top of page

Search Results

327 items found for ""

  • Suricata Configuration Part 3

    Understanding Suricata's Configuration Structure Suricata's configuration resides in YAML format, offering a streamlined and intuitive way to define various settings, rules, and behavior. To take a closer look at the key elements use command: sudo ls -al /etc/suricata/ In this directory, the primary configuration file, suricata.yaml, dictates the system's behavior and settings. Moreover, the rules directory houses a plethora of pre-packaged rulesets tailored for different protocols and threats. Customizing Suricata Configuration: To customize Suricata's behavior, we need to modify the suricata.yaml file. If you haven't installed Vim, a powerful text editor, execute the following command: sudo apt-get install vim Once installed, open the suricata.yaml configuration file: sudo vim /etc/suricata/suricata.yaml Configuring Specific Parameters: 1. Within suricata.yaml, numerous parameters can be tailored to suit your network environment and monitoring needs. For instance, setting the network subnet to be monitored: Do changes in configuration like adding home net which you want monitor, External net and ports. 2. Saving Changes in the Configuration File: press alt+/(and write :wq) and press enter it will save the configuration file 3. Configuring af-packet Options: Set the appropriate network interface based on your monitored network. if you want to add additional network interfaces, ensure uniqueness in the cluster ID to avoid conflicts. 4. Configuring Cross-Platform libpcap Capture Support: Specify the network interface for cross-platform libpcap support 5. Enabling Community Flow ID Option: Enable the Community Flow ID feature for event correlation and JSON log format: The community-id field adds a predictable flow ID to Suricata's event records, aiding correlation with tools like Zeek and ensuring cross-tool compatibility by providing a consistent seed across sensors and tools. and at last save the configuration file {press alt+/(and write :wq) and press enter} You can make more configuration changes as per your need. These above configuration are must. Stay tuned for more insights into maximizing the potential of Suricata in fortifying network security! In next post we configure custom created rules and add more rule from open source Akash Patel

  • How to Download and Start Suricata Part 2

    Any OS can be used. But in this case I am using ubuntu. (Later in future I will share blog about how to run in windows as well. History of suricata: Step-by-step guide on installing and initiating Suricata on an Ubuntu system. Downloading Suricata: Access the Suricata Website: Visit the official Suricata website at surikata.io. Access Documentation: Click on the "Documentation" section and select the "Installation Guide." Here, you can explore manual installation procedures or utilize binary packages available for the latest version. Adding Repository: Open the terminal in ubuntu and execute the following commands to add the Suricata repository and install suricata: sudo apt-get install software-properties-common sudo add-apt-repository ppa:oisf/suricata-stable sudo apt-get update sudo apt-get install suricata There you go Installation is done(Installing suricata is very easy) Starting Suricata: System Start-Up: Suricata can be managed using systemctl or the specific init system of your distribution. To enable Suricata to run at system startup sudo systemctl enable surikata.service Note: If running Suricata in a virtualized environment without the need for continuous operation, it's advisable to skip enabling the service. 2. Status Check and Stopping Suricata: Verify the status of Suricata service using: sudo systemctl status suricata.service sudo systemctl stop suricata.service (to stop suricata) sudo systemctl start suricata.service (to start suricata) By following these steps, you can successfully install, enable, and manage Suricata on your Ubuntu system, bolstering your network security with an effective IDS/IPS solution. Stay tuned for our next blog posts, where we'll delve deeper into optimizing Suricata configurations and leveraging its features Akash Patel

