TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

Detecting Long Connections With Zeek/Bro and RITA

BHIS · 2020-03-18 · Read original ↗

ATT&CK techniques detected

7 predictions
T1090.004Domain Fronting
90%
“at all. so this is important for two separate reasons. one it ’ s important because this backdoor is heavily utilized by black hills information security in our pentests, or variations of this particular backdoor. two, it doesn ’ t really get caught all that much. and three, we h…”
T1071.004DNS
88%
“s interesting about this, is if you look, the dns server that it ’ s talking to is 8. 8 8. 8. now, there are a couple of interesting things. first, this is interesting because it is google ’ s dns server. that ’ s kind of weird. does this mean that google ’ s dns server is evil? …”
T1560.001Archive via Utility
84%
“going to drop into the directory in bro where we ’ ll do some quick bro log analysis for dns backdoors. now you can see our evil domain is nanobotninjas. com and you can see that the file that we are looking at is dnscat _ log / 2017 - 03 - 21. that ’ s exactly the directory that…”
T1572Protocol Tunneling
50%
“dns files there, what we ’ re going to do instead, is we ’ re going to use a tool that can grep up out of those compressed archives anything or any line that has the string nanobot, specifically looking at any file with dns in the name. i ’ m going to hit enter, here we go. now a…”
T1071.004DNS
47%
“dns files there, what we ’ re going to do instead, is we ’ re going to use a tool that can grep up out of those compressed archives anything or any line that has the string nanobot, specifically looking at any file with dns in the name. i ’ m going to hit enter, here we go. now a…”
T1557.001Name Resolution Poisoning and SMB Relay
32%
“that i ’ m working through. once again, we ’ re using adhd instead of security onion today because adhd has this packet capture, that i use in my cyber deception active defense class for various classes like black hat and wild west hackin ’ fest, built into it. you would follow t…”
T1071.004DNS
32%
“this example, you can see that the number of subdomains are 23, 362 or hosts associated with nanobotninjas. that ’ s not normal. that ’ s like, if you think of google. com, right? you have maps. google. com, mail. google. com, you have drive. google. com those are all subdomains …”

Summary

Hello and welcome, my name is John Strand and in this video, we’re going to be talking about RITA, Real Intelligence Threat Analytics and how it can quickly do DNS […]

The post Detecting Long Connections With Zeek/Bro and RITA appeared first on Black Hills Information Security, Inc..