TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

How To Do Endpoint Monitoring on a Shoestring Budget – Webcast Write-Up

BHIS · 2017-07-10 · Read original ↗

ATT&CK techniques detected

8 predictions
T1059.001PowerShell
82%
"an attack from injecting shellcode into memory to post - exploitation situational awareness and lateral movement. in most environments, powershell execution with the version delivered with windows 7 ( version 2. 0 ) leaves few artifacts of its usage behind making very appealing f…"
T1654Log Enumeration
79%
"edge of your network, is crucial to find an attacker that has made it past upstream network - based solutions. almost all of our customers respond to this recommendation with a counter - question with something like : “ hey [ bhis tester ], we have thousands of endpoints. how can…"
T1685.001Disable or Modify Windows Event Log
75%
". microsoft also offers solutions and strategies to consolidate endpoint logs. for this post, we chose to use nxlog. the folks at nxlog. co offer a free ( community edition ) and an enterprise version. the community edition should be sufficient for most windows endpoint logging t…"
T1654Log Enumeration
67%
"> operational. by default, sysmon logging will create a fair amount of log noise. this is why a configuration file should be used at install time to filter events at the endpoint that are known to be good or alert on specifically known bad. this way, you ’ ll won ’ t be shipping …"
T1654Log Enumeration
54%
"probably powershell script block logging and powershell module logging. module logging will record pipeline execution details in event id 4103 and has details on scripts and formatted data from the output. script block logging will record code as it is executed by the powershell …"
T1055.001Dynamic-link Library Injection
41%
"an attack from injecting shellcode into memory to post - exploitation situational awareness and lateral movement. in most environments, powershell execution with the version delivered with windows 7 ( version 2. 0 ) leaves few artifacts of its usage behind making very appealing f…"
T1059.001PowerShell
40%
"> operational. by default, sysmon logging will create a fair amount of log noise. this is why a configuration file should be used at install time to filter events at the endpoint that are known to be good or alert on specifically known bad. this way, you ’ ll won ’ t be shipping …"
T1685.001Disable or Modify Windows Event Log
33%
"probably powershell script block logging and powershell module logging. module logging will record pipeline execution details in event id 4103 and has details on scripts and formatted data from the output. script block logging will record code as it is executed by the powershell …"

Summary

Joff Thyer & Derek Banks // Editor’s Note: This is a more in-depth write-up based on the webcast which can be watched here. As penetration testers, we often find ourselves […]

The post How To Do Endpoint Monitoring on a Shoestring Budget – Webcast Write-Up appeared first on Black Hills Information Security, Inc..