  • Exploring Suricata: Part 1

    In this guide, I'll delve into the world of Suricata, covering its installation, configuration, and its prowess as a robust intrusion detection system (IDS) and intrusion prevention system (IPS). What I'll Be Covering Our journey kicks off with an introductory session on Suricata, followed by detailed insights into: Installation and Configuration: Discover how simple it is to set up Suricata compared to other systems like Snot. Learn how to update rule sets and maneuver through Suricata's configuration file. Custom Rule Writing: Explore the art of crafting custom Suricata rules to tailor your security measures. Network Intrusion Detection: Master the art of detecting network intrusions using Suricata, its speed, and user-friendly management. Why Choose Suricata? You might wonder, "Why shift from Snort to Suricata?" Suricata boasts faster speeds, easier manageability, and a syntax that aligns closely with Snort's, requiring minimal additional learning. It's a preferred choice for many security enthusiasts and professionals. Where is Suricata Placed in a Network? Suricata can be implemented in two primary modes - Intrusion Detection System (IDS) and Intrusion Prevention System (IPS). IDS Mode: In the IDS mode, Suricata serves as a vigilant watcher, analyzing network traffic for potential threats without actively interfering. Here's a glimpse of its placement: IPS Mode: When operating in IPS mode, Suricata transforms into an active defender, capable of detecting and immediately blocking malicious traffic. Here's how it's placed within the network: In next Part, I will talk about how to download Suricata which tools we required to run properly. Until than Bye bye Akash Patel

  • Understanding IP, DNS Analysis, and Strategies to Combat Evolving Threats

    The landscape of cyber threats is continually evolving, and attackers are employing sophisticated techniques to circumvent traditional security measures. One such area of concern revolves around the utilization of IP addresses, DNS, and domain generation algorithms (DGA) by malicious actors to evade detection and control their command and control (C&C) networks. The Evolution: Known-Bad IP Addresses to Dynamic Domain Generation In the past, malicious entities often configured malware to connect with specific static IPs or DNS names, commonly known as known-bad IP addresses. Security measures relied on reputation-based checking and blacklists to identify and block these addresses. However, attackers adapted, moving towards domain generation algorithms (DGAs) to bypass blacklists. Understanding Domain Generation Algorithms (DGAs) DGAs represent a significant shift in attack strategies. Attackers leverage these algorithms to dynamically generate a multitude of domain names for their C&C networks. The process involves setting up dynamic DNS services implementing DGAs within malware code, and continually generating new domain names. This method enables attackers to evade detection as these domains are ever-changing and not listed on traditional blacklists. Fast Flux Networks: Concealing C&C Networks Another technique employed by malware is the use of fast flux networks. This method involves constantly changing the host IP addresses in domain records using DGAs. This dynamic nature conceals the presence of C&C networks, making it challenging for security measures to pinpoint and mitigate threats effectively. Detecting and Mitigating DGAs Detecting DGAs can be challenging but essential. Patterns in domain names like seemingly random alphanumeric strings (e.g., A1ZWBR93.com, TMY32TV1.com) resulting in high rates of NXDOMAIN errors in DNS resolution could indicate the presence of a DGA. To mitigate DGAs, employing a secure recursive DNS resolver is crucial. This involves trusted DNS servers working together to hunt down IP addresses and return them to the client, enhancing the security posture against DGA-based threats. "Stay vigilant, adopt advanced security practices, and collaborate with reliable security solutions to stay ahead in the battle against evolving cyber threats." Akash Patel

  • Unveiling the Power of CentralOps

    "In a world where data is king, CentralOps stood as a beacon, offering a treasure trove of internet-related information at users' fingertips." The ability to access comprehensive data and diagnostic tools for domains, IP addresses, and network information is invaluable. This is where CentralOps steps in as a powerful ally. What is CentralOps? CentralOps, a robust online suite of tools and services designed to provide a one-stop solution for gathering critical internet-related data. It empowered users with a range of utilities, offering insights into domain registrations, DNS records, network diagnostics, and more. Unlocking the Toolbox: Key Features Domain Dossier: Uncovering domain ownership details, associated IP addresses, and comprehensive DNS information in a single report. Traceroute & Ping: With Traceroute, users could map the network path of data packets, while Ping tests measured the responsiveness and connectivity of target hosts. Email Dossier: The Email Dossier tool verified the existence of emails and provided metadata such as server details and domain information. DNS Analyzer: This tool was instrumental in extracting valuable DNS record information. HTTP Headers: Providing visibility into HTTP responses, the HTTP Headers tool allowed users to analyze server responses and headers from specified URLs. The Power of CentralOps in Action Whether investigating potential cybersecurity threats, understanding network configurations, or performing domain reconnaissance, CentralOps empowered users with easy access to critical internet intelligence. Its user-friendly interface and comprehensive reports transformed complex data into actionable insights. Link : https://centralops.net/co/ Akash Patel

