{"id":260,"date":"2024-09-07T07:54:52","date_gmt":"2024-09-07T07:54:52","guid":{"rendered":"https:\/\/paradoxa.me\/?p=260"},"modified":"2024-09-19T08:18:34","modified_gmt":"2024-09-19T08:18:34","slug":"soc-lv-1-try-hack-me","status":"publish","type":"post","link":"https:\/\/paradoxa.me\/index.php\/2024\/09\/07\/soc-lv-1-try-hack-me\/","title":{"rendered":"~ SOC lv.1 &#8211; Try Hack Me"},"content":{"rendered":"<h1 style=\"text-align: center;\">SOC lv.1<br \/>\nfrom Try Hack Me<\/h1>\n<h2><strong># <\/strong><strong>Introduction<\/strong><\/h2>\n<p>While the Jr. Penetration tester was a red team path and also more in-line with the Complete Beginner path; the SOC lv.1 path ,as expected, dives in the opposite spectrum (also known as the blue team).<\/p>\n<p>The Path covers lots of subjects and it is definitely overwhelming in size.<br \/>\nI must say though, once you start the challenges you soon realize that to complete them, you don\u2019t need to know all the different tools&#8230;<br \/>\nThat\u2019s said I love the fact that they explain so many different ones and they all have pro and cons.<\/p>\n<p>This article differs from previous ones, as the goal here, is to summarize and briefly describe what we learn in each module and room so I can quickly come back to compare my notes with the material learned.<\/p>\n<p>Let\u2019s begin&#8230;<\/p>\n<h2 class=\"western\"><strong># <\/strong><strong>Section 1: <\/strong><strong>Cyber Defence Framework<\/strong><\/h2>\n<h3>&#8211; Jr Sec Analyst Intro<\/h3>\n<p>SOC\u2019s Three-Tier Model, responsibilities and a Practical Example<\/p>\n<h3>&#8211; Pyramid of Pain<\/h3>\n<p>Illustrates how, increasing difficulty for adversaries to operate, corresponds to the type of indicators you detect and counter.<br \/>\nTrvial (hash value), Easy (IP addr,), Simple (domain names), Annoying (network and host artifacts), Challenging (tools) and Tough (TTPs).<\/p>\n<h3>&#8211; Cyber Kill Chain<\/h3>\n<p>Outlines the steps attackers take, from Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command &amp; Control, to data exfiltration, to help us as defenders detect and stop threats at each stage.<\/p>\n<h3>&#8211; Unified Kill Chain<\/h3>\n<p>Combines attack stages from various models to provide a comprehensive framework for identifying and disrupting cyberattacks. Divided in three phases: In (Initial Foothold), Through (Network propagation) and Out (Action on Objective).<\/p>\n<h3>&#8211; Diamond Model<\/h3>\n<p>Links adversaries, victims, capabilities and infrastructure to analyses and understand better cyber threats.<\/p>\n<h3>&#8211; MITRE<\/h3>\n<p>Describes the Mitre ATT&amp;CK which is a comprehensive framework that categorizes and tracks cyber adversary tactics, techniques, and procedures (TTPs) to help organizations detect, respond to, and defend against cyber threats.<br \/>\nBut also dives in the Repository (CAR), Mitre Engage Framework and Mitre D3F3ND: a website resource for cybersecurity countermeasure.<\/p>\n<h3>&#8211; Summit<\/h3>\n<p>A challenge where we use Pyramid of Pain and Mitre\u2019s acquired knowledge.<\/p>\n<h3>&#8211; Eviction<\/h3>\n<p>Another challenge to put into practices more MITRE ATT&amp;CK teachings.<\/p>\n<h2 class=\"western\"><strong># Section 2: <\/strong><strong>Cyber Threat Intelligence<\/strong><\/h2>\n<h3>&#8211; Intro to Cyber Threat Intel<\/h3>\n<p>Introduce us to CTI (cyber threat intelligence) lifecycle, frameworks &amp; standards.<\/p>\n<h3>&#8211; Threat Intelligence tools<\/h3>\n<p>Introduce us to OSINT research and tools such as Urlscan.io, Abuse.ch, Phishtool and Cisco Talos.<\/p>\n<h3>&#8211; YARA<\/h3>\n<p>Used for identifying and classifying malware by creating rules that match patterns of malicious code, files, or behaviors. It\u2019s often called the &#8220;pattern-matching Swiss army knife&#8221; for malware researchers<\/p>\n<h3>&#8211; OpenCTI<\/h3>\n<p>Open-source threat intelligence platform that centralizes, structures, and visualizes cyber threat information, helping organizations track and analyse threats for improved decision-making and response. It supports collaboration by integrating various data sources, including MITRE ATT&amp;CK, to enhance threat intelligence operations.<\/p>\n<h3>&#8211; MISP<\/h3>\n<p>Malware Information Sharing Platform is an open-source threat intelligence platform for sharing and correlating structured threat data across organizations.<\/p>\n<h3>&#8211; Friday Overtime<\/h3>\n<p>End of the section challenge<\/p>\n<h3>&#8211; Trooper<\/h3>\n<p>Another end of the section challenge focused on OpenCTI<\/p>\n<h2 class=\"western\"><strong># Section 3: Network <\/strong><strong>Security &amp; Traffic Analysis<\/strong><\/h2>\n<h3>&#8211; Traffic Analysis Essential<\/h3>\n<p>Explains the levels of security Control: Physical, Technical and Administrative.<br \/>\nAnd also the main approaches: Access Control (Firewall, NAC, IAM, Segmentation, VPN\u2026) and Threat Control (IDS\/IPS, Endpoint Protection, SIEM\u2026)<\/p>\n<h3>&#8211; Snort<\/h3>\n<p>Open-source network intrusion detection system (NIDS) used to monitor and analyze network traffic for signs of malicious activity. Can be also use in IPS mode<\/p>\n<h3>&#8211; Snort Challenge \u2013 The Basics<\/h3>\n<h3>&#8211; Snort Challenge \u2013 Live Attacks<\/h3>\n<h3>&#8211; NetworkMiner<\/h3>\n<p>Network forensics tool that extracts and analyzes data from network traffic captures to help identify and investigate network incidents.<\/p>\n<h3>&#8211; Zeek<\/h3>\n<p>Formerly known as Bro, is a network security monitoring platform that provides detailed logs and insights into network traffic for threat detection and analysis.<\/p>\n<h3>&#8211; Zeek Exercise<\/h3>\n<h3>&#8211; Brim<\/h3>\n<p>Brim is an open-source tool for viewing and analyzing big network traffic files, offering a user-friendly interface to explore and investigate network data collected by Zeek and other sources.<\/p>\n<h3>&#8211; Whireshark: the basics<\/h3>\n<p>Widely used GUI network protocol analyses that captures and displays network traffic in real-time, allowing detailed inspection and troubleshooting of network issues.<\/p>\n<h3>&#8211; Whireshark: Packet Operation<\/h3>\n<p>Packet filtering: prior (Capture Filter) or later (Display Filter) by using syntax, operators and expressions<\/p>\n<h3>&#8211; Whireshark: Traffic Analysis<\/h3>\n<p>How to recognise anomalies such as if we are victim of a NMAP scan, Man In the Middle and from other sources and protocols<\/p>\n<h3>&#8211; Tshark: The Basics<\/h3>\n<p>Basically the command-line version of Wireshark, used in the same way for capturing and analyzing network traffic without a graphical interface.<\/p>\n<h3>&#8211; Tshark: CLI Wireshark Feature<\/h3>\n<p>Wireshark commands translated in the CLI<\/p>\n<h3>&#8211; Tshark Challenge 1: Teamwork<\/h3>\n<h3>&#8211; Tshark Challenge 2: Directory<\/h3>\n<h2 class=\"western\"><strong># Section 4: <\/strong><strong>Endpoint Security Monitoring<\/strong><\/h2>\n<h3>&#8211; Intro to Endpoint Security<\/h3>\n<p>Start introducing us to the client logs<\/p>\n<h3>&#8211; Core Windows Process<\/h3>\n<p>Show us what a normal behaviour looks like on a windows operating system.<\/p>\n<h3>&#8211; Sysinternals<\/h3>\n<p>Sysinternals is a suite of advanced system utilities for Windows that help with system troubleshooting, monitoring, and diagnostics.<\/p>\n<h3>&#8211; Windows Event Logs<\/h3>\n<p>Record system, security, and application events on Windows machines, aiding in troubleshooting and monitoring.<\/p>\n<h3>&#8211; Sysmon<\/h3>\n<p>System Monitor is a Windows Sysinternals tool that provides detailed information about system activity, including process creation, network connections, and file modifications, to help with forensic analysis and threat detection.