Lecture 08

IIT KANPUR-NPTEL
1 Aug 202445:38

Summary

TLDRThis script is a detailed walkthrough of mapping cybersecurity incidents to the ATD CK framework using raw data. It discusses techniques such as initial access, execution, and persistence, and emphasizes the importance of understanding attacker behavior and tactics. The instructor guides through the process of analyzing various commands and network interactions, illustrating how to identify and map tactics and techniques from both finished reports and raw data. The session also covers the significance of creating databases for attack pattern recognition and the challenges of attribution in cybersecurity.

Takeaways

  • 📈 The main objective is to understand how to map raw data to the ATD (Adversarial Tactics, Techniques, and Common Knowledge) framework.
  • 🔒 The script discusses techniques such as stealing VPN credentials, compromising web services, and using phishing to gain initial access to a network, which are part of the 'External Remote Service' category.
  • 🐟 The term 'STIX' is mentioned as a format used for cyber threat intelligence, which is important for creating and understanding threat reports.
  • 🔑 Command injection is highlighted as a method for attackers to execute commands on a web server host, which falls under the 'Execution' tactic.
  • 🔄 The script explains how certain behaviors can be associated with multiple tactics, emphasizing the need to understand the context of each action.
  • 🔍 The importance of network intrusion detection is stressed for identifying command and control communications, which may use various protocols.
  • 🛡️ 'Persistence' in cybersecurity is defined as ensuring that an executable remains on a system even after reboots, often achieved through methods like writing to startup folders or registry entries.
  • 🤝 The script touches on the idea of 'resource development' in the context of cyber kill chain, which is about creating the necessary tools and resources for an attack, synonymous with 'weaponization'.
  • 🧐 The need for cybersecurity professionals to think from both an attacker's and a defender's perspective is emphasized to effectively anticipate and counter threats.
  • 📚 The 'Cobalt Kitty' report is used as an example to demonstrate how to map tactics and techniques from a finished report, which is a valuable exercise for understanding the cyber attack process.
  • 🔑 The script concludes with the importance of mapping ATD from raw data, which is a critical skill for threat intelligence analysts who must interpret various data sources to identify and respond to cyber attacks.

Q & A

  • What is the main objective of the session described in the transcript?

    -The main objective of the session is to learn how to map ATD (Adversarial Tactics, Techniques, and Common Knowledge) framework from raw data.

  • What is the significance of using the code number 45975 on m.com in the context of the session?

    -The code number 45975 is used on m.com to access and answer questions related to the session, which is part of the learning process about external remote services and cyber threat intelligence.

  • What are the three choices given in the example question about external remote services, and which one is not a procedure for it?

    -The three choices are: 1) stealing an employee's VPN credential to access the network, 2) compromising a vulnerable web service to get a remote shell access, and 3) phishing followed by a backdoor infection to obtain access. The third choice, phishing followed by a backdoor infection, is not an external remote service procedure as the initial access is through phishing, not an external remote service.

  • What is STIX and why is it important in the context of the session?

    -STIX (Structured Threat Information Expression) is a language and serialization format used for cyber threat intelligence. It is important in the session as it helps in understanding and creating files for cyber threat intelligence, which is a key part of mapping ATD framework.

  • What is the role of Network Intrusion Detection in identifying Command and Control (C2) communications?

    -Network Intrusion Detection plays a crucial role in monitoring all network traffic to identify any suspicious IP addresses or communication patterns that may indicate C2 communications, which are often used by attackers to control compromised systems.

  • What does the term 'Persistence' refer to in the context of cybersecurity?

    -In cybersecurity, 'Persistence' refers to the ability of a malware or an unwanted executable to remain on a system even after reboots, often achieved by writing the executable to startup folders, injecting itself into always-running processes, or changing registry entries for autorun.

  • What is the difference between 'Resource Development' in the ATD framework and 'Weaponization' in the Cyber Kill Chain?

    -In the ATD framework, 'Resource Development' refers to the process of creating resources for attacking, such as exploits or phishing emails, after identifying a target's weak spots. In the Cyber Kill Chain, 'Weaponization' is the process of preparing an attack, which includes developing the actual exploit or payload to be used in the attack.

  • Why is it important for cybersecurity professionals to understand both the attacker's and defender's perspectives?

    -Understanding both perspectives is crucial for cybersecurity professionals because it allows them to anticipate what an attacker might do and then devise effective defensive strategies against those potential attacks. This dual understanding helps in creating comprehensive security measures.

  • What is the purpose of creating a database of tactics and techniques used by various APT (Advanced Persistent Threat) groups?

    -Creating such a database helps in analyzing and distinguishing between different APT groups by understanding their attack patterns, sequences, and methods. This can be used for attribution, which is the process of identifying the source of an attack, and can also aid in developing machine learning models to predict and defend against such attacks.

  • How does the process of mapping ATD from raw data differ from mapping it from a finished report?

    -Mapping ATD from raw data requires a deeper understanding of technology and forensics, as analysts must interpret log files, network packet traces, and other raw data sources to identify behaviors, tactics, and techniques. In contrast, mapping from a finished report involves analyzing the already identified behaviors, tactics, and techniques presented in the report, which is often more straightforward.

Outlines

00:00

🔍 Mapping ATD Framework to Raw Data

The speaker begins by introducing the task of mapping raw data to the ATD (Adversarial Tactics, Techniques, and Common Knowledge) framework. They guide the audience to use a specific website and code to answer questions about external remote services, distinguishing between techniques used for initial access. The speaker elaborates on the STIX format for cyber threat intelligence and discusses the importance of recognizing multiple tactics within a single action. The paragraph concludes with an example of identifying the tactic behind a device establishing a TCP connection to a suspicious IP, suggesting network intrusion detection as a method to verify command and control connections.

05:02

🛡️ Understanding Persistence in Cybersecurity

This paragraph delves into the concept of persistence in cybersecurity, explaining how it differs from the common understanding of the term. The speaker discusses various methods attackers use to maintain a presence on a compromised system, such as writing executables to startup folders or injecting code into running processes. The paragraph also touches on the transformational goal of cybersecurity courses, aiming to make individuals more vigilant about potential threats, and the importance of understanding the attacker's perspective to effectively defend against them.

