(Advanced Incident Response, Threat Hunting, and Digital Forensics)
دوره SANS FOR508 ازجمله دورههای مربوط به حوزه شکار تهدیدات امنیتی و پاسخ به اتفاقات پیشرفته موجود است. تمرکز این دوره بر روی آموزش نیروها در راستای تشخیص نفوذهای موجود میباشد. شناسایی سیستمهای بهخطر افتاده و آسیبدیده، ارزیابی خسارتهای ایجاد شده، مهار یا شکار حوادث و... ازجمله مباحثی هستند که در سرفصلهای دوره FOR508 قرار گرفتهاند.
سازمانها هیچگاه نمیتوانند اطمینان کامل دهند که اقدامات امنیتی آنها غیرقابل نفوذ خواهد بود. بلکه همواره باید بهدنبال بدست آوردن اطلاعات کافی از حوادث یا حملات ممکن باشند. هنگامی که نفوذی درحال انجام باشد، شکار آن و یا فارنزیک آن نفوذ، میتواند از به سرقت رفتن اطلاعات جلوگیری کند. درحقیقت روند شکار تهدیدات، پیش از اینکه مهاجمان اهداف خود را به اتمام رسانده و آسیبهای قابل توجهی به سازمان وارد کنند، انجام میگیرد. شکار تهدید از رفتارهای کسی که قصد تداخل دارد شناختهشده، و برای بررسی شبکه و نقاط پایانی به منظور شناسایی نقض اطلاعات جدید، انجام میشود. هدف از ارائه این دوره مشخص کردن سیستمهای مورد حمله قرار گرفته و شناسایی نفوذهای موجود به سیستمهای اطلاعاتی خواهد بود. دوره SANS508 ازجمله دورههای پیشرفته دنیای فارنزیک و پاسخگویی به حوادث بهشمار میرود. شکار تهدیدات در طی چندسال گذشته، ازطریق روشهای قدیمی بسیار سخت و گاهاً قابل استفاده نبوده است. بدینترتیب دوره SANS FOR508 با استفاده از مهارتهای پیشرفته موجود، سعی در ارتقاء دانش متخصصان حوزه امنیت و فارنزیک در این زمینه را دارد. مباحث تئوری، روشهای بهروز و کارگاههای عملی ازجمله بخشهای مورد تدریس در این دوره خواهند بود.
سرفصلهای دوره SANS FOR508
تاکتیکها و رویههای شکار تهدید و واکنش به حادثه در چند سال گذشته به سرعت تکامل یافتهاند. تیم شما دیگر نمیتواند از تکنیکهای قدیمی واکنش به حادثه و شکار تهدید استفاده کند که به درستی سیستمهای در معرض خطر را شناسایی نمیکنند. FOR508 مهارتهای پیشرفتهای را برای شکار، شناسایی، مقابله و بازیابی از طیف گستردهای از تهدیدات در شبکههای سازمانی، از جمله گروههای APT، سندیکاهای جرایم سازمانیافته، و اپراتورهای باجافزار آموزش میدهد.
سرفصلهای دوره SANS FOR508
تاکتیکها و رویههای شکار تهدید و واکنش به حادثه در چند سال گذشته به سرعت تکامل یافتهاند. تیم شما دیگر نمیتواند از تکنیکهای قدیمی واکنش به حادثه و شکار تهدید استفاده کند که به درستی سیستمهای در معرض خطر را شناسایی نمیکنند. FOR508 مهارتهای پیشرفتهای را برای شکار، شناسایی، مقابله و بازیابی از طیف گستردهای از تهدیدات در شبکههای سازمانی، از جمله گروههای APT، سندیکاهای جرایم سازمانیافته، و اپراتورهای باجافزار آموزش میدهد.
Overview
There are ways to gain an advantage against adversaries targeting you - it starts with the right mindset and knowing what works
The last decade has not been kind to network defenders. Threats to the modern enterprise are legion and attackers have used the enormous complexity of enterprise networks against us. But the tide is shifting. Over the past decade, we have seen a dramatic increase in sophisticated attacks against organizations. Nation-state attacks originating from the intelligence services of countries like China and Russia, often referred to as Advanced Persistent Threat (APT) actors, have proved difficult to suppress. Massive financial attacks from the four corners of the globe have resulted in billions of dollars in losses. Ransomware and extortion became an existential threat almost overnight. While the odds are stacked against us, the best security teams are proving that these threats can be managed and mitigated. FOR508 aims to bring those hard-won lessons into the classroom.