<\/p>\n<h3>&#8211; Osquery: The Basics<\/h3>\n<p>Tool for querying system data with SQL-like queries.<\/p>\n<h3>&#8211; Wazuh<\/h3>\n<p>Open-source security monitoring platform for intrusion detection, log analysis, and compliance management.<\/p>\n<h3>&#8211; Monday Monitor<\/h3>\n<p>End of the section challenge focused on Wazuh and Sysmon<\/p>\n<h3>&#8211; Retracted<\/h3>\n<p>End of the section challenge<\/p>\n<h2 class=\"western\"><strong># Section 5: <\/strong><strong>SIEM (Security Information and Event Managment)<\/strong><\/h2>\n<h3>&#8211; Introduction to SIEM<\/h3>\n<p>Security Information and Event Management is a centralized system for collecting, analysing, and managing security data from across an organization&#8217;s IT infrastructure.<\/p>\n<h3>&#8211; Investigating with ELK 101<\/h3>\n<p>A set of tools (Elasticsearch, Logstash, and Kibana) used for searching, analysing, and visualizing log data in real-time<\/p>\n<h3>&#8211; ItsyBitsy<\/h3>\n<p>Challenge focused on ELK<\/p>\n<h3>&#8211; Splunk: Basics<\/h3>\n<p>A SIEM platform for searching, monitoring, and analyzing machine data through a web-based interface, commonly used for log management and operational intelligence.<\/p>\n<h3>&#8211; Incident Handling with Splunk<\/h3>\n<p>Use Splunk by following the Cyber Kill Chain Phases.<\/p>\n<h3>&#8211; Investigation with Splunk<\/h3>\n<p>Challenge focused on Splunk<\/p>\n<h3>&#8211; Benign<\/h3>\n<p>Another Challenge focused on Splunk<\/p>\n<h2 class=\"western\"><strong># Section 6: <\/strong><strong>DFIR<\/strong> <strong>(Digital Forensic &amp; Incident Response)<\/strong><\/h2>\n<h3>&#8211; DIFR: An Introduction<\/h3>\n<p>Digital Forensics and Incident Response is the field focused on investigating cyber incidents and breaches to identify, mitigate, and recover from security threats.<\/p>\n<h3>&#8211; Windows Forensic 1<\/h3>\n<p>Exploring Windows Registry and system infos<\/p>\n<h3>&#8211; Windows Forensic 2<\/h3>\n<p>File system (FAT\/NTFS) and file recovery<\/p>\n<h3>&#8211; Linux Forensic<\/h3>\n<p>System infos and configuration followed by logs files<\/p>\n<h3>&#8211; Autopsy<\/h3>\n<p>A digital forensics platform used for analyzing hard drives and mobile devices, providing tools for data recovery, investigation, and evidence presentation.<\/p>\n<h3>&#8211; RedLine<\/h3>\n<p>A malware analysis and incident response tool used to gather information from infected systems, such as processes, network connections, and system artifacts, to aid in forensic investigations.<\/p>\n<h3>&#8211; Kape<\/h3>\n<p>A digital forensics tool used to collect, analyse, and process data from various sources, such as disk images, memory dumps, and log files, to support investigations and incident response.<\/p>\n<h3>&#8211; Volatility<\/h3>\n<p>An open-source framework for analysing memory dumps to investigate and extract information about running processes, network connections, and other system activities during an incident or forensic examination.<\/p>\n<h3>&#8211; Velociraptor<\/h3>\n<p>An open-source endpoint monitoring and response tool used for detecting and investigating suspicious activities and anomalies on systems. It provides a lightweight, flexible approach for querying and analysing data across endpoints.<\/p>\n<h3>&#8211; TheHive Project<\/h3>\n<p>An open-source incident response platform designed for managing and analyzing security incidents. It provides a collaborative environment for security teams to handle investigations, track incidents, and document findings.<\/p>\n<h3>&#8211; Intro to Malware Analysis<\/h3>\n<p>Fundamentals techniques of Static and Dynamic Malware Analysis and anti-analysis.