Over and over again, I observe that highly skilled analysts do something that might seem counter intuitive, but is key to their success.
They constantly review the facts -- what they know. That's the current timeline and the relationships they've uncovered.
Inexperienced analysts resist this sometimes because it feels like it takes up a lot of time. But it's worth the time. This is where analysts discover timeline gaps, identify new investigative questions, and prioritize their next move.
As you might imagine, revisiting the facts depends highly on documenting what you know when you come to know it. That's a habit that gets formed over time but can form faster if you understand the value and are deliberate about it.
Anecdotally, different specialties form this documentation habit better than others. For example, IR consultants get here quicker because there is usually a greater burden of continual reporting to the client. You see less of that in a lot of SOCs.
So, in practice, the nature of the reporting structure often defines how analysts document things during the investigation.
In reality, the documenting feeds the review which makes the analysts better and more efficient. Every analyst needs to understand and embrace this.
Tactically, every analyst gets better when they make a habit of reviewing the facts periodically. Not just when you're stuck... but also after integrating new findings and completing investigative questioning chains.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
For threat hunting, a non-trivial amount of the work is referencing, creating, and updating system and network inventory. This doesn't get talked about enough as a skill set that someone develops. 1/
Threat hunting is all about finding anomalies that automated detection mechanisms don't find. That means manual anomaly detection, which sometimes means weeding out things that are normal. 2/
For example, let's say you discover a binary that runs in the middle of the night on a host and that's weird! So, you eventually search for the prevalence of that behavior and see it running on other hosts in that department. 3/
Last week I laughed at my wife's playoff football predictions because of her reasons, but then she went 5-1. So, here are this week's predictions and her explanations...
Saturday:
Packers over Rams - "The Packers were in the Pitch Perfect movie"
Ravens over Bills - "Bills is a dumb name for a football team."
Sunday:
Browns over Chiefs - "I'm not excited about either of these teams, but there's not a lot going on in Cleveland so I feel like they need this."
Saints over Buccaneers - "Because that's the team you [I] like."
I'm sad and angry about the insurrection that took place in DC yesterday. I have a lot I want to say at some point, but for now I just want to say this in case anyone following me needs to hear it...
Free and fair elections are the bedrock of democracy. While more should be done to make access to elections easier, the presidential election was fair and the results are valid.
There has been no legitimate evidence that suggests any anomalies remotely close to a scale that would overturn a decisive election result. That's after 62 failed lawsuits and multiple recounts and audits.
I think blue team work poses a greater number of challenges than red team work (there's just so much attack surface). However, I think writing a red team report is inherently harder than writing forensic reports. 1/
In a forensic report, a story already happened and you have to tell it. It takes practice and skill to do that well, but there is less of a creative element. The analyst's burden to elicit an emotional response is smaller. 2/
The events in the report themselves have evoked emotion... pain, sadness, etc. It's not as hard to get folks to take action because they've already felt these things. 3/
One of the things I do in my Investigation Theory course, for those willing, is work with students individually to help them learn to ask better investigative questions. For example, one student started with this Suricata rule:
1/
The task here is to start by asking a couple of investigative questions, assuming you have access to any evidence you might want. This student posed these two:
1. How long as this machine been infected? 2. How many beacons has the machine sent?
2/
In this case, the student is making some assumptions that the machine is already infected, but we don’t really know that for certain yet. The first goal should be proving or disproving the infection.