Тёмный

Zeek in Action, Video 1, Suspected Malware Compromise 

Zeek
Подписаться 4,7 тыс.
Просмотров 20 тыс.
50% 1

Опубликовано:

 

21 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 20   
@lafang.xcix_v
@lafang.xcix_v 3 месяца назад
Great work. You have no idea how much this has helped me..
@Zeekurity
@Zeekurity Месяц назад
Glad it helped!
@moshemazor5373
@moshemazor5373 3 года назад
Hello, I've watched the entire thing and got a little out of it. But when you're looking at a pcap file using wireshark or any analysis program, how to you know what to look for? Because I was given a task to look for something suspicious at a pcap file using wireshark, and after 1 hour I achieved nothing. Any tips?
@Zeekurity
@Zeekurity 2 года назад
This is a good question. There are several approaches you could try. One is to see if you can validate any of the "implied bad" indicators, such as Suricata IDS alerts. Do they lead to signs of command and control traffic, indicating remote unauthorized use, for example? Another is to look for activity that is unauthorized for the system. For example, is there a valid reason for the system to be communicating to the sites it is visiting? Third, you can apply threat intelligence to the data set. Are there any "hits" for known C2 certificates, domains, IP addresses, etc.? Starting with Wireshark is generally difficult as the data is too granular. Start with Zeek data or Suricata IDS alerts if you have no idea where to begin. Finally, you can pivot to NSM data after getting a hit from EDR or other sources. Thanks for your question.
@eli_the_crypto_guy
@eli_the_crypto_guy 2 года назад
Know normal to find evil. Also used to get more details from another alert source, you don't necessarily need to start with Zeek. If you have an alert source from lets say anti-virus you can then look into the Zeek logs to see what happened before, and after the event.
@geodezix
@geodezix 2 года назад
how did you deduce mike's laptop has malware, other than guessing? why not do a demo where you have definitive proof via zeek?
@Zeekurity
@Zeekurity 2 года назад
In this scenario, "Mike calls the Help Desk and says his desktop computer is "acting weird" but he refuses to provide any details." In this case we just wanted to demonstrate the sorts of data Zeek could provide. Thanks for your comment.
@bravofoxtrotllc6817
@bravofoxtrotllc6817 2 года назад
Does zeek have its own UI or do I need someone elses software?
@Zeekurity
@Zeekurity 2 года назад
You can review the logs via command line, or you can use a console like Brim or Elastic. Thanks for your question.
@paulmisner6107
@paulmisner6107 3 года назад
Great job, watched it, going to lab it later.
@Zeekurity
@Zeekurity 2 года назад
Thank you for your feedback. 🙏
@vanajareddy3857
@vanajareddy3857 Год назад
Is there any scripts for malware detection in zeek on pcap ?
@Zeekurity
@Zeekurity Год назад
This is a short question, but there is not a short answer. What aspect of malware do you want to detect? This is probably best answered in Slack join.slack.com/t/zeekorg/shared_invite/zt-1ev1nr7z4-rEVSsaIzYzFWpdgh2I6ZOg or Discourse community.zeek.org/
@geodezix
@geodezix 2 года назад
why wouldn't mike want to cooperate on this troubleshhot? other computers may be compromised? what kind of employee would refuse to cooperate in a forensic?
@Zeekurity
@Zeekurity 2 года назад
You could imagine that Mike didn't want to be bothered with the event. This happens a lot unfortunately! I've worked cases where the user told IT and security to leave them alone, even though their computer was actively compromised. 🤦‍♂️ Thanks for your question.
@iamtheconqueror
@iamtheconqueror 8 месяцев назад
Mike might not be refusing to cooperate, he might not know. We get tickets like that all the time "something has changed, but I don't know what", "things are different but I don't know how", etc. The pretense of the video is just a good one to use. Even if Mike had information to give, he could miscommunicate or just be wrong. It's good to take in user information, but never trust it
@samiul008
@samiul008 3 года назад
This pcap is not available in the site. any idea how to get it
@Zeekurity
@Zeekurity 3 года назад
We'll find out and get back to you! Thanks for letting us know.
@Zeekurity
@Zeekurity 2 года назад
Here is the link. I was able to download it just now. Thanks for your question. www.malware-traffic-analysis.net/2015/02/08/index.html
@peterwagner9795
@peterwagner9795 Год назад
The file is not show up in the list, but the link works :) Thanks
Далее
Zeek in Action, Video 2, Tracing a Trickbot Infection
15:58
Wireshark - Malware traffic Analysis
16:01
Просмотров 201 тыс.
Тестирую гаджет для роллов! 🙈
00:42
Борщ в стиле высокой кухни!
00:57
Brim Demo
21:04
Просмотров 21 тыс.
Bypassing Firewalls With PING!
17:40
Просмотров 81 тыс.
Threat Hunting via Sysmon - SANS Blue Team Summit
51:01
Cybersecurity Tool for Network Analysis - Zeek
8:19
Просмотров 4,5 тыс.