10:04

📚 The Role of Resource Development in Cyber Kill Chain

The speaker clarifies the misunderstanding about the term 'resource development' in the context of the Cyber Kill Chain (CKC) model. They explain that resource development is analogous to weaponization, where an attacker creates the necessary tools and resources for an attack, such as phishing emails or exploits. The paragraph emphasizes the importance of understanding the attacker's perspective and the process of developing resources to carry out an attack effectively.

15:06

🕵️‍♂️ Analyzing the Cobalt Kitty Report with ATD Framework

The speaker provides guidance on how to analyze the Cobalt Kitty report using the ATD framework. They mention different versions of the report, including one with highlights and another with tactic hints, to help understand the mapping process. The paragraph discusses the importance of identifying tactics and techniques from the report and the value of practicing this skill for both understanding attack patterns and preparing for exams or real-world scenarios.

20:07

👥 Group Dynamics in Cybersecurity Training

In this paragraph, the speaker discusses the intentional mixing of students in group projects to simulate real-world dynamics, where one cannot always work with familiar partners. They emphasize the importance of learning to work with a diverse range of professionals and the benefits of identifying freeloaders in group settings. The speaker also hints at the challenges of mapping ATD from raw data in the next homework, encouraging students to prepare for the task.

25:08

🔬 Transitioning from Finished Reports to Raw Data Analysis

The speaker explains the transition from analyzing finished reports to working with raw data, which is common in incident response and forensic analysis. They discuss the importance of understanding the ATD framework and the need for technical expertise to interpret raw data such as shell commands, malware analysis, and network packet traces. The paragraph also touches on the value of creating a database of tactics and techniques used by various APT (Advanced Persistent Threat) groups for machine learning and attribution purposes.

30:11

🗝️ Forensic Analysis Techniques and ATD Mapping

This paragraph provides an example of how to perform forensic analysis and map findings to the ATD framework. The speaker discusses specific commands used by attackers, such as 'ipconfig' and 'sc', and how to interpret their usage in the context of an attack. They explain the process of identifying the tactics and techniques associated with these commands, such as System Network Configuration Discovery and Execution, and the importance of this skill for threat intelligence analysts.

35:14

🔑 Deciphering Malicious Activity from Renamed Executables

The speaker continues the forensic analysis by discussing how attackers may rename benign executables to conceal their activities. They provide an example where 'recycler.exe' is found to be a renamed RAR executable, used for compressing and encrypting files, likely for exfiltration. The paragraph explains the process of identifying the tactic of Data Exfiltration and the technique of Execution, emphasizing the need for analysts to have a broad understanding of technology and the ability to research and interpret findings.

40:14

⏳ Wrapping Up the Analysis and Preparing for Future Classes

In the concluding paragraph, the speaker summarizes the process of mapping ATD from both finished reports and raw data. They highlight the importance of understanding the techniques and tactics involved in cybersecurity analysis and prepare the audience for further discussions on raw data analysis in upcoming classes. The speaker also encourages the audience to practice these skills to be better prepared for real-world challenges.

45:20

🎶 End of Session

The script ends with a musical note, indicating the conclusion of the session without any further content.

Mindmap

Keywords

💡ATD nck framework

The ATD nck framework, likely a reference to the 'Adversarial Tactics, Techniques, and Common Knowledge' (ATT&CK) framework by MITRE, is a globally recognized knowledge base of adversary tactics and techniques based on real-world observations. It is used to map and understand the steps attackers take to compromise targets. In the video, the speaker discusses mapping raw data to this framework to analyze cyber attacks.

💡Initial Access

Initial Access in the context of cyber security refers to the first step an attacker takes to gain entry into a target's system. It is one of the first stages in the cyber kill chain. The script mentions techniques like stealing an employee's VPN credentials or compromising a vulnerable web service as examples of initial access methods.

💡Execution

Execution in the ATT&CK framework is a tactic where an attacker runs malicious commands or payloads on a compromised system. The video transcript discusses how command injection can be an example of this tactic, where an attacker executes commands on a web server host.

💡Persistence

Persistence is a tactic used by attackers to ensure that their access to a compromised system is maintained over time, even after a system reboot. The speaker in the video explains different methods of achieving persistence, such as writing an executable to the startup folder or injecting code into a running process.

💡Command and Control (C2)

Command and Control, often abbreviated as C2, refers to the methods by which an attacker maintains control over a compromised system. It is a critical component for attackers to issue commands to the compromised system. The script discusses how suspicious TCP connections might indicate C2 communication.

💡Reconnaissance

Reconnaissance is the process of information gathering about the target before launching an attack. It is a preparatory stage in the cyber kill chain. The video mentions that attackers conduct reconnaissance to identify weak spots in the target's defenses, such as vulnerable web services or employees susceptible to phishing.

💡Resource Development

Resource Development, as discussed in the script, refers to the creation of tools and resources needed for an attack, such as crafting phishing emails or developing exploits. It is analogous to the 'weaponization' stage in the cyber kill chain, where attackers prepare their attack payloads.

💡Cobalt Kitty report

The Cobalt Kitty report is a specific case study or report mentioned in the script that is used as an exercise for mapping tactics and techniques to the ATT&CK framework. It serves as a practical example for understanding how to apply the framework to real-world cyber attack scenarios.

💡Forensic Analysis

Forensic Analysis is the process of collecting and analyzing data from a compromised system to determine the cause and scope of a security breach. The script describes how forensic analysts provide raw data to threat intelligence analysts, who then map this data to the ATT&CK framework to understand the attack.

💡Endpoint

In the context of cybersecurity, an endpoint refers to a remote device or location that connects to a network. The script mentions looking for newly created binaries at endpoints as part of the forensic process, which can provide valuable information about an attack.

💡Exfiltration

Exfiltration is the act of extracting sensitive data from a system, often with malicious intent. The video transcript discusses how attackers may compress and encrypt files for exfiltration to avoid detection, as part of their data theft tactics.

Highlights

Introduction to mapping ATD CK framework from raw data.

Using m.com with code 45974 to answer questions on external remote service.

Explanation of the difference between initial access and external remote service procedures.

Discussion on STIX format used for cyber threat intelligence.

