5D. Analyse Application-related IoCs obj 4.3, 4.4 Flashcards

1
Q

understanding typical application behaviour requires a combination of…

A
  • Documentation of the application’s normal behaviour
  • Logging, to provide a view of normal operations
  • Heuristic analysis tools to flag when behaviours deviate from the norm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Application Logs IoCs

A
  • DNS (queries, destinations)
  • HTTP (client 4xx, server 5xx, cookies, user-agent)
  • FTP (log everything)
  • SSH (auth issues, failed attempts)
  • SQL (access attempts, query logs)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Application IoCs

A

1) Anomalous activity - typical behaviour deviation. Detected with log analysis, behaviour baselines, and file integrity checking.
2) New accounts - e.g., admin accounts. Can be monitored with w, lastlog, faillog commands, or by checking auth.log (linux)
3) Unexpected outputs - scanning for vulns may produce errors, signs of code injection, directory traversal etc attacks will show in app logs
4) Network connections - suspicious open ports (net stat, nmap), outbound connections
5) Unexpected outbound comms - beaconing, file transfer etc. Network monitoring software + IDSs/IPSs
6) Service interruption - DoS or compromised application. Monitor application service status + user experience.
7) Memory overflows - OS system errors and crashes. Check crash dumps. Log reboots and service restarts.
8) Service defacement - site may be defaced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Service analysis tools (windows)

A
  • net start (running services)
  • get-service (running services)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Service analysis tools (linux)

A
  • systemctl (startup processes)
  • ps (running processes)
  • top (running processes)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Account and Session Management Tools (windows)

A
  • Local Users and Groups (local account management)
  • AD User and Computers (config/monitor accounts from DCs)
  • net
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Account and Session Management Tools (Linux)

A
  • who (user accounts logged in)
  • w (same as who, also returns more information)
  • rwho (active account info for all hosts on local network)
  • lastlog (log on history)
  • faillog (authentication fails)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

VM Introspection (VMI)

A

uses tools installed to the hypervisor to retrieve pages of memory for analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Saved State files (VMs)

A

Suspending the hypervisor causes it to write its contents of memory to a file, which can then be analysed using a tool such as Volatility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

persistent data acquisition (Virtualisation Forensics)

A
  • Acquiring data from persistent devices, such as virtual hard drives and other virtualised mass storage devices to an image-based format
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

File-carving-deleted VM disk images (Virtualisation Forensics)

A
  • host may use proprietary file system which can limit support for recovery tools
  • image may be widely fragmented, File carving can be used to reconstruct these files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Lost system logs (virtualisation forensics)

A
  • Virtual machines are optimised to spin up when needed and be destroyed when no longer required
  • Configure virtual machines to log events to a remote logging server to prevent system logs from being lost during deprovisioning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly