<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: AJ</title>
    <description>The latest articles on DEV Community by AJ (@aj_0).</description>
    <link>https://dev.to/aj_0</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2681845%2F35cabbf6-bcfe-4b40-b143-c8ceb44dd22e.png</url>
      <title>DEV Community: AJ</title>
      <link>https://dev.to/aj_0</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/aj_0"/>
    <language>en</language>
    <item>
      <title>Exploring Zeek: A Powerful Network Security Monitoring Tool</title>
      <dc:creator>AJ</dc:creator>
      <pubDate>Sun, 26 Jan 2025 22:59:10 +0000</pubDate>
      <link>https://dev.to/aj_0/exploring-zeek-a-powerful-network-security-monitoring-tool-3iol</link>
      <guid>https://dev.to/aj_0/exploring-zeek-a-powerful-network-security-monitoring-tool-3iol</guid>
      <description>&lt;p&gt;Zeek is a powerful and flexible network security monitoring tool used by analysts to process and analyze network traffic. It operates by inspecting network packets and generating logs that provide detailed insights into network events. This blog post will guide you through Zeek’s structure, its primary capabilities, and practical use cases.&lt;/p&gt;

&lt;p&gt;The Layers of Zeek&lt;br&gt;
Zeek has two main layers:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Event Engine&lt;/strong&gt;&lt;br&gt;
The Event Engine processes packets, breaking them into smaller components like source and destination addresses, protocol information, session details, and more. This is the foundational layer where data is prepared for deeper analysis.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Policy Script Interpreter&lt;/strong&gt;&lt;br&gt;
This layer uses Zeek scripts to describe event correlations. It allows analysts to define custom logic for event analysis and automate responses to specific network activities.&lt;/p&gt;

&lt;p&gt;Here’s a potential draft for your blog post about Zeek. It adheres to your guidelines of being written in simple academic English, structured for DEV compatibility, and including code examples wrapped in appropriate formatting.&lt;/p&gt;

&lt;p&gt;Exploring Zeek: A Powerful Network Security Monitoring Tool&lt;br&gt;
Zeek is a powerful and flexible network security monitoring tool used by analysts to process and analyze network traffic. It operates by inspecting network packets and generating logs that provide detailed insights into network events. This blog post will guide you through Zeek’s structure, its primary capabilities, and practical use cases.&lt;/p&gt;

&lt;p&gt;The Layers of Zeek&lt;br&gt;
Zeek has two main layers:&lt;/p&gt;

&lt;p&gt;Event Engine&lt;br&gt;
The Event Engine processes packets, breaking them into smaller components like source and destination addresses, protocol information, session details, and more. This is the foundational layer where data is prepared for deeper analysis.&lt;/p&gt;

&lt;p&gt;Policy Script Interpreter&lt;br&gt;
This layer uses Zeek scripts to describe event correlations. It allows analysts to define custom logic for event analysis and automate responses to specific network activities.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Zeek Frameworks&lt;/strong&gt;&lt;br&gt;
Zeek comes with several extended frameworks to enhance functionality. Some of the key frameworks include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;File Analysis: Enables hashing and extraction of files from network traffic.&lt;/li&gt;
&lt;li&gt;Signature Framework: Detects anomalies based on defined conditions.&lt;/li&gt;
&lt;li&gt;Intelligence Framework: Processes threat intelligence feeds to identify suspicious activities.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Working with Zeek: Basic Commands&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;zeekctl status
zeekctl start
zeekctl stop

# Process a pcap file
zeek -C -r sample.pcap

# View saved logs
ls -l /opt/zeek/logs/

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Explanation:&lt;br&gt;
-C: Ignore checksum errors.&lt;br&gt;
-r: Read and process a pcap file.&lt;/p&gt;

&lt;p&gt;Zeek Signatures: Detecting Anomalies&lt;br&gt;
Zeek’s signature framework allows you to define conditions to detect unusual network behavior. A signature comprises three components: ID, conditions, and actions.&lt;/p&gt;

&lt;p&gt;Here’s an example of detecting cleartext password submission:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;signature http-password {
    ip-proto == tcp
    dst-port == 80
    payload /.*password.*/
    event "Cleartext Password Found!"
}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;To run a signature file:&lt;br&gt;
&lt;code&gt;zeek -C -r sample.pcap -s signature_file.zeek&lt;/code&gt;&lt;/p&gt;

