SlideShare una empresa de Scribd logo
1 de 31
Threat Hunting for C2
with Sqrrl
Nov 30 2016 | Josh Liburdi
Presenter
• Josh Liburdi
SecurityTechnologist at Sqrrl
FormerlyGeneral ElectricCIRT, CrowdStrike Professional Services
3+ years in incident response
WhatYou’ll LearnToday
• Why you need to detect command and control activity
• How Sqrrl automatically detects command and control patterns
• How Sqrrl makes it easy to investigate IOCs
• How Sqrrl lets you hunt with common techniques
© 2016 Sqrrl Data, Inc. All rights reserved. 3
WHYWE NEEDTO DETECT C2
Understanding the Attack Lifecycle
• ‘What is most impactful to the organization?’
– Type of threat (targeted or opportunistic)
– Outcome (financial loss, sensitive data loss)
• Evaluate threats and prescribe detection
© 2016 Sqrrl Data, Inc. All rights reserved. 5
Attacker
Defender
WhyWe Need to Detect C2
• Required step of the kill chain in remote attacks
• Predictable architecture, diverse execution
– Client-Server
– Peer-to-Peer
• Leading techniques
1. Encrypted channels
• Standard protocols (HTTPS)
• Custom protocols (XOR)
2. Domain Generation Algorithms (DGA)
• Ransomware (Locky, Cryptolocker)
3. Tunneling
• Point of Sale malware (FrameworkPOS, NewPosThings)
© 2016 Sqrrl Data, Inc. All rights reserved. 6
HUNTING MATURITY MODEL
Hunting Maturity Model
© 2016 Sqrrl Data, Inc. All rights reserved. 8
• Many organizations are in HM0, HM1, and HM2
DATA DOMAINS
Data domains
© 2016 Sqrrl Data, Inc. All rights reserved. 10
Network Endpoint Application
Enrichment
UNCOVERING C2 WITH
SQRRL
Sqrrl Detection Analytics
• Sqrrl comes with
three machine
learning-driven C2
detection analytics
– Beacon
– Domain
Generation
Algorithms
(DGA)
– DNS tunneling
© 2016 Sqrrl Data, Inc. All rights reserved. 12
DEMO
SUMMARY
Benefits of Hunting with Sqrrl
© 2016 Sqrrl Data, Inc. All rights reserved. 15
1. Isolate attackerTTPs, like DGA or DNS tunneling, with detection analytics
2. Determine attack context with data domains unified in a linked model
3. Find emerging threats by acting on the latest intel and analysis procedures
Want to Learn More?
© 2016 Sqrrl Data, Inc. All rights reserved. 16
Go to sqrrl.com to…
• Download Sqrrl’sThreat Hunting eBook
• Download the SqrrlWhite Paper onThreat Hunting
Platforms
• Request a SqrrlTest DriveVM
• Download Sqrrl’s Product Paper
• Reach out to us at info@sqrrl.com
APPENDIX
BEACON DEMO
SCREENSHOTS
© 2016 Sqrrl Data, Inc. All rights reserved. 19
© 2016 Sqrrl Data, Inc. All rights reserved. 20
© 2016 Sqrrl Data, Inc. All rights reserved. 21
IOC SEARCH DEMO
SCREENSHOTS
© 2016 Sqrrl Data, Inc. All rights reserved. 23
© 2016 Sqrrl Data, Inc. All rights reserved. 24
© 2016 Sqrrl Data, Inc. All rights reserved. 25
© 2016 Sqrrl Data, Inc. All rights reserved. 26
STACKING DEMO
SCREENSHOTS
© 2016 Sqrrl Data, Inc. All rights reserved. 28
© 2016 Sqrrl Data, Inc. All rights reserved. 29
© 2016 Sqrrl Data, Inc. All rights reserved. 30
© 2016 Sqrrl Data, Inc. All rights reserved. 31

Más contenido relacionado

La actualidad más candente

Threat Hunting Web Shells Using Splunk
Threat Hunting Web Shells Using SplunkThreat Hunting Web Shells Using Splunk
Threat Hunting Web Shells Using Splunkjamesmbower
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting WorkshopSplunk
 
Threat Hunting Report
Threat Hunting Report Threat Hunting Report
Threat Hunting Report Morane Decriem
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceVishal Kumar
 
Hunting for Privilege Escalation in Windows Environment
Hunting for Privilege Escalation in Windows EnvironmentHunting for Privilege Escalation in Windows Environment
Hunting for Privilege Escalation in Windows EnvironmentTeymur Kheirkhabarov
 
Cyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down IntrudersCyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down IntrudersInfosec
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On LabPHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On LabTeymur Kheirkhabarov
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 
Lateral Movement with PowerShell
Lateral Movement with PowerShellLateral Movement with PowerShell
Lateral Movement with PowerShellkieranjacobsen
 
Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onSplunk
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityPanda Security
 
Finding attacks with these 6 events
Finding attacks with these 6 eventsFinding attacks with these 6 events
Finding attacks with these 6 eventsMichael Gough
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingDhruv Majumdar
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 
Hunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows InfrastructureHunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows InfrastructureSergey Soldatov
 
Introduction to red team operations
Introduction to red team operationsIntroduction to red team operations
Introduction to red team operationsSunny Neo
 
Threat hunting on the wire
Threat hunting on the wireThreat hunting on the wire
Threat hunting on the wireInfoSec Addicts
 
Fantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find ThemFantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find ThemRoss Wolf
 

La actualidad más candente (20)

Threat Hunting Web Shells Using Splunk
Threat Hunting Web Shells Using SplunkThreat Hunting Web Shells Using Splunk
Threat Hunting Web Shells Using Splunk
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting Workshop
 
Threat Hunting Report
Threat Hunting Report Threat Hunting Report
Threat Hunting Report
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement Matrice
 
Hunting for Privilege Escalation in Windows Environment
Hunting for Privilege Escalation in Windows EnvironmentHunting for Privilege Escalation in Windows Environment
Hunting for Privilege Escalation in Windows Environment
 
Cyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down IntrudersCyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down Intruders
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On LabPHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Lateral Movement with PowerShell
Lateral Movement with PowerShellLateral Movement with PowerShell
Lateral Movement with PowerShell
 
Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-on
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
 
Finding attacks with these 6 events
Finding attacks with these 6 eventsFinding attacks with these 6 events
Finding attacks with these 6 events
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Hunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows InfrastructureHunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows Infrastructure
 
Introduction to red team operations
Introduction to red team operationsIntroduction to red team operations
Introduction to red team operations
 
SIEM and Threat Hunting
SIEM and Threat HuntingSIEM and Threat Hunting
SIEM and Threat Hunting
 
Threat hunting on the wire
Threat hunting on the wireThreat hunting on the wire
Threat hunting on the wire
 
Fantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find ThemFantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find Them
 

Similar a Threat Hunting for Command and Control Activity

Splunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-OnSplunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-OnSplunk
 
AktaionPPTv5_JZedits
AktaionPPTv5_JZeditsAktaionPPTv5_JZedits
AktaionPPTv5_JZeditsRod Soto
 
Leverage the Network
Leverage the NetworkLeverage the Network
Leverage the NetworkCisco Canada
 
Splunk Enterprise for InfoSec Hands-On Breakout Session
Splunk Enterprise for InfoSec Hands-On Breakout SessionSplunk Enterprise for InfoSec Hands-On Breakout Session
Splunk Enterprise for InfoSec Hands-On Breakout SessionSplunk
 
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...Cristian Garcia G.
 
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...Harry McLaren
 
A Community Approach to Fighting Cyber Threats
A Community Approach to Fighting Cyber ThreatsA Community Approach to Fighting Cyber Threats
A Community Approach to Fighting Cyber ThreatsCloudera, Inc.
 
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...NetworkCollaborators
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Decisions
 
Dealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of DetailDealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of DetailMITRE ATT&CK
 
Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center NetworkCollaborators
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDebra Baker, CISSP CSSP
 
Cassandra Summit 2014: Apache Cassandra at Telefonica CBS
Cassandra Summit 2014: Apache Cassandra at Telefonica CBSCassandra Summit 2014: Apache Cassandra at Telefonica CBS
Cassandra Summit 2014: Apache Cassandra at Telefonica CBSDataStax Academy
 
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data centerNur Shiqim Chok
 
Cisco Connect 2018 Vietnam - building a secure data center
Cisco Connect 2018 Vietnam - building a secure data centerCisco Connect 2018 Vietnam - building a secure data center
Cisco Connect 2018 Vietnam - building a secure data centerNetworkCollaborators
 
Cloud Intrusion Detection Reloaded - 2018
Cloud Intrusion Detection Reloaded - 2018Cloud Intrusion Detection Reloaded - 2018
Cloud Intrusion Detection Reloaded - 2018randomuserid
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Keith Kraus
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud SecurityTudor Damian
 

Similar a Threat Hunting for Command and Control Activity (20)

Splunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-OnSplunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-On
 
AktaionPPTv5_JZedits
AktaionPPTv5_JZeditsAktaionPPTv5_JZedits
AktaionPPTv5_JZedits
 
Leverage the Network
Leverage the NetworkLeverage the Network
Leverage the Network
 
Splunk Enterprise for InfoSec Hands-On Breakout Session
Splunk Enterprise for InfoSec Hands-On Breakout SessionSplunk Enterprise for InfoSec Hands-On Breakout Session
Splunk Enterprise for InfoSec Hands-On Breakout Session
 
