5B. Network-related IoCs obj 4.3 Flashcards

1
Q

Network flows

A

Information gathered from capturing traffic data that passes through inline devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Netflow

A

A standard for monitoring traffic flows. They collect metadata about traffic at network device interfaces and then send the info to flow collectors for analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Active monitoring

A

techniques that reach out to remote systems/devices to gather data. Collects data about:
- availability
- routes
- packet delay/loss
- bandwidth

e.g., Pings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Passive monitoring

A

relies on capturing information as traffic passes a location and uses a tap to send a copy of the traffic between two endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network Monitoring tools

A

SNMP
- protocol for sending information and events as SNMP traps

WMI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DRDoS

A

Distributed Reflection DoS
- network-based attack where the attacker dramatically increases the bandwidth sent to a victim during a DDoS attack by implementing an amplification factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Beaconing

A
  • activity that is sent to a C2 over HTTP/S.
  • Difficult to spot as it blends in with other traffic + encrypted.
  • IPS/IDS to detect
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Indicators of DoS

A
  • traffic spike
  • excessive number of TIME_WAIT connections
  • high number of HTTP 503 errors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Beaconing detection

A
  • capture metadata about all sessions established or attempted and analyse for patterns the indicate suspicious activity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Internet Replay Chat (IRC) (C2)

A

Communication protocol commonly used by adversaries for C2 communication.
- Easy to detect and often blocked by orgs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HTTP and HTTPS (C2)

A

Cannot be blocked by orgs as it is a necessity.
- hard to distinguish C2 traffic from normal traffic
- encrypted

Can be mitigated by using proxy that intercepts, decrypts and inspects traffic, and re-encrypt only legitimate traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Domain Name Systen (DNS) (C2)

A
  • DNS not inspected/filtered in private networks
  • Commands are sent via request or response queuries
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How to detect DNS (C2)

A

Adversaries will break their control msgs into several query chunks to avoid detection.

  • lookout for long, complicated queries
  • lookout for repeated queries
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Social Media Websites (C2)

A
  • issue commands via messaging functionality or account profiles
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cloud services (C2)

A
  • scalable and reliable cloud structures are attractive to adversaries
  • can be free to use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Irregular peer-to-peer communications

A
  • indicates hosts within a network that have established a connection over unauthorised ports or data transfers
  • Server Message Block (SMB)
17
Q

ARP spoofing/poisoning

A

attacker redirects an IP address to a MAC address that was not its intended destination

18
Q

Rogue devices and mitigation

A

An unauthorised device on a private network (e.g., WAP, DHCP) that allows someone to connect to the network.
- Mitigate by using digital certificates on endpoints and servers to authenticate and encrypt traffic using IPSec or HTTPS

19
Q

Examples of Rogue systems

A
  • network taps
  • WAPs
  • Servers
  • software
  • wired/wireless clients
  • VMs
  • smart appliances
20
Q

Techniques to perform Rogue Machine Detection

A
  • Visual inspection of ports/switches
  • network mapping/host discovery
  • wireless monitoring (i.e., observing for unknown SSIDs)
  • packet sniffing/traffic flow (observing use of unauthorised protocols and unusual peer-to-peer comm flows
  • NAC/intrusion detection
21
Q

Fingerprinting

A

identifying type/version of OS (or server application) by analysing its responses to network scans

22
Q

Sweep

A

scan directed at multiple IP addresses to discover whether a host responds to connection requests to certain ports

23
Q

Footprinting

A

Phase of attack where information about the target is gathered before attacking

24
Q

mismatched port

A

Communicating non-standard traffic over a well-known or registered port

25
Q

Well-known Ports are in what range?

A

0-1023

26
Q

Registered Ports are in what range?

A

1024-49151

27
Q

Dynamic Ports are in what range?

A

49152-65535 (regular use of these ports may indicate malicious activity)

28
Q

Non-standard port

A

Communicating TCP/IP traffic over a port that is not intended for that protocol

29
Q

IoCs (Non-standard port)

A
  • use of a non-standard port when a well-known port is already established for that protocol
  • malware might use a non-standard port other than 53 for DNS traffic
  • mismatched port
30
Q

Mitigation (Non-standard port)

A
  • configure firewall to allow only whitelisted ports to communicate on ingress/egrees interfaces
  • configuration documentation should show which server ports are allowed on any given host type
  • configure detection rules to detect mismatched protocol usage over a standard port
31
Q

shell vs reverse shell

A

A shell is where an attacker opens a listening port that exposes the Cmd prompt on the local host and connects to that port from the remote host, while a reverse shell is where the attacker opens a listening port on the remote host and forces the local host to connect to it

32
Q

Netcat (nc)

A

Utility for reading and writing raw data over a network connection that is often
used as a listener for remote shells

  • setup listener: nc -l -p 443 -e cmd.exe
  • connect to listener: nc 10.1.0.1 443
33
Q

Data Exfiltration IoCs

A
  • HTTP(S) channel with public storage services (e.g., adversary may exfiltrate data to OneDrive)
  • Web app attacks (e.g., SQLi)
  • DNS as a data exfiltration or C2 channel (server log growth, increased use of certain queries)
  • IM, P2P, email, FTP
  • Encrypted tunnels (IPsec, SSL, active VPN sessions)
34
Q

Covert channel for data exfiltration (IoCs)

A
  • take advantage of a lack of egress filtering to transmit data over nonstandard port
  • data encoded into protocol headers
  • fragmenting (breaking data into multiple packets to evade signature analysis and DLP)
  • steganography to obfuscate data
  • encryption of data that cannot be inspected as it leaves network