</description>
      <category>network</category>
      <category>cybersecurity</category>
      <category>hackathon</category>
      <category>wireshark</category>
    </item>
    <item>
      <title>Snort</title>
      <dc:creator>AJ</dc:creator>
      <pubDate>Fri, 17 Jan 2025 22:08:55 +0000</pubDate>
      <link>https://dev.to/aj_0/snort-nd2</link>
      <guid>https://dev.to/aj_0/snort-nd2</guid>
      <description>&lt;h2&gt;
  
  
  Snort
&lt;/h2&gt;

&lt;p&gt;Snort is set of predefined rules which is used mostly for IDS or IPS. It has 3 main operational modes&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Packet Sniffing- Shows network traffic like Wireshark&lt;/li&gt;
&lt;li&gt;Packet logging —&amp;gt; collects and logs network traffic into a file&lt;/li&gt;
&lt;li&gt;Network intrusion detection —&amp;gt; Analyzes packets and matches traffic against signature&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Intrusion detection system
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Network intrusion detection system —&amp;gt; monitors traffic from different areas of the network and if a signature is identified an alert is made&lt;/li&gt;
&lt;li&gt;Host based intrusion detection system —&amp;gt; Monitor traffic from a single endpoint device, basically investigating the traffic on a specific device and if a signature is identified an alert is created&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  ntrusion prevention system
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Network intrusion prevention system —&amp;gt; monitor traffic and if a signature is identified the connection is terminated&lt;/li&gt;
&lt;li&gt;Behavior based intrusion  prevention system —&amp;gt;  Same thing it monitors and terminates if an usual behavior is detected, the difference between NIP and BIP is behavior based requires training period which is known as baselining to learn normal traffic so it can differentiate between threats etc.&lt;/li&gt;
&lt;li&gt;Wireless intrusion Prevention System —&amp;gt; monitors the traffic flow from of wireless network, if a signature is identified the connection is terminated&lt;/li&gt;
&lt;li&gt;Host-based Intrusion Prevention System —&amp;gt; monitors and protects network on one single end point device, if a signature is identified the connection is terminated&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Detection prevention techniques
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Signature based&lt;/li&gt;
&lt;li&gt;behavior based&lt;/li&gt;
&lt;li&gt;Policy based&lt;/li&gt;
&lt;/ul&gt;

</description>
    </item>
    <item>
      <title>Yara</title>
      <dc:creator>AJ</dc:creator>
      <pubDate>Sun, 12 Jan 2025 23:36:51 +0000</pubDate>
      <link>https://dev.to/aj_0/yara-48mh</link>
      <guid>https://dev.to/aj_0/yara-48mh</guid>
      <description>&lt;h2&gt;
  
  
  Yara
&lt;/h2&gt;

&lt;p&gt;Yara rule is a way of identifying malware samples based on if it matches a condition we specified.&lt;/p&gt;

&lt;p&gt;Yara identifies malware based on binary and texual patterns in files which they usually contain hexa decimal and strings&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb0sk0s5au1c7d0r6737z.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb0sk0s5au1c7d0r6737z.png" alt="Image description" width="800" height="1108"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Yara usually consist of the following &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Meta —&amp;gt; This section stored information related to author, description of the rule,, date, reference&lt;/li&gt;
&lt;li&gt;String —&amp;gt; stores the specific texts we are looking for in a file&lt;/li&gt;
&lt;li&gt;Condition —&amp;gt; the condition to be met to flag the file&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Conditions example:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;rule example_rule{

    meta: 
    author="A_J"
    desc="Simple rule"

    strings:
    $hello_word= "Hello worrld" nocase

    condition:
    $hello_word and filesize &amp;lt;20kb

    }

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



</description>
    </item>
    <item>
      <title>Cyber skill chain</title>
      <dc:creator>AJ</dc:creator>
      <pubDate>Fri, 10 Jan 2025 22:53:56 +0000</pubDate>
      <link>https://dev.to/aj_0/cyber-skill-chain-3h6f</link>
      <guid>https://dev.to/aj_0/cyber-skill-chain-3h6f</guid>
      <description>&lt;h2&gt;
  