This course was designed to help organizations increase their capability to detect and respond to intrusion events. This is an achievable goal and begins by teaching the tools and techniques necessary to find evil in your network. This course is designed to make you and your organization an integral part of the solution. To keep pace, incident responders and threat hunters must be armed with the latest tools, analysis techniques, and enterprise methodologies to identify, track, and contain advanced adversaries with the ultimate goal of rapid remediation of incidents and damage mitigation. Further, incident response and threat hunting analysts must be able to scale their efforts across potentially thousands of systems in the enterprise. We start the day by examining the six-step incident response methodology as it applies to incident response for advanced threat groups. The importance of developing cyber threat intelligence to impact the adversaries' "kill chain" is discussed and forensic live response techniques and tactics are demonstrated that can be applied both to single systems and across the entire enterprise.
Understanding attacks is critical to being able to detect and mitigate them. We start our education of attacker techniques on day one, learning common malware and attack characteristics and diving deep into techniques used by adversaries to maintain persistence in the network. Persistence is typically completed early in the attack cycle and students will learn hunting techniques to audit the network and accomplish early discovery. Living off the land binaries (local tools available in most environments), PowerShell, and WMI-based attacks in particular have become standard operating procedure for advanced adversaries and students get a lot of practice with tools and techniques to identify such attacks at scale. We end the day with an in-depth discussion of Microsoft credentialing. The complexity of credentials in the modern enterprise cannot be overstated and credentials are the number one vulnerability present in every network. By understanding the tools and techniques being used to target credentials, students learn how to prevent, detect, and mitigate these devastating attacks.
Exercises
Topics
Real Incident Response Tactics
Threat Hunting
Threat Hunting in the Enterprise
Incident Response and Hunting Across the Enterprise
Malware Defense Evasion and Identification
Malware Persistence Identification
Prevention, Detection, and Mitigation of Credential Theft
Overview
Even the most advanced adversaries leave footprints everywhere. Learn the secrets of the best hunters.
Cyber defenders have a wide variety of tools and artifacts available to identify, hunt, and track adversary activity in a network. Each attacker action leaves a corresponding artifact, and understanding what is left behind as footprints can be crucial to both red and blue team members. Attacks follow a predictable pattern, and we focus our detective efforts on immutable portions of that pattern. As an example, at some point an attacker will need to run code to accomplish their objectives. We can identify this activity via application execution artifacts. The attacker will also need one or more accounts to run code. Consequently, account auditing is a powerful means of identifying malicious. An attacker also needs a means to move throughout the network, so we look for artifacts left by the relatively small number of ways there are to accomplish internal lateral movement. In this section, we cover common attacker tradecraft and discuss the various data sources and forensic tools you can use to identify malicious activity in the enterprise.
Get ready to hunt!
Exercises
Topics
Advanced Evidence of Execution Detection
Lateral Movement Adversary Tactics, Techniques, and Procedures (TTPs)
Log Analysis for Incident Responders and Hunters
Investigating WMI and PowerShell-Based Attacks
Overview
Using memory analysis sometimes feels like cheating - finding active attacks shouldn't be this easy.
Memory forensics has come a long way in just a few years. It is now a critical component of many advanced tool suites (notably EDR) and the mainstay of successful incident response and threat hunting teams. Memory forensics can be extraordinarily effective at finding evidence of worms, rootkits, PowerShell attacks, ransomware precursors, and advanced malware used by targeted attackers. In fact, some fileless attacks may be nearly impossible to unravel without memory analysis. Memory analysis was traditionally the domain of Windows internals experts and reverse engineers, but new tools, techniques, and detection heuristics have greatly leveled the playing field making it accessible today to all investigators, incident responders, and threat hunters. Further, understanding attack patterns in memory is a core analyst skill applicable across a wide range of endpoint detection and response (EDR) products, making those tools even more effective. This extremely popular section will cover many of the most powerful memory analysis capabilities available and give analysts a solid foundation of advanced memory forensic skills to super-charge investigations, regardless of the toolset employed.
Exercises
Topics
Overview
Timeline analysis will change the way you approach digital forensics, threat hunting, and incident response...forever.
Learn advanced incident response and hunting techniques uncovered via timeline analysis directly from the authors who pioneered timeline analysis tradecraft. Temporal data is located everywhere on a computer system. Filesystem modified/access/creation/change times, log files, network data, registry data, and browser history files all contain time data that can be correlated and analyzed to rapidly solve cases. Pioneered by Rob Lee as early as 2001, timeline analysis has grown to become a critical incident response, hunting, and forensics technique. New timeline analysis frameworks provide the means to conduct simultaneous examinations on a multitude of systems across a multitude of forensic artifacts. Analysis that once took days now takes minutes.
This section will step you through two primary methods of building and analyzing timelines used during advanced incident response, threat hunting, and forensic cases. Exercises will show analysts how to create timelines and how to introduce the key analysis methods necessary to help you use those timelines effectively in your cases.
