Module 9 Lab

docx

School

Bellevue College *

*We aren’t endorsed by this school

Course

430

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

15

Uploaded by CountDugongPerson1794

Report
CYBR 440 - Incident Detection and Response Module 9 Lab – Incident Tracking In this ninth lab, we will learn how to use automated incident tracking systems to document what happens during an incident. Depending on the incident, incident responders often have to produce a written report meant for external entities such as executives, legal, and third parties while utilizing automated tools to help with the more technical aspects of incident tracking. We will use two popular open-source tools for incident tracking in this lab. The first is an eGRC tool used for compliance but has incident tracking functionality as an integrated compliance tool. The second is an incident tracking and response platform explicitly built for incident responders. This second platform integrates much of the threat intelligence and malware analysis capability to make research and tracking seamless. You will be required to submit the following graded items as part of this lab: Answer all questions listed in BOLD Provide screenshots when asked Accessing the Lab This lab is hosted in the university IS Lab and requires special instructions to access it. If you are not familiar with accessing the IS Lab, please see the document in this course that walks you through accessing the Cybersecurity Desktop. You can access the Cybersecurity Desktop through the Web or using VMWare’s Horizon client. It would be best if you used the native Horizon client when possible as it provides better performance. The web client can be accessed at https://workspace.bellevue.edu . Make sure you log in to this interface with your Bellevue student ID and password. After accessing workspace.bellevue.edu and selecting the IS Lab desktop, open a browser and navigate to https://10.98.100.11 . The first time you access this site, you will see a warning in the browser. Make sure to click advanced and then Proceed to 10.98.100.11 (Unsafe). Next, you should see the following remote access page.
After accessing Bellevue Bank and Trust’s Remote Management Portal, login in using the following information: Username: analyst# - Where # is the number provided to you by your instructor Password: An@lyst#!! - Where # is the number provided to you by your instructor After logging in, you should see the following page: You should have three available connections, RDP Kali #, RDP Workstation#, and SSH Kali #. These are the three analyst tools you will use throughout this course.
You will be using the Windows 10 RDP Workstation# connection for this lab. Therefore, it would be best to open each new RDP or SSH connection in a new tab. Part 1 - Incident Tracking with Eramba eGRC In this first lab, we will use Eramba, an eGRC tool, to track an incident from start to finish. You will be using the Bellevue Bank and Trust case study for this lab. 1. After accessing your analyst Windows 10 desktop, open a browser and navigate to https://eramba.bbtrust.com . You can also click the shortcut link on your analyst desktop. Log in using the username analyst# and password An@lyst#!!, where # is your analyst number. 2. After logging in, hover over the second to the bottom icon on the left side of the screen, labeled Security Options, and then click Security Incidents.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
3. At the top of the screen, click Actions, and then + Add. 4. On the first tab of this screen, fill out the following information based on the information on your case study. a. Title - Your choice b. Type - Incident c. Description - A good description of the incident d. Tags - Phishing, Ransomware e. Open Date - The date the incident started (see the case study), September 16 th , 2021. f. Automatically Close Incident - Leave disabled g. Close Date - Leave blank for now h. Status - Ongoing 5. On the Risk Profile tab, fill in the following information a. Related Risk Assets - Select Widespread Ransomware Attack Against Multiple Systems b. Related Third-Party Risks - Leave Blank c. Related Business Risks - Leave Blank 6. On the Incident Stakeholder tab, fill in the following information a. Owner - Select Bruce Edwards b. Reporter - Type the name Jordan Brands c. Victim - List the names of the victims i. Charles Sullivan ii. Sarah Kopsa iii. Michelle Michelson 7. On the Incident Profil, fill in the following information a. Affected Compensating Controls - Select Backups, Malware Cleanup/Reimage b. Affected Assets - As the users are already linked to assets, this field should already be filled in with the affected assets. If not, select the following assets: i. VDI15A22 ii. lincolnbackoffice15 iii. l55cm2 iv. cio1 v. mgr257
vi. bankshare01 vii. Bank Share 01 Data c. Affected Third-Parties - Leave Blank. 8. Click Save at the bottom of the Add Item (Security Incident) page. You should see a new incident appear on the Security Incident page with Ongoing and Lifecycle Incomplete status. 9. On the Security Incident page, click on the arrow pointing down next to the number 7 in the stages column and then click show. You will see the seven stages of incident response. 10. Click on the hamburger menu next to the Preparation stage and click Comments and Attachments. Type in the comment box what you think the CSIRT team in this case study did to be ready for this incident. They have a reasonably mature team, so there should be plenty of description. While we don’t have this available, a written playbook for phishing and ransomware could be attached here. Click Add Comment, and then Close when you finish. 11. Click on the hamburger menu next to Preparation and click Edit. Change the Status to completed and then click Save.
12. Click the hamburger menu next to the Detection stage and click Comments & Attachments. Add a description of how the incident was detected. Make sure you include plenty of detail. Click Add Comment and then Save. 13. Click the hamburger menu next to the Detection stage, click Edit, change the Status to Complete, and then click Save. 14. Click the hamburger menu next to the Analysis stage and click Comments & Attachments. Add a description of the analysis completed to determine an incident/attack was taking place. Make sure you include plenty of detail. Click Add Comment and then Save. 15. Click the hamburger menu next to the Analysis stage, click Edit, change the Status to Complete, and then click Save. 16. Click the hamburger menu next to the Containment stage and click Comments & Attachments. Add a description of what the CSIRT team did to contain the incident. Make sure you include plenty of detail. Click Add Comment and then Save. 17. Click the hamburger menu next to the Containment stage, click Edit, change the Status to Complete, and then click Save. 18. Click the hamburger menu next to the Eradication stage and click Comments & Attachments. Add a description of what the CSIRT team did to eradicate the ransomware. Make sure you include plenty of detail. Click Add Comment and then Save. 19. Click the hamburger menu next to the Eradicate stage, click Edit, change the Status to Complete, and then click Save. 20. Click the hamburger menu next to the Recovery stage and click Comments & Attachments. Add a description of what the CSIRT team did to recover from the incident. Make sure you include plenty of detail. Click Add Comment and then Save. 21. Click the hamburger menu next to the Recover stage, click Edit, change the Status to Complete, and then click Save.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
22. Click the hamburger menu next to the Post-Incident Activity stage and click Comments & Attachments. Add a description of what the CSIRT team and the organization can do better to prevent and respond to a similar incident in the future. Make sure you include plenty of detail. Click Add Comment and then Save. 23. Click the hamburger menu next to the Post-Incident Activity stage, click Edit, change the Status to Complete, and then click Save. 24. Click on the Security Incident tab at the very top of the page, next to Stages to return to the Security Incidents page. 25. Click on the hamburger menu next to your security incident and click edit. On the General Page, scroll down to the Closure Date on the General Tab and select a closure date of September 21 st , 2021. Change the Status to closed. Click Save. Take a screenshot of your closed case and paste it below Type in the name/title you gave your case below Part 2 - Incident Tracking with TheHive IR Platform In this second part of the lab, we will use a platform that has been purpose-built for incident responders. Using MISP and Cortex, TheHive allows you to add malicious files and potential indicators of compromise and will automatically go to services like threat intelligence services, virus total, any.run, AbuseIPDB to check for malicious indicators.
1. Open Chrome and navigate to https://thehive.bbtrust.com or click the shortcut on your analyst desktop for TheHive. Log in using the name analyst#@bbtrust.com and the password An@lyst#!!. 2. At the top of the screen, click + New Case. 3. On the Create a new case page, fill in the following information: a. Title - A unique title for your case based on the case study b. Date - The date the incident began, 16 September, 2021 c. Severity - High d. TLP - Amber e. PAP - Amber f. Tags - Phishing, Ransomware g. Description - A good description of the event based on the case study h. Click + Create Case
4. Now that the case is created, we can begin adding tasks. First, click on the Tasks tab. Then click on the Add Task. For the Task group and Task title, add the following values and be sure to click the green checkmark on the right after adding the values: a. Task group: Preparation, Task title: Prepare for phishing and ransomware, write playbook and deploy controls. b. Task group: Detection, Task title: Monitor controls and take reports to detect incidents. c. Task group: Analysis, Task title: Add observables to security incident tracking and perform analysis. d. Task group: Containment, Task title: Keep malware from spreading, add observables to anti-malware and firewalls. e. Task group: Eradication, Task title: Remove malware by imaging systems, remove malware with other tools. f. Task group: Recovery, Task title: Restore encrypted files from backup. g. Task group: Post-Incident Activity: Conduct after-action meeting, write incident and after-action report. Conduct continuous improvement activities. Note: It is a good idea to align your task groups with the top-level stages of an incident response framework. 5. Go through each task on the tasks page and change the Assignee for each task to your Analyst #. Ex. Analyst One if you are analyst1. 6. Start with the Preparation task, hit play. This action will open the task for you to include information. Click the + Add new tasklog button and type a description for the preparation you believe was done for the incident in the case study. Click Add log. 7. Go back to the Tasks tab and click the close button (gray circle with a checkmark where the play button used to be.) 8. Next, go to the Detection task and click the start (play) icon. Click + Add a new task log. Add a detailed description of how the incident in the case study was detected and click Add log. Return to the Tasks tab and close this task. 9. For the analysis group task, click start. Then, instead of adding a new task log, click the observables tab at the top of the case.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
