Alllllll Flashcards
Windows Registry
Information about files and services, locations of deleted files, evidence of applications being run
Autorun Keys
Programs set to run at startup (often associated with malware or compromise)
Master File Table (MFT)
Details of inactive/removed records
Event Logs
Logins, service start/stop, evidence of applications being run
INDX files and change logs
Evidence of deleted files, MAC timestamps
Volume Shadow Copies
Point-in-time information from prior actions
Recycle bin contents
Files that were intended to be deleted but forgotten
Hibernation files and memory dumps
Memory artifacts of commands run
Temporary Directories
Artifacts of software installation, user temporary file storage, or other limited lifespan data
Removable Drives
System logs may indicate drives were plugged in; data may be relevant to investigations
POP3 Port
Port 110
NTP Port
Port 123
SQL Server (2 Ports)
Port 1433 & 1443
Oracle Port
Port 1521
RADIUS (2 Ports)
Port 1812 & 1813
MySQL Port
Port 3306
STIX Protocol
XML Language. Current version includes things like attack patterns, identities, malware, threat actors and tools. Conveys data so humans and security technologies can understand
OpenIOC Protocol
Includes metadata like the author, the name of the IOC, and a description; references to the investigation or case and information about the maturity of the IOC
TAXII Protocol
Is intended to allow cyberthreat information to be communicated at the application layer via HTTPS, specifically designed to support STIX data exchange
3 Criteria for Intelligence
Timeliness, Relevancy and Accuracy
Requirements Gathering
Assess what security breaches or compromises you have faced, Assess what information could have prevented or limited the impact of the breach, assess what controls and security measures were not in place that would have mitigated the breach
Data Collection
Collect data from threat intelligence source to meet those requirements. Phase may repeat as additional requirements are added or as requirements are refined based on available data and data sources
Threat Data Analysis
Allow for data to be consumed by the tools or processes that are used and then analyze the data itself. Output from this stage could be data fed into automated systems or other tools or written reports to distribute to leadership or others across your organization
Intelligence Dissemination
Data is distributed to leadership and operational personnel who will use the data as part of their security operations role