Book 5: Defense Spotlight with RITA Flashcards

1
Q

what is RITA

A

a sophisticated network analysis tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of threat identification is used with RITA?

A

Statistical threat identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Rita is primarily used for __ assessment of network activity

A

offline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RITA reads from __ logging data for the greatest network event fideltiy with results best with logging data collected ___+hours

A

Zeek

24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are zeek logs?

A

the logs RITA uses to read from to create analysis reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is RITA?

A

solution to idetnify attacker C2 using statistical anomaly analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rita does not rely on packet payload inspection to identify threats like ___ platforms

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RIta looks for signs of ___ activity that correspond to patterns employed by attacker __ tools. both known and unknown

A

network

C2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RITA does not perform live network monitoring

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RITA performs offline network monitoring

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RITA is an effective threat hunting tool to aid analysts in identifying and reacting to compromises within the network.

A

true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some common behaviors of C2s?

A
  • Long connection duration between C2 and victim endpoint
  • Lots of consistent data sizes in packers for heartbeat checking
  • Consistent packet intervals (C2 sleep timers)
    -Consistent packet intervals within Jitter metric (skew)
    session size total packer or byte count consistency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RITA does not identify specific C2 frameworks

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Where does RITA store its parsed zeek logs?

A

Mongodb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the steps to get results from RITA?

A

prereq: have a mongo database
1. start the mongo database
2. create a directory that will hold the parsed zeek logs
3. start zeek and read from a packet capture file pcap
4. the parsed zeek made from the pcap will import them into my current directory to my database.
4. generate an html report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What kind of reports are made with RITA?

A
beacons
strobes
dns
blacklist source IPs, Destination IPs, Hostnames
Long Connections
User Agents
17
Q

How would you import logs from Zeek?

A

prereq: already ran Zeek against pcap

$ rita import /path/to/zeel/logs DB_Name

18
Q

How would you show RITA analysis in Human readible format?

A

$ rita show-beacons DB_Name -H

19
Q

How would you save output in a CSV format?

A

$ rita show-beacons DB_Name > DB_Name.csv

20
Q

-H option in RITA?

A

display results in a human readable format.

21
Q

Can you perform beacon analysis with rita?

A

yes, beacons are one of the functionalities that RITA analyzes

22
Q

What is beaconing?

A

characteristic of a C2 framework where a comrpomised system reaches out to the controlling server with a periodic frequency

23
Q

beaconing is a characteristic of __ framework

A

C2

24
Q

How does RITA characterize beacons?

A

Score based. a source IP Value 1 or slighly less than 1 indicates beacons.
Value slightly less than 1 is because simple network delay, dropped packets, remains strong indicator of a compromised node in the netwrok.

25
Q

How does RITA characterize long connections?

A

$ rita show-long-connections -H mynetwork | head -15

26
Q

What columns does long connections show?

A
  1. source IP,
  2. Destination IP
  3. DSTPORT:Protocol:SERVICE
  4. Duration
27
Q

How does RITA characterize DNS analysis?

A

$ rita show-exploded-dns mynetwrok | head - 15

28
Q

What columns does DNS analysis show you in RITA?

A

3 columns

  1. Query domain from the internal host
  2. Number of unique subdomains associated with the host
  3. number of times the internal system queried the total number of subdomains.
29
Q

The number of subdomains for a given queried domain from the internal host should be a small number?

A

true

30
Q

What does it mean if a domain has many unique subdomains?

A

ex: 7,882 subdomains for example.com - very strong indicator of a compromise in the network

31
Q

How would DNS tunneling with DNSCat2 set off an indicator within DNS analysis in RITA?

A

DNS caching, DNSCat2 will generate many unique subdomains for the C2 channel which is a STRONG indicator of compromise in the network.

32
Q

Can RITA be used to give insight in the network of activity that could represent compromised system?

A

yes

33
Q

RITA is a starting point

A

yes

34
Q

How would you add whitelisted or blacklisted IP addresses in RITA

A

edit the config.yaml

35
Q

Consider taking local packet captures on endpint systems

A

yes