Command injection tactics and their relation to initial access and execution.

Behavior having multiple tactics in a single action.

TCP connection to a suspicious IP indicating potential command and control.

Importance of network intrusion detection for identifying command and control communications.

Explanation of persistence in cybersecurity and its various methods.

The concept of resource development in the context of cyber kill chain.

Misunderstanding of resource development as a defender's perspective instead of an attacker's.

The necessity for cybersecurity professionals to think from an attacker's perspective.

Details on the Cobalt Kitty report and its use for understanding tactics and techniques.

The process of mapping ATD CK from finished reports versus raw data.

Importance of understanding raw data for threat intelligence analysis.

The role of machine learning in distinguishing between attack groups based on tactics and techniques.

The process of mapping raw forensic data to ATD CK framework.

Interpreting shell commands and their relevance to ATD CK tactics and techniques.

The significance of creating a database of tactics and techniques for attribution.

The challenges and expertise required for mapping raw data to ATD CK.

Transcripts

play00:10

[Music]

play00:14

uh main thing that we want to do today

play00:15

is how to map uh to uh ATD nck framework

play00:20

from raw data uh so uh let's first

play00:25

uh look at a few things but before that

play00:30

uh let's do this

play00:32

so use

play00:35

m.com and with the code number 45

play00:42

97457 and answer the

play00:46

questions so which of the following is

play00:48

not on sorry it should have been a

play00:52

procedure for uh external remote service

play00:56

we we talked about external remote

play00:58

service last time

play01:00

it's uh technique Number 1133 and you

play01:03

have three choices one is uh stealing an

play01:06

employees VPN credential and use that to

play01:10

access the network second is compromise

play01:14

a vulnerable web service to get a remote

play01:17

shell

play01:18

access and third is uh fishing followed

play01:22

by a backd door uh infection to obtain

play01:28

access okay okay so this is going good

play01:32

few

play01:33

more so stealing an employees VPN

play01:37

credential and

play01:38

access is an example of external remote

play01:41

Service as a technique for initial

play01:44

access right so we are talking about

play01:46

initial access the second one you want

play01:50

to compromise a vulnerable web service

play01:54

to get a remote shell access this is

play01:57

also an like last time we talked about

play02:00

payroll service that was used to access

play02:04

so this is kind of external remote

play02:06

service but when you do fishing your

play02:09

initial access is through fishing right

play02:11

so it's initial access is not through

play02:13

external remote Service uh you may use

play02:17

external remote service later for uh

play02:20

further access but your initial access

play02:23

is already done so that is not an

play02:26

external remote service

play02:28

procedure uh

play02:30

we talked about

play02:32

sticks so what is sticks format used to

play02:42

communicate okay so this is going

play02:45

well all right so that's sticks is for

play02:49

cyber threat intelligence and we'll

play02:51

actually later in the course we'll

play02:53

actually look at the sticks format in

play02:55

detail you know how sticks files are

play02:57

created for cyber threat intelligence

play03:01

now an attacker uses command injection

play03:04

to execute command on web server host

play03:07

which tactic is

play03:09

it is it initial access

play03:12

reconnaissance

play03:14

execution and

play03:26

persistence so in this case it is

play03:29

executing a command so it's an execution

play03:32

but it may also be initial access

play03:33

because that's probably how the uh

play03:36

attacker got in to the system so but

play03:40

execution is certainly uh the tactic so

play03:43

certain Behavior can actually have

play03:45

multiple tactics that's something you

play03:47

have to look at they might combine two

play03:50

tactics in one action right okay so you

play03:55

observe that one of your devices is

play03:57

establishing a TCP connection to a

play03:59

suspicious IP what is the uh

play04:09

tactic so if your device is establishing

play04:12

TP connection to a suspicious

play04:15

IP that means some

play04:18

unwanted executable is already executing

play04:21

inside your device

play04:23

right so uh that

play04:27

executable has executed but but we do

play04:30

not know whether it has established

play04:32

persistence because persistence means

play04:34

that you establish yourself in such a

play04:37

way so that binary will be executed no

play04:39

matter whether you reboot your system or

play04:41

not right so if you just uh execute once

play04:46

doesn't mean that you are persistent if

play04:48

you actually shut down your machine and

play04:51

uh restart it may be gone right so it

play04:55

depends on whether it's so from this

play04:58

information we do not know whether

play04:59

assistance has been established but we

play05:01

know that it is communicating with some

play05:05

Service uh somewhere which is a

play05:08

suspicious IP probably there is a list

play05:11

of there is a abuse ipdb database where

play05:15

the uh where we can look and see whether

play05:17

this IP has been listed as suspicious by

play05:21

somebody uh then we will say that it's

play05:23

command and control right okay this

play05:27

should be happening but uh how do we

play05:30

check if command and control connects

play05:32

are connections are

play05:44

happening okay so uh command and control

play05:48

uh communication may use uh various uh

play05:51

types of protocols right so if uh it is

play05:56

using an HTTP protocol

play05:59

then it is possible that the Comm

play06:02

communication will be mediated by your

play06:05

web server and maybe it will be in the

play06:07

web server log but it is uh not uh

play06:11

necessarily in the web server log

play06:14

because you can actually have

play06:15

application Level protocol that has been

play06:19

spe specifically designed to communicate

play06:22

with the uh command and control server

play06:24

it could be a DNS uh it could be uh some

play06:28

some other Direct TCP connection and all

play06:31

kinds of stuff so so Network intrustion

play06:34

detection is probably your best bet to

play06:36

actually check whether command control

play06:38

is happening if you are going to do host

play06:42

intution detection in every

play06:44

host then there is a likelihood that you

play06:46

will also see it in the collective

play06:48

collected logs of all hosts intuition

play06:51

information at the uh host intuition uh

play06:54

detection manager right but your best

play06:57

bet is certainly a networking nutrition

play07:00

detection so you monitor all the network

play07:03

traffic

play07:05

and you know whenever you see an IP

play07:08

address you don't recognize you

play07:10

automatically look it up from an abuse

play07:13

IP database so that way you can actually

