Detect Self Signed Certificates T1587.003
- Identify Server or Client traffic in Wireshark with "Certificate, Server Key Exchange, Server Hello Done" and identify the issuer and subject. If same, then self signed.
Detect Zone Transfer T1590.002
- Use WireShark to find DNS zone transfers with
dns.qry.type == 252
.
Detect Port Scanning T1595.001
- Filter traffic in WireShark for source and destination IP with SYN ACK (
tcp.flags == 0x0012
) to show ports that responded to SYN from the adversary. - Filter traffic in WireShark for source and destination IP with reset flag set by the target using
tcp.flags.reset == 1
.
Identify Web Scanning T1595.003
- Filter traffic in WireShark to display the various URIs and GET requests from HTTP traffic. A large number means adversary is web scanning.
- Look for all subdomains during web scanning in WireShark with
_ws.col.info == "HTTP/1.1 200 OK (text/html)"
.
Identify LLMNR Poisoning T1557.001
- Filter for "LLMNR" traffic within wireshark pcap and identify numerous resquests and response failures from a machine. There will be NTLMSSP_NEGOTIATE, NTLMSSP_CHALLENGE, and NTLMSSP_AUTH messages.
Identify Credential Stuffing T1110.004
- Use
wireshark
with http traffic to identify username and password combinations to the same destination IP address, repeatedly using POST REQUESTS, and in quick succession. The HTTP status of 404 is a common response from the target. - Use
tshark
to filter and identify repeated POST requests with username and password combinations.- Command line:
$ tshark -Y "http.request.method==POST and ip.src ==156.146.62.213 and http.request.uri contains loginservice" -r meerkat.pcap -T fields -e text | cut -d " " -f 7,11 | sort | uniq
- Command line:
- Use
tcpview
within Sysinternalstcpview -accepteula
- Use the native to windows,
resmon
via command lineresmon
- Use
procmon
within SysInternalsprocmon -accepteula
- Use
zeek
with conn.log from a pcapzeek-cut
can be beneficial on the command line to pick specific fields
- Use
Get-NetTCPConnection -State Listen | Select-Objecct -Property LocalAddress,LocalPort,OwingProcess
within Powershell - Use
tcpdump
on the command line.- Command to use is
tcpdump -r file -n
- Command to use is
- Use volatility with a forensic image.
- Version 3 uses windows.netscan.NetScan
- Use Rita to find beaconing activity.
- Use SRUM Dump to examine system usages related to processes.
- View old network connections at
SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Signatures\Unmanaged
orSOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Signatures\Managed
orSOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Nla\Cache
. - Use
eventvwr.msc
with Windows Security Event logs 5156 for Windows Filtering Platform permitted connections.
- Use
zeek
with conn.log from a pcapzeek-cut
can be beneficial on the command line to pick specific fields
- Use Rita to find beaconing activity.
- Use
zeek
with dhcp.log from pcapzeek-cut
can be beneficial on the command line to pick specific fields
- Use Wireshark and filter on DHCP traffic.
- Use
zeek
with dns.log from pcapzeek-cut
can be beneficial on the command line to pick specific fields
- Use Wireshark and filter on DNS traffic.
- Use Rita to find beaconing activity.
- Use WireShark to find DNS zone transfers with
dns.qry.type == 252
.
- Use
zeek
with snmp.log from pcapzeek-cut
can be beneficial on the command line to pick specific fields
- Use Wireshark and filter on SNMP traffic.
- Use
zeek
with syslog.log from pcapzeek-cut
can be beneficial on the command line to pick specific fields
View File Hashes In Transit T1020
- Use
zeek
with the/opt/zeek/share/zeek/policy/frameworks/files/hash-all-files.zeek
frameworkzeek-cut
can be beneficial on the command line to pick specific fields- examine the
files.log
file
- Use
zeek
with the/opt/zeek/share/zeek/policy/frameworks/files/extract-all-files.zeek
frameworkzeek-cut
can be beneficial on the command line to pick specific fields- examine the
extract-files
folder
- Use Wireshark and extract objects.
- Use
zeek
with thezeek-sniffpass
packagezeek-cut
can be beneficial on the command line to pick specific fields
- Use Wireshark and examine packets.
- Use
zeek
with thegeoip-conn
package.zeek-cut
can be beneficial on the command line to pick specific fields
Detect Log4J Exploitation T1059.007
- Use
zeek
with the/opt/zeek/share/zeek/site/cve-2021-44228
script/packagezeek-cut
can be beneficial on the command line to pick specific fields- examine the
log4j.log
file
- Use
Get-WinEvent
with Sysmon Event Logs.- Command to use is
Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=3 | Measure-Object
- Command to use is
- Use Wireshark statistics.
- Use
tshark
within the command line.- Command to use is
"C:\Program Files\Wireshark\tshark.exe" -r pcap_file.pcap -Y "icmp" -T fields -e data
- Command to use is
- Use Rita to find beaconing activity.
- Use Rita to find beaconing activity.
Find VPN Connections T1333
- Use Event ID 6272 within windows security logs for external IP of user.
- Look for port 3389 connections within network traffic
View WMI Traffic T1047
- Identify traffic on port 135 or 137 with
dce_rpc
service.
View Non Standard Port Traffic T1509.
- Use PSReadline to view scriptblock activity.
Identify Web Shells T1505.003
- Look for out of date browser agents with HTTP traffic on port 80.
- Look for connections to webpages like
.php, .aspx, .jsp, or .asp
.
- Use tcpdump with
-n
to resolve.- Command to use:
tcpdump -r pcap 'host 92.242.140.21' -n
- Command to use:
- Look for increase in traffic with destination port 445 and destination process
ntoskrnl.exe
to each workstation within a domain.