You have your first day as the new security person.
Congratulations, this journey was not easy but you made it anyway! 🚀🎉
and of course, you are EAGER to show up on your first day and fix any security problem that comes your way!!!!!11 👩🔧🧑🔧👨🔧
and then you arrive… 🚗💨
You look for documentation of current security efforts 📑 🔍👀
and what do you find?!
this: 🕸️ 🪰
a whole lot of nothing. 😅
ummm…
What now?! 🤔
uffff… 😵
Ok, lets take this slowly 🐌
… no worries, it’s all problem solving 🤓
You cannot eat an elephant in one sitting. 🐘🍽️❌
Ok, so what do we know?!
We have computers, servers, people, phones, some cloud instances and software at this company
✅✔️✓☑️📋
and we need *more security
wait, mr maikroservice - how do we know how many computer, servers etc. we have?!
… and even more - what’s installed/running on those?!
GREAT QUESTION FRIEND! 🚀
WellI am glad I asked a good question - but… how do we find out!?
🤔
We could count them all by hand? 🤚✌️🤘
or
Let everyone fill out an excel sheet with what they have?!
phone 📱
laptop 💻
cloud instances ☁️ 🖥️
hmmm… is there no software to do that?
oh yes, sure - there is asset management software like osquery
OH YES! THAT’S WHAT I AM TALKING ABOUT
but how do we get this on the devices?
and how does one use it?!
good questions - let’s dive right in, shall we?!
The first thing you might try is to install osquery via apt on linux:
you type
sudo apt-get install osquery
well, that did not work… 🤨
What now?
How about you visit and check what they have in store for us? osquery.io
AHA!
The big Download button in the top right, that is what I am talking about 🔽✅
There are many different options - windows, linux, macOS and different linux distributions even 🤯
so technically you could download the binary and be done with it
but… there is one more option - you can for example setup the osquery repository under linux so that you can update the version regularly without much hassle
which is always good to know!
allow me to share how to do that:
We assume you use a debian/ubuntu based linux system now, however it works similarly for centOS based systems.
Let’s start:
First, you setup the signing keys so that you can make sure the downloaded version is OK
type:
sudo mkdir -p /etc/apt/keyrings
into your terminal - this creates a folder called keyrings
next we download the public key with:
curl -L | sudo tee /etc/apt/keyrings/osquery.asc
which … umm fails?! ah because we have no curl on this default debian box… well ok, if you insist we will install it first
Walkthrough 🚶🚶♀️🚶♂️ - What does all of this mean and why should I care?!
In the last post I shared the screenshot above with you ⬆️
& wanted to know what you would do if you see this after an alert was triggered when a new account logged into one of the machines in your company network
First up, what do you need to do as a SOC Analyst when you see a new alert?! 🚨🤨🔍
Brute Force attacks are very common lateral movement / initial access vectors because humans are inherently bad at remembering long complex passwords.
💡 What is the difference between brute-force, password spraying and credential stuffing?
Brute-Force - attackers use common usernames / password combos (e.g. root 4 linux & administrator 4 windows)
Password Spraying - one/few passwords against many accounts (internal/external)
Credential Stuffing - known credentials 4 computers that they did not yet compromise