  
  Cyber kill chain
&lt;/h2&gt;

&lt;p&gt;this framework is designed to identify and prevent network intrusions By learning what attackers need to do in order to achieve their goals.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5ta0l9jp2rch45urv028.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5ta0l9jp2rch45urv028.png" alt="Image description" width="770" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Reconnaissance
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Reconnaissance&lt;/strong&gt; is discovering and collecting information on the system and the victim&lt;br&gt;
&lt;strong&gt;OSINT&lt;/strong&gt; (Open-Source Intelligence) also falls under reconnaissance. collecting every available piece of information on the company and its employees, such as the company's size, email addresses, phone numbers from publicly available resources to determine the best target for the attack.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fijmjl3ed4wvovpvnb71j.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fijmjl3ed4wvovpvnb71j.png" alt="Image description" width="800" height="1075"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Weaponization
&lt;/h3&gt;

&lt;p&gt;After a successful reconnaissance stage, "Megatron" would work on crafting a "weapon of destruction”&lt;/p&gt;

&lt;p&gt;In the Weaponization phase, the attacker would:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Create an infected Microsoft Office document containing a malicious macro or VBA (Visual Basic for Applications) scripts. If you want to learn about macro and VBA, please refer to the article &lt;a href="https://www.trustedsec.com/blog/intro-to-macros-and-vba-for-script-kiddies/" rel="noopener noreferrer"&gt;"Intro to Macros and VBA For Script Kiddies" by TrustedSec&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;An attacker can create a malicious payload or a very sophisticated worm, implant it on the USB drives, and then distribute them in public. An example of the virus.&lt;/li&gt;
&lt;li&gt;An attacker would choose Command and Control (C2) techniques for executing the commands on the victim's machine or deliver more payloads. You can read more about the C2 techniques on &lt;a href="https://attack.mitre.org/tactics/TA0011/" rel="noopener noreferrer"&gt;MITRE ATT&amp;amp;CK&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;An attacker would select a &lt;strong&gt;backdoor&lt;/strong&gt; implant (the way to access the computer system, which includes bypassing the security mechanisms).&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Delivery
&lt;/h3&gt;

&lt;p&gt;The Delivery phase is when "Megatron" decides to choose the method for transmitting the payload or the malware. He has plenty of options to choose from: &lt;/p&gt;

&lt;p&gt;• Phishing email: after conducting the reconnaissance and determining the targets for the attack, the malicious actor would craft a malicious email that would target either a specific person (spearphishing attack) or multiple people in the company. The email would contain a payload or malware. For example, "Megatron" would learn that Nancy from the Sales department at company A would constantly like the posts on LinkedIn from Scott, a Service Delivery Manager at company B. He would give it a second guess that they both communicate with each other over work emails. "Megatron" would craft an email using Scott's First Name and Last Name, making the domain look similar to the company Scott is working at. An attacker would then send a fake "Invoice" email to Nancy, which contains the payload.&lt;/p&gt;

&lt;p&gt;Distributing infected USB drives in public places like coffee shops, parking lots, or on the street. By putting the company logo on the usb&lt;/p&gt;

&lt;p&gt;Watering hole attack. A watering hole attack is a targeted attack designed to aim at a specific group of people by compromising the website they are usually visiting and then redirecting them to the malicious website of an attacker's choice. The attacker would look for a known vulnerability for the website and try to exploit it. The attacker would encourage the victims to visit the website by sending "harmless" emails pointing out the malicious URL to make the attack work more efficiently. After visiting the website, the victim would unintentionally download malware or a malicious application to their computer.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;drive-by download&lt;/strong&gt; where users are tricked to download unintended programs&lt;/p&gt;

&lt;h3&gt;
  
  
  Explotation
&lt;/h3&gt;

&lt;p&gt;These are examples of how an attacker carries out exploitation:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The victim triggers the exploit by opening the email attachment or clicking on a malicious link.&lt;/li&gt;
&lt;li&gt;Using a zero-day exploit.&lt;/li&gt;
&lt;li&gt;Exploit software, hardware, or even human vulnerabilities.&lt;/li&gt;
&lt;li&gt;An attacker triggers the exploit for server-based vulnerabilities.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Installation  &lt;a href="https://www.offensive-security.com/metasploit-unleashed/persistent-backdoors/" rel="noopener noreferrer"&gt;**persistent backdoor&lt;/a&gt;.**
&lt;/h3&gt;