Exercises
Topics
Malware Defense Evasion and Detection
Timeline Analysis Overview
Filesystem Timeline Creation and Analysis
Super Timeline Creation and Analysis
Overview
Advanced adversaries are always improving. We must keep pace
Attackers commonly take steps to hide their presence on compromised systems. While some anti-forensics steps can be relatively easy to detect, others are much harder to deal with. As such, it's important that forensic professionals and incident responders are knowledgeable on various aspects of the operating system and file system which can reveal critical residual evidence. Criminal and ransomware syndicates have become particularly aggressive in their use of anti-forensic techniques. In this section, we focus on recovering files, file fragments, and file metadata of interest to the investigation. These trace artifacts can help the analyst uncover deleted logs, attacker tools, malware configuration information, exfiltrated data, and more. This often results in a deeper understanding of the attacker TTPs and provides more threat intelligence for rapid scoping of an intrusion and mitigating damage. In some cases, these deep-dive techniques could be the only means for proving that an attacker was active on a system of interest and ultimately determining root cause. While very germane to intrusion cases, these techniques are applicable in nearly every forensic investigation.
Exercises
Topics
Volume Shadow Copy Analysis
Advanced NTFS Filesystem Tactics
Advanced Evidence Recovery
Overview
This incredibly rich and realistic enterprise intrusion exercise is based on a real-world advanced persistent threat (APT) group. It brings together techniques learned earlier in the course and tests your newly acquired skills in an investigation into an attack by an advanced adversary. The challenge brings it all together using a real intrusion into a complete Windows enterprise environment. You will be asked to uncover how the systems were compromised in the initial intrusion, find other compromised systems via adversary lateral movement, and identify intellectual property stolen via data exfiltration. Solving the final intrusion lab requires investigating artifacts on over thirty systems including Windows 10 and 11 workstations, DMZ servers, a domain controller, internal development servers, and hosted Exchange email. You will walk out of the course with hands-on experience investigating a real attack, curated by a cadre of instructors with decades of experience fighting advanced threats from attackers ranging from nation-states to financial crime syndicates to top-level ransomware groups.
Topics
IDENTIFICATION AND SCOPING:
1. How and when was the network breached? Which system is "Patient Zero"?
2. How did the initial infection occur giving the attackers a foothold? What type of exploit was used?
3. When and how did the attackers first laterally move to each system?
4. What were the attacker's primary and secondary command and control backdoors?
CONTAINMENT AND THREAT INTELLIGENCE GATHERING:
5. How and when did the attackers obtain domain administrator credentials?
6. What did the attackers look for on each system?
7. Damage Assessment: what data was stolen?
8. Damage Assessment: was email accessed or stolen?
9. Was any evidence of anti-forensics activity discovered?
10. Were the attackers able to access any cloud-based resources like cloud computing resources or cloud storage data?
11. Threat Intelligence: catalog host-based and network indicators of compromise.
REMEDIATION AND RECOVERY:
12. What level of account compromise occurred? Is a full password reset required during remediation?
13. Based on the attacker techniques and tools discovered during the incident, what are the recommended steps to remediate and recover from this incident?
a. What systems need to be rebuilt?
b. What IP addresses need to be blocked?
c. What countermeasures should we deploy to slow or stop these attackers if they come back?
d. What recommendations would you make to detect these intruders in our network again?
FOR508 یک دوره پیشرفته با محوریت واکنش به حوادث و شکار تهدیدات است که تمرکز خود را بر روی کشف و پاسخ به تهدیدات پیشرفته موجود و جرائم سازماندهی شده قرار داده است. ما در این دوره به مقدمات و پایههای پاسخ به حوادث، فارنزیک دیجیتال ویندوز یا تکنیکهای هک نمیپردازیم. بلکه مباحث جزئیتر و پیشرفتهتر در این زمینه را ارائه خواهیم کرد. درنتیجه برای شروع این دوره نیازمند گذراندن دورهی FOR500 که در زمینه فارنزیک ویندوز میباشد، خواهید بود. پیش از همهی این مباحث نیز گذراندن دوره CEH برای افرادی که قصد ورود به دنیای هک و امنیت را دارند، ضروریست.
در این دوره به طور گسترده از SIFT Workstation برای آموزش پاسخ دهندگان به حوادث و تحلیلگران فارنزیک استفاده میشود تا چگونگی پاسخ به حملات و تحقیقات پیچیده را به شما آموزش دهیم. SIFT شامل صدها ابزار رایگان و اپن سورس است که برای شناخت بهتر کار با آنها، نیازمند آموزش خواهید بود.
اعضای تیم پاسخگویی حوادث که مرتباً با حوادث پیچیده امنیتی، هجوم گروههای APT، هکرهای پیشرفته و ... در ارتباط هستند و باید بدانند که چگونه سیستمهای به خطر افتاده را شناسایی کنند و از بین ببرند.