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
 
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
 
A Community Approach to Fighting Cyber Threats
A Community Approach to Fighting Cyber ThreatsA Community Approach to Fighting Cyber Threats
A Community Approach to Fighting Cyber Threats
 
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Network security
Network securityNetwork security
Network security
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Dealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of DetailDealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of Detail
 
Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptx
 
Cassandra Summit 2014: Apache Cassandra at Telefonica CBS
Cassandra Summit 2014: Apache Cassandra at Telefonica CBSCassandra Summit 2014: Apache Cassandra at Telefonica CBS
Cassandra Summit 2014: Apache Cassandra at Telefonica CBS
 
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
 
Cisco Connect 2018 Vietnam - building a secure data center
Cisco Connect 2018 Vietnam - building a secure data centerCisco Connect 2018 Vietnam - building a secure data center
Cisco Connect 2018 Vietnam - building a secure data center
 
Cloud Intrusion Detection Reloaded - 2018
Cloud Intrusion Detection Reloaded - 2018Cloud Intrusion Detection Reloaded - 2018
Cloud Intrusion Detection Reloaded - 2018
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
 

Más de Sqrrl

Transitioning Government Technology
Transitioning Government TechnologyTransitioning Government Technology
Transitioning Government TechnologySqrrl
 
Leveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your HuntsLeveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your HuntsSqrrl
 
Machine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting StartedMachine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting StartedSqrrl
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior GraphUser and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior GraphSqrrl
 
Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)Sqrrl
 
Sqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar UsersSqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar UsersSqrrl
 
Modernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingModernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingSqrrl
 
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together Sqrrl
 
Leveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivityLeveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivitySqrrl
 
The Art and Science of Alert Triage
The Art and Science of Alert TriageThe Art and Science of Alert Triage
The Art and Science of Alert TriageSqrrl
 
Reducing Mean Time to Know
Reducing Mean Time to KnowReducing Mean Time to Know
Reducing Mean Time to KnowSqrrl
 
Sqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use CaseSqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use CaseSqrrl
 
The Linked Data Advantage
The Linked Data AdvantageThe Linked Data Advantage
The Linked Data AdvantageSqrrl
 
Sqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, AnalyzeSqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, AnalyzeSqrrl
 
Sqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl
 
Benchmarking The Apache Accumulo Distributed Key–Value Store
Benchmarking The Apache Accumulo Distributed Key–Value StoreBenchmarking The Apache Accumulo Distributed Key–Value Store
Benchmarking The Apache Accumulo Distributed Key–Value StoreSqrrl
 
Scalable Graph Clustering with Pregel
Scalable Graph Clustering with PregelScalable Graph Clustering with Pregel
Scalable Graph Clustering with PregelSqrrl
 
What's Next for Google's BigTable
What's Next for Google's BigTableWhat's Next for Google's BigTable
What's Next for Google's BigTableSqrrl
 
April 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with SqrrlApril 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with SqrrlSqrrl
 

Más de Sqrrl (20)

Transitioning Government Technology
Transitioning Government TechnologyTransitioning Government Technology
Transitioning Government Technology
 
Leveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your HuntsLeveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your Hunts
 
Machine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting StartedMachine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting Started
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior GraphUser and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
 
Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)
 
Sqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar UsersSqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar Users
 
Modernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingModernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led Training
 
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
 
Leveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivityLeveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker Activity
 
The Art and Science of Alert Triage
The Art and Science of Alert TriageThe Art and Science of Alert Triage
The Art and Science of Alert Triage
 
Reducing Mean Time to Know
Reducing Mean Time to KnowReducing Mean Time to Know
Reducing Mean Time to Know
 
Sqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use CaseSqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use Case
 
The Linked Data Advantage
The Linked Data AdvantageThe Linked Data Advantage
The Linked Data Advantage
 
Sqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, AnalyzeSqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, Analyze
 
Sqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber Hunting
 
Benchmarking The Apache Accumulo Distributed Key–Value Store
Benchmarking The Apache Accumulo Distributed Key–Value StoreBenchmarking The Apache Accumulo Distributed Key–Value Store
Benchmarking The Apache Accumulo Distributed Key–Value Store
 
Scalable Graph Clustering with Pregel
Scalable Graph Clustering with PregelScalable Graph Clustering with Pregel
Scalable Graph Clustering with Pregel
 
What's Next for Google's BigTable
What's Next for Google's BigTableWhat's Next for Google's BigTable
What's Next for Google's BigTable
 
April 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with SqrrlApril 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with Sqrrl
 

Último

React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...Akihiro Suda
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 

Último (20)