&lt;p&gt;The persistence can be achieved through:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Installing a &lt;strong&gt;web shell&lt;/strong&gt; on the webserver. A web shell is a malicious script written in web development programming languages such as ASP, PHP, or JSP used by an attacker to maintain access to the compromised system. Because of the web shell simplicity and file formatting (.php, .asp, .aspx, .jsp, etc.) can be difficult to detect and might be classified as benign. You may check out this great article released by &lt;a href="https://www.microsoft.com/security/blog/2021/02/11/web-shell-attacks-continue-to-rise/" rel="noopener noreferrer"&gt;Microsoft&lt;/a&gt; on various web shell attacks.&lt;/li&gt;
&lt;li&gt;Installing a backdoor on the victim's machine. For example, the attacker can use &lt;a href="https://www.offensive-security.com/metasploit-unleashed/meterpreter-backdoor/" rel="noopener noreferrer"&gt;Meterpreter&lt;/a&gt; to install a backdoor on the victim's machine. Meterpreter is a Metasploit Framework payload that gives an interactive shell from which an attacker can interact with the victim's machine remotely and execute the malicious code.&lt;/li&gt;
&lt;li&gt;Creating or modifying Windows services. *&lt;em&gt;**This technique is known as &lt;a href="https://attack.mitre.org/techniques/T1543/003/" rel="noopener noreferrer"&gt;T1543.003&lt;/a&gt; on MITRE ATT&amp;amp;CK (MITRE ATT&amp;amp;CK® is a knowledge base of adversary tactics and techniques based on real-world scenarios). An attacker can create or modify the Windows services to execute the malicious scripts or payloads regularly as a part of the persistence. An attacker can use the tools like &lt;/em&gt;&lt;em&gt;sc.exe&lt;/em&gt;* (sc.exe lets you Create, Start, Stop, Query, or Delete any Windows Service) and &lt;a href="https://attack.mitre.org/software/S0075/" rel="noopener noreferrer"&gt;Reg&lt;/a&gt; to modify service configurations. The attacker can also &lt;a href="https://attack.mitre.org/techniques/T1036/" rel="noopener noreferrer"&gt;&lt;strong&gt;masquerade&lt;/strong&gt;&lt;/a&gt; the malicious payload by using a service name that is known to be related to the Operating System or legitimate software.&lt;/li&gt;
&lt;li&gt;Adding the entry to the "run keys" for the malicious payload in the Registry or the Startup Folder. By doing that, the payload will execute each time the user logs in on the computer. According to MITRE ATT&amp;amp;CK, there is a startup folder location for individual user accounts and a system-wide startup folder that will be checked no matter what user account logs in.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Command &amp;amp; Control (C2)
&lt;/h3&gt;

&lt;p&gt;The most common C2 channels used by adversaries nowadays:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The protocols HTTP on port 80 and HTTPS on port 443 - this type of beaconing blends the malicious traffic with the legitimate traffic and can help the attacker evade firewalls.&lt;/li&gt;
&lt;li&gt;DNS (Domain Name Server). The infected machine makes constant DNS requests to the DNS server that belongs to an attacker, this type of C2 communication is also known as DNS Tunneling.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Actions on Objectives (Exfiltration)
&lt;/h3&gt;

&lt;p&gt;After going through six phases of the attack, "Megatron" can finally achieve his goals, which means taking action on the original objectives. With hands-on keyboard access, the attacker can achieve the following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Collect the credentials from users.&lt;/li&gt;
&lt;li&gt;Perform privilege escalation (gaining elevated access like domain administrator access from a workstation by exploiting the misconfiguration).&lt;/li&gt;
&lt;li&gt;Internal reconnaissance (for example, an attacker gets to interact with internal software to find its vulnerabilities).&lt;/li&gt;
&lt;li&gt;Lateral movement through the company's environment.&lt;/li&gt;
&lt;li&gt;Collect and exfiltrate sensitive data.&lt;/li&gt;
&lt;li&gt;Deleting the backups and shadow copies. Shadow Copy is a Microsoft technology that can create backup copies, snapshots of computer files, or volumes.&lt;/li&gt;
&lt;li&gt;Overwrite or corrupt data.&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
    </item>
    <item>
      <title>Pyramid Of Pain</title>
      <dc:creator>AJ</dc:creator>
      <pubDate>Thu, 09 Jan 2025 21:47:28 +0000</pubDate>
      <link>https://dev.to/aj_0/pyramid-of-pain-28d</link>
      <guid>https://dev.to/aj_0/pyramid-of-pain-28d</guid>
      <description>&lt;p&gt;Pyramid of pain&lt;/p&gt;