10. Click + Add Observable. You will repeat this process four times, one for each observable type, domain names (fqdn), hashes, IP addresses, and email addresses. Fill out the following information for each new observable type. a. Type (fqdn, hash, mail, or IP address). b. In the Value field, put each observable of the correct type on each line, one per line. c. Keep the One observable per line checked. d. TLP Amber e. Is IOC: True f. Tags: Ransomware, Phishing g. Description: Provide a good description of the IOCs, i.e., where they came from, who reported them, etc. A note on copying and pasting: You can copy and paste from your own computer into your analyst computer to make things easier (especially with the hashes). Copy the text you want to paste into the remote workstation. Then click on the remote analyst workstation and press CTRL+SHIFT+ALT. This action will bring up the following dialog.
Paste the text into this box and then close it by pressing CTRL+SHIFT+ALT again. You can now paste this text into a Window on the analyst workstation. 11. At this point, we will use the integration with Cortex to automatically fetch threat intelligence and other information from web services like AbuseIPDB, OTX, and Virus Total. Note that there are over 100 different integrations with platforms like Threat Grid, DomainTools, Any.Run, Cuckoo, and other IR tools. Due to the throttling limit on Virus Total, make sure that you are only running three or fewer analyzers at a time. Start by selecting three observables that have not been analyzed by selecting the checkmark next to the observable.
12. Next, locate the drop-down button that says X selected observables, press it, then press Run analyzers on the menu that appears. The analyzer dialog will give you one, two, or three options. Click all the available options, then click Run selected analyzers. After running the analyzers, inspect the observables for which the analyzers were run and ensure you have all the results and no errors. If you receive errors, try rerunning the analyzers. VirusTotal is rate limited because it uses the free API, so running too many analyses at once can cause failures. Also, note that there are no analyzers configured for email addresses, so you will not be able to run
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
13. After all of the observables have been successfully analyzed, ensure that you spend a few minutes clicking on the color-coded results from VirusTotal, OTX, and AbuseIPB when more than 0 records are shown. The information provided will be in JSON, but there is often great information. Make sure you take notes of the results. 14. Return to the Tasks tab. Click on the highlighted text for the Analysis task title and then click + Add New task log. Describe what you found with the analysis. Include information in the case study, then click Add log. Return to the Tasks tab and close the Analysis task.
15. Now, go to the Containment task and click the start (play) icon. Click + Add a new task log. Add a detailed description of how the incident in the case study was contained and click Add log. Return to the Tasks tab and close this task. 16. Repeat these actions with the Eradication task and click the start (play) icon. Click + Add a new task log. Add a detailed description of how the incident in the case study was eradicated and click Add log. Return to the Tasks tab and close this task. 17. Repeat these actions with the Recovery task and click the start (play) icon. Click + Add a new task log. Add a detailed description of how the incident in the case study was recovered and click Add log. Return to the Tasks tab and close this task. 18. Repeat these actions with the Post-Incident Activity task and click the start (play) icon. Click + Add a new task log. Add a detailed description of what could be improved to better prevent and respond to an incident of this nature in the future and click Add log. Return to the Tasks tab and close this task. 19. Though we will often add TTPs and other information as part of incident tracking, we will not do so in this case as we covered the critical core functionality. When you are ready, click the Close button at the top of the case. Mark the status as True Positive, mark the Impact as Yes, then provide an executive summary of the case in the Summary textbox. Click Close case.
20. To return to view the case after closing it, as you will need to copy and paste some information into this lab, return to the main TheHive page by clicking the TheHive in the upper left-hand corner of the page. First, clear all filters by clicking the Red X next to the listed filters, then click the title of the case you worked. Next, answer the following questions and provide the following screenshots. Paste a screenshot of the closed tasks from the Tasks tab in the incident case you created. Paste a screenshot of the Observables tab, the first page that shows short color-coded summary reports. Make sure the screenshot shows an OTX, AIPDB, or VT with > 0 results. What benefits do you see over using TheHive, which is built specifically for incident responders, rather than other tools like Eramba or IT service ticketing systems?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help