  • The Art of Threat Hunting

    "Remember, the best defense is often a proactive offense - and that's where threat hunting shines." In the dynamic landscape of cybersecurity, conventional security measures are vital but may fall short in detecting emerging threats. Enter threat hunting – a proactive cybersecurity technique designed to root out lurking threats that traditional security monitoring might overlook. Understanding Threat Hunting Defining the Technique: At its core, threat hunting involves a search for potential threats that evade routine security measures. Unlike penetration testing, it's a less intrusive approach aimed at preemptively identifying threats before they manifest into security breaches. Commencing the Hunt: Establishing a Hypothesis: Derived from threat modeling, hypotheses revolve around potential events with high impact and likelihood. This includes identifying potential threat actors, their methods, and likely attack paths. Profiling Threat Actors and Activities: Creating scenarios akin to an attacker's tactics can help anticipate intrusion attempts and objectives. Leveraging existing security monitoring tools, such as log analysis, registry examination, and SIEM tools, forms the crux of this phase. The Hunt in Action Relying on Failure Assumptions: Threat hunting operates under the assumption that existing security measures might have failed to detect an intrusion. This involves: Analyzing network traffic for anomalies. Scrutinizing the list of running processes. Investigating other potentially infected hosts. Tracing the execution path of malicious processes Benefits and Outcomes While resource-intensive, threat hunting reaps substantial rewards: Enhanced Detection Capabilities: Bolstering the ability to detect threats early in their lifecycle. Integrating Intelligence: Merging threat intelligence into security measures. Reducing Attack Surface: Identifying and mitigating vulnerabilities. Fortifying Attack Vector Blockage: Thwarting potential intrusion paths. Critical Asset Identification: Prioritizing protection for essential assets. Join the conversation. Stay vigilant. Stay secure. Akash Patel

  • Network Scanning with Nmap

    Nmap, short for Network Mapper, is an open-source network scanning tool developed by Gordon Lyon. Since its inception in September 1997, Nmap has been a go-to solution for cybersecurity professionals, hackers, and network administrators worldwide. Nmap's Noisy Nature Nmap's effectiveness often comes at a cost—it's easily detected by defender tools due to its probing nature. Its aggressive scans and comprehensive analyses generate noticeable footprints that alert vigilant security systems. Essential Nmap Commands and Techniques 1. Basics of Scanning: -sT and -sS for TCP and SYN scans respectively, uncovering open ports and services. Fast mode -F for quick scans. -iL to read targets from a file. 2. Advanced Scanning Techniques: Aggressive scans (-A) for extensive information, including service versions and OS detection. Decoy flags (-D) to obfuscate your identity while scanning. 3. Port Scanning: Command variations for scanning specific ports or port ranges. Differentiation between service-specific scans like -p http or -p http,ftp,mysql. 4. Miscellaneous Techniques: Traceroute (--traceroute) to discover the route packets take to reach the target. Saving results to a file (-oN). Nmap's Role in Cybersecurity In the arsenal of cybersecurity, Nmap plays a pivotal role. It helps security professionals understand network configurations, identify potential vulnerabilities, and create a robust defense strategy against potential threats. For more commads Click Here Akash Patel

  • Embracing life's adventures

    Travelling, exploring new places, and immersing oneself in diverse experience is not just an escape; its a pathway to rejuvenation. Embrace the unknow, wander freely and allow the neauty to discover to ease your mind. The world is canvas of endless possibilities- painting your adventures accross it is the most liberating therapy for the soul