play07:16

or URL uh you might have certain

play07:18

algorithms for uh figuring out the URL

play07:21

is suspicious so Network intution

play07:24

detection is probably most likely place

play07:27

where you will find this so when I say

play07:30

persistence what kind of things you

play07:32

think

play07:40

about oh I think uh I have a Deja view

play07:44

we already ask this question

play07:53

before yeah so uh more or less uh it

play07:56

gives some uh of this thing persist is

play08:00

uh about ensuring that you uh the

play08:04

executable stays irrespective of uh uh

play08:08

you know reboot cycles and uh that most

play08:12

of the time persistence is done through

play08:14

uh writing the executable inside your uh

play08:18

startup folder or uh you know inject

play08:21

itself into a known process which is

play08:24

always running uh so so this kind of

play08:26

stuff or uh you know changing a registry

play08:30

entry for auto run so there are several

play08:33

ways to do persistence uh so that's uh

play08:36

something the reason why I am asking

play08:38

this is that uh see what happens is that

play08:41

uh when you are taking a cyber security

play08:44

course the goal of a cyber security

play08:46

course is to actually transform the

play08:48

person right the person who was not

play08:52

worried about uh uh things that could

play08:55

happen to their phones and their uh

play08:57

desktops or their servers uh or their

play08:59

Network their home

play09:02

Wi-Fi they they start thinking about

play09:04

those things right so you uh the idea is

play09:06

to make you a little Ultra aware of

play09:10

possible threats right so the word

play09:13

persistence in general might mean many

play09:16

things right so persistence that's why

play09:17

some people wrote that Virat because uh

play09:21

he got a lot of zeros and then he comes

play09:24

back or whatever you may want to think

play09:27

uh I don't like him so I don't know what

play09:29

his persistence but but in any case uh

play09:32

in real life persistence would mean

play09:35

somebody who is uh not easily you know

play09:38

stopped right like remains persistent

play09:41

right it happens when we give grids uh

play09:45

and then people come and be very

play09:47

persistent that they need a higher grade

play09:49

right so that is a real world use of uh

play09:53

persistent but as cyber security

play09:55

professional your uh uh view of

play09:57

persistence would usually mean uh you

play10:00

know something to do with uh you know

play10:04

unwanted executables making itself

play10:06

persistent on onto the system so that it

play10:10

remains there sometimes it also evades

play10:13

defense uh so it may turn out antivirus

play10:17

it may actually uh hide itself inside a

play10:20

dlll or some executable by injecting

play10:23

itself inside executable so so there are

play10:26

many ways that uh this kind of

play10:28

persistence is uh made by by uh unwanted

play10:32

executables but uh uh the idea is that

play10:36

uh the uh most nation state attackers

play10:40

their goal is not to make a spectacular

play10:43

attack like the Russians did in case of

play10:46

uh power cut in Ukraine right so that

play10:50

that kind of attack usually become

play10:53

spectacular but it is immediately

play10:55

understood that there has been an attack

play10:57

and and people will start removing all

play11:00

the uh uh malware and and block all the

play11:04

IPS and and and do their best to

play11:06

actually stop that from happening again

play11:09

the nation state attackers don't do that

play11:12

very often they usually would do that if

play11:14

there is a war or something but in

play11:16

general they they want to remain

play11:18

persistent so you will find that most

play11:21

critical infrastructure in India

play11:24

probably have persistent uh executables

play11:27

from various countries and

play11:29

unless they actually find these things

play11:32

properly like our C ports or our power

play11:35

system operators or uh Telecom operators

play11:39

and so on if they're not doing their

play11:40

cyber security properly they're probably

play11:43

having this persistent uh uh agents who

play11:46

are very very stealthy they communicate

play11:49

to their command and control very uh

play11:52

obscurely through very obscure uh

play11:54

protocols and if there is no network

play11:57

monitoring if there is no uh uh you know

play12:00

endpoint monitoring Etc most people

play12:03

wouldn't know that this is happening and

play12:05

if this is happening the reason is that

play12:08

at some point the command and control

play12:10

will ask the uh agents that are sitting

play12:13

in various places to actually do some

play12:16

action right so that's the whole idea

play12:18

that to position yourself so that uh you

play12:21

can actually execute a command or series

play12:24

of commands at the time when it is

play12:26

required and usually this will be

play12:28

required when when there is a real

play12:31

conflict real war like Ukraine and and

play12:33

Russia uh or what is happening between

play12:36

hamus and Israel things like that that's

play12:39

the that's the time when these things

play12:42

happen so so uh and you might have read

play12:45

that uh the Iranian uh gas stations were

play12:50

attacked uh in large number recently and

play12:53

that were probably be by Israel and uh

play12:57

because Iranians are giving uh implicit

play12:59

support to their opponents so they

play13:02

actually had probably agents uh sitting

play13:05

in those facilities and they basically

play13:07

uh executed some commands so so this is

play13:10

the uh idea of persistence so uh if you

play13:14

are cyber security professional you have

play13:16

to think in those terms rather than in

play13:20

terms of regular everyday meaning of uh

play13:24

persistence now uh the last question

play13:27

what comes to your mind when you hear

play13:28

res resource

play13:44

development now this is

play13:50

interesting Andhra

play13:54

Pradesh fancy defense

play14:00

oh somebody has given a very nice answer

play14:02

adding

play14:08

resources higher

play14:11

experts okay so uh this one is uh

play14:15

everybody seems to be spectacularly

play14:17

wrong right so remember nobody has gone

play14:22

back and went to the at and CK website I

play14:25

think right so what is happening is that

play14:28

um in CKC when we discuss cyber kill

play14:31

chain we said that there are seven

play14:33

stages first stage was reconnaissance

play14:36

second stage was weaponization right now

play14:41

in ATN CK we if we look at 12 tactics

play14:45

that starts from initial access it

play14:48

basically says what happens after

play14:50

initial access right initial access then

play14:52

execution then persistence and and

play14:55

privilege escalation and so on right but

play14:57

I said uh uh several times that there

play15:01

are two more before them right one is

play15:05

same as CC

play15:07

reconnaissance and second one is same as

play15:10

weaponization but they call it resource

play15:13

development right so the attacker once

