1. Primary Collection Source Intrusion Analysis 1. Welcome to Cyber Threat Intelligence FOR578 Day 2
2. The Fundamental Skill Set Intrusion Analysis
3. Course Agenda
4. Section 2 Outline
5. Primary Collection Source Intrusion Analysis
6. Kill Chain Overview
7. Stage 1 Recon Precursors
8. Recon Example
9. Stage 2 Weaponization
10. Weaponization Example Trojanized Document
11. Stage 3 Delivery
12. Delivery Example HTTP
13. Stage 4 Exploitation
14. ExploitDelivery Loop SMTPHTTP
15. Stage 5 Installation
16. Installation Example
17. Stage 6 Command and Control C2
18. C2 Example Sleep
19. Stage 7 Actions on Objectives
20. Actions Example
21. Introduction to the Diamond Model
22. Diamond Model Axioms
23. Diamond Adversary
24. Adversary Human Fingerprints Examples in Malware
25. Diamond CapabilityTTP
26. Diamond Infrastructure
27. Diamond Victim
28. Merging the Diamond Model and Kill Chain
29. One Phases Choices May Move in Another Phase
30. CoA Introduction
31. The Courses of Action Matrix
32. CoA Discover
33. CoA Detect
34. CoA Deny
35. CoA Disrupt
36. CoA Degrade
37. CoA Deceive
38. CoA Destroy
39. Action Selection and Mutual Exclusivity
40. Leveraging CoA Intel GainLoss
41. MITRE ATTCK
42. TTPs in ATTCK
43. Different Models for Different Use Cases
44. Exercise 21 Read In
45. Details Roles and Requirements 1
46. Details Roles and Requirements 2
47. Priority Intelligence Requirements
48. Exercise 21
49. Exercise 21 Takeaways
2. Kill Chain and Diamond Deep Dive 1. Kill Chain and Diamond Deep Dive
2. Log Repositories and logrotate
3. Memory Analysis with Volatility
4. Section 2 Note Responder Actions
5. Incoming Alert What You Have
6. First Steps Reported Intrusion
7. Responder Action Network Flow Data
8. Discovery Findings Network Flow
9. Responder Action Proxy Logs
10. Discovery Findings Proxy Logs
11. Reported Intrusion Where Are We Now
12. Exploiting the URL for Tool Discovery
13. Pivoting on New Intelligence
14. Observing the Indicator Life Cycle
15. Reported Intrusion Where Are We Now
16. Reported Intrusion Where Do We Go
17. Kill Chain Completion
18. Exercise 22
19. Priority Intelligence Requirements in Exercise Scenario
20. Exercise 22 Takeaways
21. Phase 7 Actions on Objectives
22. Actions on Objectives Network Pivoting Overview
23. Actions on Objectives Host Pivoting Overview
24. Reported Intrusion C2 Victim Pivot FTP Flow Data
25. Responder Action Full Packet Capture
26. Reported Intrusion C2 Victim Pivot 1 FTP Network Traffic
27. Reported Intrusion C2 Victim Pivot 2 Flow Data to Known Malicious IPs
28. Reported Intrusion Victim Pivot 2 Proxy Search from Flow Data
29. Reported Intrusion Current Knowledge Gaps 1
30. C2 Decoding Overview
31. Reported Intrusion Memory Forensics 1
32. Reported Intrusion Memory Forensics 2
33. Phase 7 Discovery Disk Forensics 1
34. Phase 7 Discovery Disk Forensics 2
35. Responder Action Reverse Engineering
36. Exercise 23
37. Priority Intelligence Requirements in Ex 23
38. Exercise 23 Takeaways
39. Edison Malware Analysis RFI Response
40. Capabilities of scvhostexeFJerk
41. C2 Protocol for scvhostexeFJerk
42. C2 Decoding with CyberChef
43. C2 Decoding with Command Line and Scripting
44. The Beginning of a Persona
45. Exfil Documents
46. Where Do We Go
47. Reported Intrusion Current Knowledge Gaps 2
48. Moving into the System
49. Installation Findings
50. Responder Action Reverse Engineers RFIs
51. Reported Intrusion Current Knowledge
52. Phase 4 Exploitation Findings and Problems
53. Responder Action User Inbox Archive
54. Glancing Forward Phase 3 Findings
55. What Happened
56. Exercise 24
57. Priority Intelligence Requirements in Ex 24
58. Exercise 24 Takeaways
3. Handling Multiple Kill Chains 1. Handling Multiple Kill Chains
2. Where Are We and Where Do We Go 1
3. Reported Intrusion Current Knowledge Gaps
4. Reported Intrusion Phase 5 Findings Reprise
5. Reported Intrusion Current Knowledge
6. InstallationFindings
7. Where Are We and Where Do We Go 2
8. Phase 3 DeliveryFindings
9. The Time Card System
10. Reported Intrusion Where Are We and Where Do We Go
11. Kill Chain Sequencing
12. Visual Representation of Adversarys Efforts
13. Key Indicators and Insights from the Slides Intrusion
14. Exercise 25
15. Some Key Items Collected Out of the Intrusion
16. Priority Intelligence Requirements in Ex 25 1
17. Priority Intelligence Requirements in Ex 25 2
18. Key Indicators and Insights from the Exercises Intrusion
19. SANS DFIR
20. Here is my lens You know my methods Sherlock Holmes
21. COURSE RESOURCES AND CONTACT INFORMATION