3.1.1 GIVEN A SCENARIO, ANALYZE DATA AS PART OF SECURITY MONITORING ACTIVITIES (part 1)

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/41

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

42 Terms

1
New cards
Heuristic Analysis
• Uses a rules created from a knowledge base and then determines likelihood of data being harmful
2
New cards
Signature Based Analysis
• Makes comparisons to traffic from known attack patterns in a database or file
3
New cards
Anomaly Based
• Compares traffic to what 'normal' looks like to determine if it is harmful
4
New cards
Trend Analysis
• Enhances security, growth planning and Risk Management by studying past results to understand future outcomes
5
New cards
Malware Analysis
• Analysing potentially harmful data in a safe environment to assess if it is a threat
6
New cards
Reverse Engineering Tools
Disassemblers, Decompilers, Unpackers and String Analysis are all types of this
7
New cards
Windows Memory Analysis Tools
2 Types which are Resource Monitor which shows Hardware and Software Memory usage and
8
New cards
• Autorun which shows executables that will run at login/startup

9
New cards
Linux Memory Analysis Tools
• ps: Show process statuses and information about them.
10
New cards
• -A or -e : Display all processes, not just the current user's.

11
New cards
• -ef or -ely : Similar to above, but displays detailed information.

12
New cards
System and Application Behaviour (Windows)
• There should only be one instance of winnit.exe and services.exe as they handle drivers and services
13
New cards
System and Application Behaviour Processess
• We can check for processes running under suspicious circumstances (netcat) or make sure the proper ports are being used
14
New cards
Dropper
• A Trojan Exploit Technique that will 'drop' a piece of malware onto a system, which is harder to detect because the payload is encrypted.
15
New cards
• Downloader is a type of this that requires internet access

16
New cards
Shell Code
• An exploit technique whereby instructions are injected onto and then run by the host
17
New cards
Masquerading (Code and Injection)
• An exploit technique where genuine code is replaced by malicious one
18
New cards
DLL Injection (Code and Injection)
• This is where a legit process is forced to run a malicious DLL
19
New cards
"Living off the Land" (Code and Injection)
• An exploit technique whereby malware takes over a legitimate processes and tools making it harder to detect as they are whitelisted
20
New cards
File System
• We need to monitor the integrity of files (tripware and checksums)
21
New cards
User and Entity Behavior Analytics (UEBA)
• A method that is useful to detect insider threats by tracking users and machine accounts and flagging anomalies
22
New cards
URL and DNS Analysis
• Commonly we blacklist/whitelist parts of the internet to control what internets with our internal network
23
New cards
Domain Generation Algorithm (DGA)
• Method used by attackers/malware to avoid blacklisting
24
New cards
URL Analysis and Percent Coding
• Changing Characters to a hexadecimal version to get around content filters and hide XSS and other attacks
25
New cards
Http Response Codes (URL Analysis)
• 100-199: Informational response • 200-299: Successful response (e.g. 200 \= OK)
26
New cards
• 300-399: Redirects (e.g. 307 \= Temporary redirect)

27
New cards
• 400-499: Client-side error (e.g. 404 \= Page/File not found)

28
New cards
• 500-599: Server-side error (e.g. 500 \= Internal server error)

29
New cards
Http methods
GET / POST / PUT / HEAD /
30
New cards
Flow Analysis
Looking at network traffic statistics instead of payloads and using a visualisation tool to map network connections
31
New cards
Flow Analysis Tools
• Net Flow/IPFlow Information expert (IPFIX)
32
New cards
• sFlow

33
New cards
• Zeek

34
New cards
• Multi Router Traffic Grapher (MRTG)

35
New cards
Packet and Protocol Analysis
• E.g. Wireshark allows us to analyse traffic, payloads, headers, frames to see if there is anything suspicious
36
New cards
Log Review Tools
• Event Logs
37
New cards
• Firewall Logs

38
New cards
• WAF

39
New cards
• Proxies

40
New cards
• IDS/IPS

41
New cards
Syslog
• Port 514 UDP
42
New cards
• A way to define severity levels from logs/event messages sent from various network devices to a central server