play15:16

it does reconnaissance it figures out

play15:19

that this is the weak spot which I have

play15:22

to attack through right it could be a

play15:24

weak uh employee who doesn't know about

play15:26

fishing EML or it could be web server

play15:30

that is uh that is that has

play15:32

vulnerability uh or it could be a

play15:35

another service that is running on a

play15:38

particular port and we figured out that

play15:40

it is running an unpatched version and

play15:42

and therefore it has a remote code

play15:45

execution so I'm going to use it but to

play15:47

do all this I have to develop an exploit

play15:49

right to do a fishing I have to write an

play15:53

email which looks believable and then I

play15:56

also have to either create a link which

play15:59

will take him to a malware infested

play16:01

website or I have to actually attach a

play16:04

malware infested Word file or J file and

play16:07

so on so this whole process of creating

play16:11

this resources which we'll use for

play16:14

attacking uh the the the doing the

play16:17

initial access what is called resource

play16:19

development or in case you are going to

play16:22

exploit you know internet facing service

play16:24

you have to design the payload you have

play16:26

to design the exploit right so all these

play16:29

things are in CKC we call weaponization

play16:31

in here we are calling it resource

play16:34

development right that's a terminology

play16:36

difference so the right answer here

play16:39

would have been weaponization right but

play16:42

but you are still thinking in the from

play16:44

the defender's point of view so all

play16:46

these answers here is actually from a

play16:48

defender's point of view the defender is

play16:50

uh doing hardening uh Defender is doing

play16:53

sustenance Defender is creating

play16:55

reliability Defender is upgrading the

play16:57

system taking backups so you're are

play17:00

thinking in terms of uh Defender but

play17:03

atnc is about the offender right so the

play17:07

person who is attacking them we're

play17:09

trying to understand what all he

play17:11

does so we have to accordingly fill our

play17:16

mind from an attacker's perspective

play17:18

right so that's why most cyber Security

play17:22

Professionals are in some sense

play17:24

schizophrenic they have to always think

play17:26

in terms of attacker and then they have

play17:28

to think how I can defend against that

play17:30

attack right if you cannot imagine what

play17:32

the attacker would do or then you cannot

play17:35

defend yourself right so that's a basic

play17:37

idea okay so that's about this uh these

play17:42

questions now I want to uh before I go

play17:45

into the raw data uh aspects I want to

play17:48

just go back and see where we uh left

play17:51

off so we actually did the uh we

play17:55

actually figured out the verbs in the

play17:57

report uh uh then uh we tried to figure

play18:00

out the behavior we did research the

play18:03

behavior from attn C website and maybe

play18:07

other resources on the Internet or books

play18:10

or whatever you reference then we assign

play18:13

to each Behavior what tactic it might be

play18:16

and if I figure out the tactic well then

play18:19

I can also try to figure out what

play18:22

technique is being used and then I have

play18:26

a whole mapping of the TAC and

play18:29

techniques now the question is that uh

play18:33

what this is going to uh uh so then we

play18:37

said that uh there is an

play18:39

exercise uh here uh which is called uh

play18:44

the Cobalt Kitty

play18:46

report and you can go to this

play18:50

place so let

play18:52

me let me show you where it is

play19:15

so here if you go to this uh ATN c

play19:19

training and if you go to this uh

play19:29

mapping from finished reporting so this

play19:31

is the Cobalt Kitty report right and

play19:35

this is a uh highlights only version of

play19:38

the report which

play19:41

basically has all the highlights but you

play19:43

have to go through this to figure

play19:47

out what tactics and what techniques is

play19:50

this so here you do not have to like say

play19:53

okay I'm I'm what am I looking for am I

play19:56

looking for the verbs and all stuff this

play19:59

report is already

play20:02

prefilled with uh the places where you

play20:04

need to find the tactics and techniques

play20:07

right so this is uh the uh one

play20:10

version so this will help you to uh go

play20:14

through this uh in a you know much

play20:16

faster manner than if you have to

play20:18

actually go through the entire report by

play20:20

yourself and figure out where the

play20:23

behaviors fragments are and what to do

play20:25

with this behavior and so on and this

play20:28

report already has a lot of things that

play20:31

that are already explained in terms of

play20:34

uh the things that you want to find for

play20:37

example here is a section called C2

play20:39

communication so you can figure out that

play20:42

most of the things tactics here would be

play20:44

about C2C command and control

play20:46

communication right it might probably

play20:49

have the internal reconnaissance right

play20:52

now what is internal reconnaissance so

play20:55

from the uh locked Martin kchain you

play20:57

might get an idea that reconnaissance

play20:59

happens first then weapon once you find

play21:03

where to attack you find do the

play21:04

weaponization once you do that you know

play21:07

you come inside and you do initial

play21:09

access Etc

play21:10

right but many times once the malware is

play21:13

inside it will again scan it has a it

play21:16

has the code for scanning it will scan

play21:19

the network and figure out uh you know

play21:22

which network is running what open ports

play21:25

internal open ports and so on right so

play21:28

there could be reconnaissance again

play21:30

right and that is the reason why at C is

play21:33

not a sequence like CC cc is a sequence

play21:37

at CK is a set of tactics which can

play21:40

happen multiple times in a kilch in an

play21:42

attack analysis right so internal

play21:44

reconnaissance that's talking about so

play21:46

this will give you also additional hints

play21:49

as to what are the different uh tactics

play21:52

and techniques could be because the

play21:55

headings the lateral movement right so

play21:56

it is already telling you that here are

play21:58

discussing how the uh the uh malware

play22:02

moved literally uh they Ed this mimicat

play22:05

to they do probably uh see they do uh

play22:08

credential dumping right so so these are

play22:11

the kind of things that happened here

play22:13

right but the point is that if you do

play22:16

this at home uh you know you will get

play22:20

some um understanding of how this is

play22:23

done right now there is another version

play22:26

here uh let me go go back there is

play22:30

another version of the same thing which

play22:33

is called tactic hints so it's the same

play22:36

document but now the tactics are already

play22:39

given you have to just find the

play22:41

techniques so you might actually first

play22:44

try the one without no without any hints