<\/p>\n<h3>&#8211; Unattendent<\/h3>\n<p>Windows OS Challenge focused on Registry and Autopsy<\/p>\n<h3>&#8211; Disgruntled<\/h3>\n<p>Linux OS Challenge focused on CLI commands and Linux logs<\/p>\n<h3>&#8211; Critical<\/h3>\n<p>Linux Os Challenge focused on memory forensics with Volatility<\/p>\n<h3>&#8211; Secret Recipe<\/h3>\n<p>Windows OS Final challenge<\/p>\n<h2 class=\"western\"><strong># Section 7: <\/strong><strong>Phishing<\/strong><\/h2>\n<h3>&#8211; Phishing Analysis Fundamentals<\/h3>\n<p>Introduction on how email works<\/p>\n<h3>&#8211; Phishing Emails in Action<\/h3>\n<p>What to look for to check if an email is legit or a phishing Attack<\/p>\n<h3>&#8211; Phishing Analysis Tools<\/h3>\n<p>Main tools to detect and analyse emails including the PhishToll<\/p>\n<h3>&#8211; Phishing Prevention<\/h3>\n<p>Preventing measure to reduce the risk of attacks (DKIM, DMARC, S\/MIME)<\/p>\n<h3>&#8211; The Greenholt Phish<\/h3>\n<p>Challenge analyse emails and attachment<\/p>\n<h3>&#8211; Snapped Phish-ing Line<\/h3>\n<p>Final Challenge, analyse email and discover the attacker objective<\/p>\n<h2 class=\"western\"><strong># Section 8: <\/strong><strong>SOC lv.1 Capstone Challenges<\/strong><\/h2>\n<h3>&#8211; Tempest<\/h3>\n<p>Windows OS Challenge focused on logs, Sysmon, Wireshark and Brim<\/p>\n<h3>&#8211; Boogeyman 1<\/h3>\n<p>Analysing the First attack attempt made by the Boogeyman organization focused on Phishing, Windows logs, Tshark and JQ<\/p>\n<h3>&#8211; Boogeyman 2<\/h3>\n<p>Analysing the Second attack on an Ubuntu machine focused on Phishing and Volatility.<\/p>\n<h3>&#8211; Boogeyman 3<\/h3>\n<p>Analysing the last attack on a Windows machine focused on Sysmon and ELK.<\/p>\n<h2><strong># Conclusion<\/strong><\/h2>\n<p>In terms of it\u2019s structure, nothing new thankfully, in the sense that Try Hack Me always have a good amount practice for each subject explained.<br \/>\nI think the challenges are more engaging, especially the Capstone section when you have an Enemy that keeps coming back\u2026<\/p>\n<p>It could be also because, with the knowledge gained you can Improve your security posture of your environment straight away such as me with Snort for example.<\/p>\n<p>The Verdict therefore is very positive, there where only a couple of rooms that unfortunately where time consuming as RedLine was very slow but that was the tool not the path itself, and I\u2019m still glad I was able to play with RedLine at the end of the day.<\/p>\n<p>I\u2019ll be honest; before I started the path I was planning, once finished, to go back to red side but since I enjoyed the blue team, I will double down with the \u201cSecurity Engineer\u201d before embarking in the \u201cRed Teaming\u201d path.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SOC lv.1 from Try Hack Me # Introduction While the Jr. Penetration tester was a red team path and also more in-line with the Complete Beginner path; the SOC lv.1 [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":23,"footnotes":""},"categories":[38,44],"tags":[56,53,52,54,42],"class_list":["post-260","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-tryhackme","tag-blue-team","tag-dfir","tag-siem","tag-soc","tag-try-hack-me"],"_links":{"self":[{"href":"https:\/\/paradoxa.me\/index.php\/wp-json\/wp\/v2\/posts\/260","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/paradoxa.me\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/paradoxa.me\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/paradoxa.me\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/paradoxa.me\/index.php\/wp-json\/wp\/v2\/comments?post=260"}],"version-history":[{"count":1,"href":"https:\/\/paradoxa.me\/index.php\/wp-json\/wp\/v2\/posts\/260\/revisions"}],"predecessor-version":[{"id":261,"href":"https:\/\/paradoxa.me\/index.php\/wp-json\/wp\/v2\/posts\/260\/revisions\/261"}],"wp:attachment":[{"href":"https:\/\/paradoxa.me\/index.php\/wp-json\/wp\/v2\/media?parent=260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/paradoxa.me\/index.php\/wp-json\/wp\/v2\/categories?post=260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/paradoxa.me\/index.php\/wp-json\/wp\/v2\/tags?post=260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}