Blue team folks... we have to talk.

It's awesome that you're logging. That's the first step. Now here's the cool stuff to look for that the vendor didn't tell you about.
1
Pay careful attention to logs that stop coming in. If it's worth logging, it's worth monitoring when the logs stop flowing. (how long a gap you'll accept is up to you, but I rarely allow for over an hour)
2
Watch out for log sources where the time changes too much. (except for daylight savings changes)

Time drift is one of the most critical things to account for in log analysis. That's a given... but...
3
Did you know that sometimes attackers will change the date on a host 91 days (or more) in the past? That puts the logs directly into the archive. Thus, no alarms! It's a 'cheap' way for attackers to dodge a defensive control they don't yet have a bypass for.
4
Be on the lookout for "negative detects"

Story time! NDA is up on this so I can share
I once worked a case where a machine had 4624 type 3 (network login) to the file shares... but no 4624 type 2 (interactive login). Attacker somehow filtered the login events (badly I may add)
5
each morning, we saw this pattern for a few days... and realized something was off. Turns out it was a dank attack from a legit state backed group. No indicators were triggered. But there was this odd pattern. Find these oddities!
6
Most importantly though... attackers have a playbook... flip it against them! Know what commands they likely run, when was the last time a user of yours ran "whoami"? Hell, when was the last time a user knowingly ran cmd or powershell?
7
Default alerts and whatever are STARTING points. You can and should do so much more than what they offer.

Bottom line: It's a journey to do real defense... but your goal isn't to just get logging. It's to make it elegant. You can do it. LMK if you have questions. Lets go!
fin

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Mick Douglas

Mick Douglas Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @bettersafetynet

11 Jan
I've got several DMs where folks are telling me it's hard to get logs. Yes. I agree. It's also table stakes. If you cannot get logs, hire someone who can... or get a contractor to help. Saying "it's hard" is true... but you 100% need those logs.
1
It's uncharacteristically harsh of me to say this... I don't care if it's hard for you to get those logs. GET THEM. If you cannot get them you no shot of stopping attackers.

Prevent is great, but it's not nearly enough. You must be able to detect. Logs are how you do this.
2
If your org isn't allowing you to get the logs for $reasons, maybe you need to leave. This is a no excuses thing. I cannot overstate this. I cannot believe I'm having folks argue this. I take comfort that they're embarrassed enough to only do this in DMs. They know it's bad.
3
Read 5 tweets
23 Dec 21
Pen testers, we need to talk. Please listen up, take notes... and above all, ask questions.

A non-trivial part of my service portfolio is now reviewing the reports of other firms and either adjusting or providing missing context.

Read on for the common issues...
1
Most important: you need to give clients multiple options on how to fix something. MULTIPLE. At least 3. Telling them "fix the code" when it's from a vendor that's closed, doesn't help at all.
2
Show your work. There's a few firms that hide what they're doing. Some to the point where they just show a "ta da!" screenshot and don't explain how they did it... and frankly, that's weaksauce.
3
Read 10 tweets
11 Dec 21
Just got off phone with a client. Log4j is in their network. Vendor claims patch will be available next release... which is multiple months from now.

Here's what you do if you're in this situation.

1. Keep calm. There's no need to panic.
2. Carefully read this thread.

1/?
First, it's bad. It's a remote code execution meaning any attacker will almost certainly be able to run code of their choice on your systems.

If you can, please patch it's the easiest path. But you're reading this because you can't patch (for whatever reason) OK, let's go!
2
When dealing with attacks like this you should remember the acronym IMMA.

I = Isolate
M = Minimize
M = Monitor
A = Active Defense

I'll walk you through the IMMA model for the Log4j attacks we've seen so far.

3
Read 20 tweets
10 Dec 21
Boating update:
Mrs signed us up for a week long bootcamp style live aboard sailing adventure... however unlike earlier trainings we've done... this school sent us books 4 months out. With a warning... most take 6 months to do the homework. We have 4.
1
We were granted an exception since we've got prior experience. After looking at these books... I'm regretting asking for it.

There's just **so** much to learn.

I'm most worried about the night non-radio signaling & signal flags. Stuff I've never done before. :-/
2
If our paths cross over the next few months, and you hear me making odd dinging or horn sounds... I've not gone mad... I'm practicing overtaking in fog procedures. (which it's cool how nuanced the conversation can be... but like... wow it's also complex)
3
Read 4 tweets
8 Dec 21
HR & middle management folks... we need to talk.

Some management of people is done in the most non-nonsensical ways.

You may know that I mentor folks... like a lot of them.

Today one called me almost in tears. With permission here's a redacted version.
1
End of year evals are due soon. This person was told to rank each employee. Top 25% will get bonuses and put on advancement path. Bottom 25% will be put on PIP!

For those not aware PIP is Performance Improvement Program, it's basically the first step to being fired.
2
For a very large team you may have a bell curve distribution where this may be a viable approach. (I'd like to quibble at the numbers, but it's not THAT bad)

The issue is this approach is **horrible** for the small teams we tend to have in infosec.
Read 8 tweets
21 Apr 21
blue teamers:
We have to talk. Not everyone, but lots of us are writing really bad detects. Stop trying to detect the tool you will never win doing that. Detect the impacts.

A great example of this:
Responder.
1/?
Responder is a great pen test tool (we use it on our offensive engagements and you should to)

You damn well better be looking for responder... but HOW you do that look is just as important as the fact that you do.

2/?
Perhaps the most frequently used mode of responder is the LLMNR function. This allows responder to trick Windows systems into giving up the currently logged in user's creds to the attacker who is on your local network, but not yet on the victim's system.
3/?
Read 6 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(