer networking)

Mandiant ()

The DFIR Report ()

Cyber Monk ()

Shadow Server ()

CISA ()

Florian Roth ()

Sergio Caltagirone ()

Red Canary ()

Gynvael ()

Black Hills Information Security ()

DFIR ()

OALabs

Threat Hunter

Splunk Test Lab
https://cheatsheetseries.owasp.org/cheatsheets/Logging_Cheat_Sheet.html#introduction
https://csrc.nist.gov/publications/detail/sp/800-92/final
https://twitter.com/BHinfoSecurity
https://twitter.com/vxunderground
https://twitter.com/netresec
https://twitter.com/Mandiant
https://twitter.com/TheDFIRReport
https://twitter.com/Cyb3rMonk
https://twitter.com/Shadowserver
https://twitter.com/CISACyber
https://twitter.com/cyb3rops
https://twitter.com/cnoanalysis
https://twitter.com/redcanary
https://discord.gg/JXyKVpxzgf
https://discord.gg/bhis
https://discord.gg/digitalforensics
https://discord.gg/oalabs
https://discord.gg/threathunter
⭐
Page cover image
If you enable it to log and the application actually write log
Example Dashboard