play22:46

only highlights then you try with t if

play22:51

you do well when in that then you are

play22:54

you are already you know have gotten a

play22:56

good understanding if you do not then

play22:59

you actually use the one with the tactic

play23:02

hints already there right so and then

play23:04

you try these uh and

play23:12

then and here at the answers uh do not

play23:16

look at the

play23:18

answers uh see here all this uh not only

play23:23

the um tactic but the techniques are

play23:25

also listed so this is the answer for

play23:29

this

play23:30

one now uh you can

play23:33

also look at the original report so if

play23:36

you're if you want to take a challenge

play23:38

you do not use either the highlights or

play23:41

the

play23:42

hints uh tactic hints and do not look at

play23:45

the answers and try this on the raw

play23:48

report if you can do it on the raw

play23:51

report and then you go and match it

play23:52

against what is the answer uh uh key

play23:55

then you will probably feel much more

play23:57

comfortable uh that you can do this in

play24:00

the exam or in the homework right uh so

play24:04

that is the reason why I want you to do

play24:06

this uh you know uh it's not a formal

play24:09

homework but if you do not do this right

play24:12

now you will have a problem later

play24:14

because you will have to do this in

play24:16

homework it may some fragments of this

play24:19

could be in the exam and then uh if you

play24:21

try to learn this in the at the uh you

play24:24

know this is these things require time

play24:26

right these things do not happen like I

play24:28

just go and and you know somebody might

play24:30

be uh uh very good at this thing

play24:33

somebody might be uh might have to do a

play24:36

little bit struggle uh look up the uh

play24:39

website to figure out what techniques

play24:41

are there for each tactic for the

play24:43

tactics that they identify so it might

play24:46

take some time but eventually if you try

play24:48

hard uh you will get there right now so

play24:53

that is uh something I wanted you to uh

play24:56

do and uh if you look at this uh the

play25:00

cobal kitty report once you do

play25:03

that and you have now your groups and

play25:07

this inside the group you do this and

play25:09

then you discuss and see how what are

play25:12

the differences uh in terms of groups

play25:14

somebody came to me and said uh we want

play25:17

to have my wing Mets in the group and uh

play25:22

I have in intentionally asked students

play25:25

to not choose the groups because what

play25:28

happens in group projects is that

play25:31

students uh like if there are three

play25:33

people one or two will work the other

play25:36

guy will be a Freel loader but if

play25:38

they're Wing Mets they will never say

play25:40

that this guy is a free loader but if

play25:42

they don't know the guy very well they

play25:44

will come and tell us that this guy is a

play25:46

freeloader and then we'll you know

play25:48

disting differentiate between them right

play25:52

so this is uh done intentionally so uh

play25:55

you might uh the other thing is that you

play25:58

know when you go out in the real world

play26:00

you will not find your wing Mets in your

play26:02

projects right it's highly unlikely uh

play26:06

so

play26:07

uh you have to learn to diversify and

play26:10

work with uh people who you uh know only

play26:13

professionally right this these are the

play26:16

some of the

play26:17

things

play26:19

uh now uh uh so comparison wise so you

play26:23

will you know if you do it from the from

play26:25

the hinted report then it is unlikely

play26:28

that you will be very different right

play26:30

because you are actually filling in the

play26:32

same boxes if you do it from the raw

play26:34

report it might you two of you might

play26:36

have a very different sets of uh uh

play26:39

things not not necessarily uh you know

play26:43

uh uh either of you are wrong you might

play26:46

be mistaken about something or you might

play26:49

miss might have missed some behavior

play26:51

that can happen so uh but it is worth a

play26:55

try and if you do not try and do it

play26:57

first time in the exam it's unlikely

play26:59

that you will do very

play27:02

well now in the Cobalt Kitty

play27:06

report uh there are actually uh I would

play27:10

say uh how many

play27:14

uh so

play27:16

22 techniques have been used right at

play27:19

least according to their analysis so 22

play27:22

techniques you have to identify from

play27:24

that report and if you do that uh you

play27:27

will be in better

play27:30

shape so you can also uh there in that

play27:34

same place in the same

play27:36

website you have uh more uh such

play27:41

reports and in the next homework what

play27:43

we'll do is that will give you 31

play27:48

reports each group has one report and

play27:52

each group has to do the mapping and

play27:55

there will be no uh highlights or hints

play27:59

right and uh our ts are pretty ruthless

play28:04

so you better do work on

play28:07

that so I think uh I have given uh

play28:11

enough hints about the next homework now

play28:13

let's go to the next uh sub uh sub

play28:17

module which is mapping atck from raw

play28:22

data if you are trate Intel analysts in

play28:25

a company it is likely that nobody is

play28:28

going to give you a finished report when

play28:30

an incident happens

play28:33

right uh when an incident happens you do

play28:36

forensics you go and look at various

play28:39

places like you look at the logs you

play28:41

look at the network uh packet Trace uh

play28:44

at the time when incident happened you

play28:46

look at firewall logs you look at wave

play28:47

server log you look at uh look for newly

play28:51

created binaries at the at the end

play28:53

points and so on and you collect them

play28:56

and then you are asked to do a root

play28:58

cause

play28:59

analysis and uh uh and then you have to

play29:03

actually uh uh explain it in terms of

play29:06

ATN

play29:08

CK uh the reason why uh now now you

play29:11

might ask me that uh well then why are

play29:14

you ask why are you teaching us about

play29:16

how to map it from finished report

play29:19

because in my job I may not get a

play29:21

finished report uh because I the one who

play29:23

will actually do the finished report

play29:25

right so how how can I get a finished

play29:27

report

play29:28

so the reason is

play29:30

that you do not become uh thread Intel

play29:33

analyst uh overnight right you have to

play29:37

understand uh what the attackers do now

play29:40

when you read the in theory that there

play29:41

are like all this 14 tactics there are

play29:44

these these techniques and so on that is

play29:47

one thing and actually reading a good

play29:50

threat Intel report from uh from firey

play29:54

mandiant uh Microsoft uh Etc is another

play29:58

thing right so so you they do a very

play30:00

thorough

play30:01

analysis now you know that eventually

play30:04

you have to do the attc mapping from

play30:06

your raw data but by doing this uh you

play30:11

know conversion you actually can uh get