&lt;p&gt;Pyramid of pain is about determining the level of difficulty it will cause for an attacker to change the indication associated with them and their group&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcwhvjv6u3ootmtt9r2ih.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcwhvjv6u3ootmtt9r2ih.png" alt="Image description" width="768" height="432"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The pyramid is at the top indicates the most difficult part to change and lowest is the easiet.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hashes&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Hashes is a way of authenticating the legitimate of file, message etc. It takes one input and generates a fixed sized hash value.  A hash algorthim is considered to be not secure if 2 files can have same hash value.&lt;/p&gt;

&lt;p&gt;If the attacker tries to use a known malware the hash of the malware can be compared against already known malware hashes in a database to detect if its malicious.&lt;/p&gt;

&lt;p&gt;Tools you can use to do hash lookups:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;VirusTotal&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;MetaDefender Cloud - OPSWAT&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Powershell script to get file hash&lt;br&gt;
&lt;code&gt;Get-FileHash .\Filename.txt -Algorthim MD5&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;IP&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Ip address are used to uniquely identify devices connect to a network in order to receive and send information over the network.  In the pyramid of pain, ip addresses are indicated with color green. From defense prespective you can block, deny, drop requests from certain ip addresses but this wont work on experienced attacker they can just change to a new ip address.&lt;/p&gt;

&lt;p&gt;Websites to find harmful ip adresses&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://app.any.run/submissions" rel="noopener noreferrer"&gt;https://app.any.run/submissions&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Domain names&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Domain Names can be thought as simply mapping an IP address to a string of text&lt;/p&gt;

&lt;p&gt;many DNS providers have a very low standards and they  provide APIs which makes it even easier for an attacker to change the domain.&lt;/p&gt;

&lt;p&gt;Punycode is a way of converting words that cannot be written in ASCII, into a Unicode ASCII encoding.&lt;/p&gt;

&lt;p&gt;Url shortening links:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;bit.ly&lt;/li&gt;
&lt;li&gt;goo.gl&lt;/li&gt;
&lt;li&gt;ow.ly&lt;/li&gt;
&lt;li&gt;s.id&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Network Artifacts (Yellow zone)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A network artifact can be a user-agent string, C2 information, or URI patterns followed by the HTTP POST requests.&lt;/p&gt;

&lt;p&gt;Network artifacts can be detected in Wireshark PCAPs (file that contains the packet data of a network) by using a network protocol analyzer such as &lt;a href="https://www.wireshark.org/docs/wsug_html_chunked/AppToolstshark.html" rel="noopener noreferrer"&gt;TShark&lt;/a&gt; or exploring IDS (Intrusion Detection System) logging from a source such as &lt;a href="https://www.snort.org/" rel="noopener noreferrer"&gt;Snort&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;If you can detect the custom User Agent strings that the attacker is using, you might be able to block them, creating more obstacles and making their attempt to compromise the network more annoying.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tools (challengin)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Attacker usually use utlities such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Malicious macro documents for spear phishing attempts&lt;/li&gt;
&lt;li&gt;A backdoor that can be used to establish C2&lt;/li&gt;
&lt;li&gt;Any custom .exe and .dll files, payloads, password crackers&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;TTPS (Tough)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;TTPs stands for Tactics, Techniques &amp;amp; Procedures. This includes the whole &lt;a href="https://attack.mitre.org/" rel="noopener noreferrer"&gt;MITRE ATT&amp;amp;CK Matrix&lt;/a&gt;, which means all the steps taken by an attacker to achieve their goal, starting from phishing attempts to persistence and data exfiltration.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>soc</category>
      <category>blueteam</category>
    </item>
  </channel>
</rss>