  • Understanding Threat Research

    In today's hyper-connected digital landscape, the battle between cybersecurity professionals and threat actors continues to escalate. Threat research plays a pivotal role in understanding, detecting, and mitigating potential risks that loom over networks and systems. Reputation Data: Unveiling the Known Threats One of the foundational pillars of threat research is reputation data. This includes blacklists encompassing known threat sources like malware signatures, malicious IP address ranges, and suspicious DNS domains. These repositories act as a first line of defense, enabling proactive identification and prevention of potential threats. Indicators of Compromise (IoC): Traces of Attacks Indicators of Compromise serve as residual signs that an asset or network might have fallen victim to an attack. These indicators include. ▪ Suspicious emails ▪ Suspicious registry and file system changes ▪ Unknown port and protocol usage ▪ Excessive bandwidth usage ▪ Rogue hardware ▪ Service disruption and defacement ▪ Suspicious or unauthorized account usage Recognizing IoCs is crucial as they indicate successful or ongoing attacks. Indicators of Attack (IoA): Evidence of Intrusion Attempts IoAs signify evidence of intrusion attempts that are in progress, indicating ongoing threats that require immediate attention and mitigation strategies. Behavioral Threat Research: Connecting the Dots Behavioral threat research involves correlating IoCs to identify attack patterns. This method aids in understanding the tactics, techniques, and procedures (TTP) employed by adversaries. Tactics, Techniques, and Procedures (TTPs): Understanding Adversary Actions TTPs encapsulate behavior patterns used in historical cyber-attacks. From DDoS attacks to sophisticated Advanced Persistent Threats (APTs), understanding TTPs helps in strategizing defense mechanisms against various attack vectors. Example: Advanced Persistent Threats are sophisticated and relentless. Techniques like port hopping and Fast Flux DNS are employed to maintain persistence and evade detection. Port hopping involves APTs using various ports for communication and jump between them to avoid detection, while Fast Flux DNS rapidly changes IP addresses linked with domains. In conclusion, comprehending threat research, IoCs, IoAs, TTPs, and APT techniques is critical in the ongoing battle against cyber threats. It enables security experts to stay vigilant, anticipate evolving tactics, and fortify defenses to protect digital assets from the ever-evolving threat landscape. Akash Patel

  • Microsoft's Log Parser : (BONUS File included)

    Microsoft's Log Parser is a powerful command-line utility that can streamline this process, providing efficient querying capabilities to extract specific information from logs Getting Started with Log Parser for Windows Security Event Logs: In a typical scenario, suppose we have logs placed in the directory from single system : To run Log Parser for a specific log file, say 'Security.evtx' with EventID '5038', the command appears as follows: C:\Users\User\Desktop\Tools\Logs\> "C:\Program Files (x86)\Log Parser 2.2\LogParser.exe" -stats:OFF -i:EVT "SELECT * FROM 'Security.evtx' WHERE EventID = '5038'" If we see above example C:\Users\User\Desktop\Tools\Logs> this is where Logs are placed "C:\Program Files (x86)\Log Parser 2.2\LogParser.exe" this is where log parser is present -stats:OFF -i:EVT "SELECT * FROM 'Security.evtx' WHERE EventID = '5038'" (this basically a sql query) Complexities in Parsing Multiple Logs: However, complexities arise when dealing with multiple directories(example we have collected logs from 300 systems ), each containing 'Security.evtx' logs. Manually changing directories and running the same query for each system becomes arduous and time-consuming. A PowerShell Solution: To streamline this process and efficiently parse logs across multiple directories, PowerShell comes to the rescue. By combining PowerShell's directory traversal capability with Log Parser's querying prowess, we can create a script that navigates through directories and executes Log Parser queries. For example: Get-ChildItem -recurse | where {$_.name -eq "Security.evtx"} | foreach { cd $_.DirectoryName; pwd; & 'C:\Program Files (x86)\Log Parser 2.2\LogParser.exe' -stats:OFF -i:EVT -q:ON "SELECT * FROM 'Security.evtx' WHERE EventID = '5038'" } Breaking Down the Script Get-ChildItem -Recurse: Recursively searches through all directories. Where-Object {$_.name -eq "Security.evtx"}: Filters files to find 'Security.evtx'. ForEach : Executes commands for each located file. cd $_.DirectoryName: Changes the directory to the log file's location. pwd; : Use for printing Path & 'LogParser.exe' -i:EVT -q:ON "SELECT * FROM 'Security.evtx' WHERE EventID = '5038'": Executes Log Parser query. But still keep in mind as per query this will parse only all security.evtx file from all 300 systems. This make things little bit difficult for parsing logs and not simple as hayabusa but this help you learn how to create script or SQL query: BONUS:- To streamline Log Parser operations and simplify the process of querying Windows Security Event logs. I have compiled a set of Log Parser commands for your convenience. These commands can be edited and customized to suit your specific log analysis requirements. Commands file attached:- Click me Akash Patel