play30:15

a lot of uh learning about how this uh

play30:19

you know uh tactics and techniques are

play30:22

used for attacks but there is another

play30:25

reason so uh if you have uh if you have

play30:29

thousands of this kind of

play30:31

reports and you want to create a

play30:34

database of tactics and techniques used

play30:37

by various AP

play30:40

groups now why do I want to create a

play30:42

such a

play30:45

database what is what good is such a

play30:50

database so I have like uh let's say I I

play30:54

take 20 attacks from

play30:56

ap28 and I map them to uh uh you know

play31:00

tactics techniques and procedures I take

play31:03

uh 15 attacks from ap3 I map them so I

play31:07

have a database AP groups what what

play31:12

attacks they use and in what Manner like

play31:15

in what sequence and so on so forth

play31:18

right so what what comes to your mind uh

play31:22

what can I do with such a

play31:24

data such data

play31:34

so I can actually uh try to

play31:38

learn with machine learning

play31:41

right how to distinguish between various

play31:44

uh attack groups right because

play31:48

eventually uh I want to know whether the

play31:51

attack that I just just had is from a

play31:55

nation state attacker or some Hobby

play31:57

haacker

play31:58

second thing I want to know is that if

play32:00

it is a nation state hacker which one it

play32:01

is

play32:03

right so uh to do that this process is

play32:06

called attribution EP attribution so you

play32:09

want to know which AP it is so I may

play32:13

want to create this uh

play32:16

database and uh that um database can be

play32:20

used for uh learning this so one of my

play32:23

PhD student has done this right so uh

play32:27

and what is the uh what is the accuracy

play32:30

we are

play32:32

getting yeah so uh so uh in her uh work

play32:37

she also used natural language

play32:40

processing to actually use this reports

play32:43

to extract the mapping automatically so

play32:47

you do not have to do it you know by uh

play32:51

you know manually reading everything

play32:53

does it work for all

play32:55

reports yeah so so these are the kind of

play32:58

things that uh you know are happening

play33:01

but in any case coming back to the raw

play33:03

data so uh so most of the time you will

play33:06

be facing raw

play33:09

data uh so uh now uh this uh uh data is

play33:16

uh requires you to understand some

play33:20

technology uh commands and so on right

play33:23

so you need a much more knowledge and

play33:26

expertise to interpret the raw data as

play33:29

Behavior than uh finished reports so

play33:33

you'll you'll see what you are given are

play33:36

what kind of shell commands have been

play33:37

used what kind of malware has been used

play33:40

what kind of uh they might give you a

play33:42

forensic dis image and you have to uh

play33:44

use a forensic analysis tool to find

play33:49

reconstruct what happened before what

play33:51

you might get some packet uh information

play33:54

and so on so process of mapping here

play33:58

is you have to understand uh of course

play34:01

ATN CK now from whatever you are given

play34:05

or whatever your forensic people G give

play34:08

you you find a

play34:10

behavior then again you have to research

play34:13

the behavior then you have to translate

play34:15

the behavior into tactic and then uh

play34:18

figure out what technique happened and

play34:20

compare your results with the other

play34:22

analysts like before so here is an

play34:26

example of what the uh forensic people

play34:29

found after an attack so they found that

play34:32

the attacker used these commands so

play34:35

first he use an IP config

play34:37

command then he uses uh uh SC uh command

play34:42

in Windows then he found that there is

play34:45

some uh two-way

play34:49

interaction between an external IP

play34:51

address and internal IP address like uh

play34:56

10.2.3 44 and whatever this 128 29

play35:01

324 and in this machine like uh

play35:05

128 29 you are accessing the port

play35:09

443 443 is a port for https protocol

play35:14

right and then you see that in the

play35:16

registry keys in Windows when you to

play35:19

take a registry dump you find that uh

play35:22

that there is some new entries in the

play35:25

registry so these are the

play35:28

things that are given uh to you by you

play35:31

are a threat Intel analyst and the

play35:33

forensic guy is giving you information

play35:36

this this may not be all the information

play35:37

we are just showing a fragment of what

play35:40

is given to you just to show you the

play35:42

kind of work you have to do to interpret

play35:46

this so ip config ip config you all know

play35:50

right you want to look at the uh uh Mac

play35:54

addresses and IP addresses the uh all

play35:56

this information but this is somebody

play35:59

who is doing it inside right not out

play36:01

from outside you cannot do it from

play36:03

outside so you are you're already inside

play36:05

the uh system in inside the network and

play36:08

you have uh as malware or remote shell

play36:12

uh it might be a remote shell or it

play36:14

might be a

play36:15

malware uh somebody is doing ip config

play36:18

uh to figure out uh the various

play36:21

interfaces network

play36:22

interfaces AC is a command for creating

play36:26

Services service create um command in

play36:30

Windows and you can also query and other

play36:32

stuff in but in the what we saw there it

play36:35

was trying to create a service in the

play36:37

the command that we saw it was trying to

play36:39

create service so we have to now figure

play36:41

out what service it was trying to create

play36:44

but we'll get there but SC is the

play36:46

command now as as a threat Intel analyst

play36:49

you have to know this right or you have

play36:50

to research well what is SC command for

play36:53

right so here is uh you know how the SC

play36:56

command is used you have to basically uh

play36:58

say uh a particular you know computer uh

play37:03

name uh then you have to do create then

play37:05

you have to say which binary has to run

play37:09

right when you create the service so it

play37:11

will tell you like if you try like AC

play37:14

your computer name and create then it

play37:17

will ask you like you know you you

play37:19

haven't completed you have to give me

play37:21

the binary path and things like that

play37:24

right so the analyst is now as a

play37:27

straight analy list you actually have to

play37:30

get a little bit of expertise on many

play37:32

things like network uh interpret network

play37:36

uh packet traces some forensics uh

play37:39

something about what malware are all

play37:42

about uh what how they work and things

play37:44

like that how to how to analyze a

play37:46

malware uh command line uh what are the

play37:49

different uh command line you know

play37:52

commands in command line executables in

play37:54

Windows or whatever the machine is uh it

play37:57

may actually have uh multiple uh data

play38:01

sources from which it has to figure out

play38:04

so the first thing is that if you do not

