Day 1️⃣7️⃣ of Your 30 Day SOC Analyst Journey
How to get started with Digital Forensics:
Digital Forensics, the stuff you always dreamed about since CSI Miami.
What is Digital Forensics?, you ask
Let me tell you a story.
It is Thursday, a quiet day.
You sit on your couch sipping hot chocolate ☕️ 🫕 staring into the fire place ❤️🔥
As always…
Obviously during working hours 🧑💼, stop asking too many questions!
Then…
The phone ☎️📢
RRIIING RRIIING
You try to ignore🙅♀️ it but 5 min later its still destroying your perfect moment at home..
What do you do?
You answer it🤳
HELP, EVERYTHING IS ON FIRE!🔥
We cannot login since this morning, all our passwords don’t work ❌🥴
We need you here📍
UGH…
OK - time to get the slippers off and race to the office 🏎
Attach the USB Drive to the machine that we want to have a snapshot of and open FTK Imager
Click Yes on the User Account Control, if it pops up.
Next you click on "File" (top left) and "Create Disk Image"
It will ask you which type of Source you want to select - we choose "Physical Drive" and click "Next"
FTK will now want to know which Drive it should snapshot - select the one you want to look at and click "Finish" 🏁
That was a fake... its not finished yet!
Now FTK asks which Destination it should use to store your Snapshot
IMPORTANT:
This cannot be the same Disk which you want to snapshot! Choose another one with the "Add" button.
For the Type of Image you want Raw (dd) just like the 🥩
The next screen will add some metadata to the snapshot - Case Number, Evidence Number etc.
Fill it out, important - remember to add the date somewhere and push that "Next" button to the limit.
The last step will ask you for the Destination Folder, Filename and Fragment Size.
Fragment Size means that you will not have 1 file in the end but rather many smaller ones (1.5 GB per file in our case)🪓
This could help if the process crashes at some point or takes forever and you want to start the investigation already🔎👀🔍
"Finish" and WAIT... wait...
wait some more.
And once that is done
You should have a couple of files
a Snapshot/Image summary that you can check
e.g. See what was archived and how large the disk was (65536 MB in my case)
Now that you have the Snapshot what do you do with it though?
You analyze it with Autopsy - This is what we will do in the next thread.
Any Questions?
If you liked this thread
follow me @maikroservice
retweet the first tweet of the thread so that more people can learn digital forensics :)
@threadreaderapp unroll
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Day 1️⃣6️⃣ of Your 30 Day SOC Analyst Journey
How to write custom SIEM rules for PowerShell Commands:
You want to hunt down attackers when they use the most powerful tool available on Windows systems?
You need to know how to write custom PowerShell rules to do just that - it all starts with PowerShell logs.
Our SIEM has the ability to gather and index PowerShell logs as soon as they come in - the easiest way to make sure they do is via GPO (covered in yesterday’s thread)
to activate PowerShell Log forwarding on all Windows clients centrally.
Day 1️⃣5️⃣ of Your 30 Day SOC Analyst Journey
Behavior-based detection 💙 - 10x better than signatures:
Most of the people (55%) who read this have not yet followed @maikroservice -
If you learn something today - I would kindly ask you to smash that follow button so that I can make sure to produce high quality engaging content that teaches you new things regularly.
Thank you
You want to detect malware, huh?
and until now you used signature-based detection methods - e.g. CDBs and other hash-based detections.
Let’s learn what attackers need to do to defeat those, shall we?! 😈😅
Dear fellow cyber witches and wizards - today your initiation ceremony into the ranks of high cyber council is commencing - I shall be your guide into the world of automagic
GO be a HERO!
First up, you will learn a new spell from the anti-malware spell book, the automagical removal of malware ❌🦠
What do I need for that?
Nothing much, a bit of time and enthusiasm is all!
📜 For Beginners - How to start using Signature-based Detection for Malware:
🚨 We are still in crisis-mode. 🚨
In the last threads we went through a simulated incident that snatched you off of your comfy 🛋️ and right into 🔥🧑🚒 fire extinguisher mode at your company
Today we shall learn how to identify and potentially prevent attacks - we will look at Signature-based Detection using YARA.