  • Open-Source Threat Intelligence for Enhanced Cybersecurity

    Knowledge is power, and access to robust threat intelligence is pivotal in fortifying defenses against an array of cyber threats.. Open-source threat intelligence encompasses data repositories and feeds that are freely available for use by the cybersecurity community. open-source threat intelligence sources: US-CERT: The United States Computer Emergency Readiness Team shares advisories, alerts, and resources to enhance the nation's cybersecurity posture. https://www.cisa.gov/ UK’s NCSC: The National Cyber Security Centre of the United Kingdom provides cybersecurity guidance and threat intelligence aimed at protecting the UK's critical services. https://www.ncsc.gov.uk/ AT&T Security (OTX): AT&T's Open Threat Exchange furnishes a collaborative platform for sharing threat information and signatures. https://otx.alienvault.com/ MISP: The Malware Information Sharing Platform is an open-source threat intelligence sharing platform designed to improve the sharing of structured threat information. https://www.misp-project.org/ VirusTotal: A widely used online service that analyzes files and URLs for malware detection using multiple antivirus engines. https://www.virustotal.com/ Spamhaus: An organization that tracks spam and related cyber threats, offering real-time threat intelligence on spamming entities and malware distribution networks. https://www.spamhaus.org/ SANS ISC Suspicious Domains: Maintained by the SANS Internet Storm Center, this list identifies suspicious domains based on observed malicious activities. Akash Patel

  • Understanding Threat Classifications

    Known Threats Known threats are those that cybersecurity experts can identify using basic signature or pattern matching. Security systems armed with established signatures or patterns can efficiently detect and mitigate these known threats, providing a robust line of defense against commonly recognized attacks. Unknown Threats On the other end of the spectrum lie unknown threats. These threats present a significant challenge as they remain elusive to traditional detection mechanisms, making them harder to detect and neutralize promptly. Known Unknowns The realm of known unknownsThis classification involves malware that employs sophisticated obfuscation techniques, deliberately designed to circumvent signature-matching and evade detection. Despite being acknowledged as a potential threat, these entities lack established signatures or patterns for precise identification, thus posing a formidable challenge for security experts. Unknown Unknowns The unknown unknowns represent an even more daunting category in the threat landscape. This classification encompasses malware that introduces completely new attack vectors and exploits, leveraging innovative techniques and tactics. These threats are stealthy, possessing attack vectors and methods that remain completely unfamiliar and undetected by existing security measures, making them a potent menace. Unknown Knowns (Blind) An intriguing classification, the unknown knowns or "blind" threats, refers to threats that are known to security communities but remain unidentified or unrecognized within a specific system or organization. This blind spot poses a risk as the threat may exist, yet the system lacks the knowledge or detection capabilities to identify it. Akash Patel

bottom of page