play38:06

know what ip config all is or you want

play38:09

to see whether there is a tactic related

play38:12

to this command you go to atck and

play38:15

search ip config for all and you are

play38:18

getting this system network

play38:21

configuration Discovery right so this is

play38:24

the uh technique that is uh coming up

play38:28

and it is also showing you examples of

play38:30

various attack groups that have used

play38:33

this kind of a uh command so they're

play38:36

trying to discover the network

play38:38

configuration of the system on which

play38:41

they are uh there why they want to know

play38:45

the system configuration because they

play38:46

want to know which interfaces are

play38:48

connected to let's say w Lan or uh some

play38:52

other uh wired Lan or Wi-Fi Lan and and

play38:55

they might want to use it for doing

play38:58

literal movement Etc so here the next

play39:02

thing that we saw is that in the SC

play39:05

command they gave a binary a path to a

play39:08

binary this is recycler

play39:10

exe and then it is saying that you know

play39:13

for this command here are the flags and

play39:16

here are the inputs there are some input

play39:19

you know directory or input files uh and

play39:23

there is something called uh they're

play39:25

talking about a vsdx file

play39:28

so you are confused right recycler is

play39:31

supposed to be a benign program right so

play39:34

why would they want to create a recycler

play39:36

service if you are malicious so you

play39:40

actually say okay uh let's see if the

play39:43

this recycler uh exe binary is already

play39:48

in this machine the the compromise

play39:50

machine and you run

play39:52

it when you run

play39:55

it you see that it is not the recycler

play39:58

it's a renamed executable it is actually

play40:00

the

play40:01

RAR binary right RAR is for compression

play40:06

and encryption of files right so so

play40:09

somebody for defense evation somebody

play40:11

has renamed this executable to avoid

play40:14

suspicion right so you figure out that

play40:17

based of the analysis now we can Google

play40:20

the flags the flags for RAR not for

play40:23

Recycler these flags are for the RAR and

play40:27

determine that uh that it is being used

play40:29

to compress and encrypt the file so

play40:32

whatever is the this input file here

play40:35

this is being compressed and

play40:38

encrypted okay so we figure out now we

play40:42

figure out what is this file and then

play40:44

you do a Google Search and you find that

play40:47

vsdx is actually a Vio uh Microsoft Vio

play40:51

file but doesn't mean that it has to be

play40:54

a viso you can you can re rename any

play40:56

file with any

play40:58

uh any kind of uh you know suffix right

play41:01

it's just that uh when you try to load

play41:04

that in Visio you might get an error

play41:06

that this is not according to format you

play41:09

can take an executable file and call it

play41:11

PDF right so it's obvious so so what is

play41:14

uh what we find is from this we are

play41:17

figuring out that a file is being

play41:20

compressed and encrypted and it might be

play41:23

a v diagram but uh it is probably

play41:27

in the name of a v it is probably

play41:29

exfiltrating some data when do you

play41:32

compress and encrypt a files you want to

play41:37

do something with the file right I mean

play41:38

you are not just trying to encrypt and

play41:40

compress unless you are a ransomware

play41:42

attacker in that case you will encrypt

play41:44

everything right but here they're

play41:46

encrypting and compressing one file

play41:48

which means this file probably has some

play41:50

intelligence some information that they

play41:53

want to send to command and control

play41:56

server and compression is required

play41:59

because you want to flow below the radar

play42:01

if you start sending gigabytes of uh

play42:04

files somebody will notice right some

play42:07

firewall alarm will go off or some

play42:09

intution detection will go off but if it

play42:11

is a small few uh kilobytes or you know

play42:14

small low megabytes file it can go like

play42:18

a regular email and everything right so

play42:20

nobody will get suspicious it will not

play42:23

be considered an anomaly so we find that

play42:26

uh that through ip config what they were

play42:29

trying to do is system network

play42:32

configuration

play42:34

Discovery so this is in the discovery

play42:36

tactic so one of the tactics out of the

play42:40

14 tactics is called Discovery because

play42:43

most attacker when they first make their

play42:45

foothold in the system in one of the

play42:47

devices they try to figure out they do

play42:50

internal reconnaissance or something to

play42:52

figure out where I am what is the

play42:54

structure you know what is this machine

play42:56

connected to

play42:57

and and figure out whether I am actually

play43:00

running as root all this stuff is about

play43:03

Discovery

play43:04

right so so one tactic here is

play43:08

Discovery and also it is being run

play43:12

therefore it is also execution right

play43:14

although this is a benign binary ip

play43:17

config is a benign program but at least

play43:19

it is being executed on behalf of a

play43:22

malicious uh malicious actor so so it's

play43:27

a part of an attack tactic so it will

play43:29

also fall under

play43:32

execution now here we found that uh in

play43:35

this uh larger SC uh you know service

play43:38

create command we figured out that vsx

play43:42

is vco so moderate confidence that this

play43:45

is

play43:46

exfiltration because we are trying to

play43:48

compress and encrypt the file it is

play43:50

likely to be com compression uh likely

play43:53

to be exfiltration and then it is being

play43:57

seen to run by a cismon which is

play44:01

basically execution right so so this is

play44:04

how we are mapping the

play44:07

tactics so here you see that we are

play44:09

actually

play44:10

going uh more from technique to uh

play44:13

tactic rather than tactic in the other

play44:15

one we went from tactic to technique

play44:17

here since we are looking at the

play44:19

commands it's likely that we'll we'll

play44:21

find the technique first and then we'll

play44:23

find the tactic okay so we have it's

play44:27

time so we'll get from here in the next

play44:30

class uh uh because uh uh this will take

play44:34

some time about discussing about the

play44:37

techniques and concurrent techniques and

play44:39

so on but you start getting the idea

play44:42

right so you I think you should you

play44:44

should by now have a good idea about how

play44:46

to uh do this from uh finished reports

play44:50

and you are starting to get some idea

play44:52

about how to do it in with raw data so

play44:55

by the by the time uh we are uh here uh

play44:59

next week we'll actually uh do more on

play45:02

the raw data okay

play45:05

[Music]

play45:20

[Music]

play45:25

[Music]

Rate This

5.0 / 5 (0 votes)

相关标签
CybersecurityATD CKData MappingThreat IntelMalware AnalysisNetwork ForensicsCommand ExecutionSecurity TacticsIncident ResponseCyber Attack
您是否需要英文摘要?