React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 

Threat Hunting for Command and Control Activity

  • 1. Threat Hunting for C2 with Sqrrl Nov 30 2016 | Josh Liburdi
  • 2. Presenter • Josh Liburdi SecurityTechnologist at Sqrrl FormerlyGeneral ElectricCIRT, CrowdStrike Professional Services 3+ years in incident response
  • 3. WhatYou’ll LearnToday • Why you need to detect command and control activity • How Sqrrl automatically detects command and control patterns • How Sqrrl makes it easy to investigate IOCs • How Sqrrl lets you hunt with common techniques © 2016 Sqrrl Data, Inc. All rights reserved. 3
  • 5. Understanding the Attack Lifecycle • ‘What is most impactful to the organization?’ – Type of threat (targeted or opportunistic) – Outcome (financial loss, sensitive data loss) • Evaluate threats and prescribe detection © 2016 Sqrrl Data, Inc. All rights reserved. 5 Attacker Defender
  • 6. WhyWe Need to Detect C2 • Required step of the kill chain in remote attacks • Predictable architecture, diverse execution – Client-Server – Peer-to-Peer • Leading techniques 1. Encrypted channels • Standard protocols (HTTPS) • Custom protocols (XOR) 2. Domain Generation Algorithms (DGA) • Ransomware (Locky, Cryptolocker) 3. Tunneling • Point of Sale malware (FrameworkPOS, NewPosThings) © 2016 Sqrrl Data, Inc. All rights reserved. 6
  • 8. Hunting Maturity Model © 2016 Sqrrl Data, Inc. All rights reserved. 8 • Many organizations are in HM0, HM1, and HM2
  • 10. Data domains © 2016 Sqrrl Data, Inc. All rights reserved. 10 Network Endpoint Application Enrichment
  • 12. Sqrrl Detection Analytics • Sqrrl comes with three machine learning-driven C2 detection analytics – Beacon – Domain Generation Algorithms (DGA) – DNS tunneling © 2016 Sqrrl Data, Inc. All rights reserved. 12
  • 13. DEMO
  • 15. Benefits of Hunting with Sqrrl © 2016 Sqrrl Data, Inc. All rights reserved. 15 1. Isolate attackerTTPs, like DGA or DNS tunneling, with detection analytics 2. Determine attack context with data domains unified in a linked model 3. Find emerging threats by acting on the latest intel and analysis procedures
  • 16. Want to Learn More? © 2016 Sqrrl Data, Inc. All rights reserved. 16 Go to sqrrl.com to… • Download Sqrrl’sThreat Hunting eBook • Download the SqrrlWhite Paper onThreat Hunting Platforms • Request a SqrrlTest DriveVM • Download Sqrrl’s Product Paper • Reach out to us at info@sqrrl.com
  • 19. © 2016 Sqrrl Data, Inc. All rights reserved. 19
  • 20. © 2016 Sqrrl Data, Inc. All rights reserved. 20
  • 21. © 2016 Sqrrl Data, Inc. All rights reserved. 21
  • 23. © 2016 Sqrrl Data, Inc. All rights reserved. 23
  • 24. © 2016 Sqrrl Data, Inc. All rights reserved. 24
  • 25. © 2016 Sqrrl Data, Inc. All rights reserved. 25
  • 26. © 2016 Sqrrl Data, Inc. All rights reserved. 26
  • 28. © 2016 Sqrrl Data, Inc. All rights reserved. 28
  • 29. © 2016 Sqrrl Data, Inc. All rights reserved. 29
  • 30. © 2016 Sqrrl Data, Inc. All rights reserved. 30
  • 31. © 2016 Sqrrl Data, Inc. All rights reserved. 31

Notas del editor

  1. Security Technologist at Sqrrl, act as a subject matter expert on the topic of threat detection and help guide the direction of our product, the Sqrrl Threat Hunting Platform. Before working at Sqrrl I worked at General Electric on their incident response team as a detection analyst and at CrowdStrike on the Professional Services team where I specialized in threat hunting, network security monitoring, and incident response. I've been in the incident response space, focused on threat detection, for the past three years.
  2. In today’s webinar we’re going to discuss topics related to detecting command and control activity. What you'll learn is why we need to detect C2 activity and how Sqrrl makes it easy for you to do that.
  3. Where we’ll begin is by talking about why we need to detect C2.
  4. Understanding why we need to detect C&C starts with understanding the attack life cycle and knowing how attackers operate. Using a threat model like Lockheed Martin’s Cyber Kill Chain is an important first step to understanding where to focus your detection efforts– you can use this model and others like it as a basis for thinking about the question ‘What is most impactful to the organization?’ This question can be considered multiple ways, including by type of threat (for example, are threats to the organization ones of opportunity or is the organization actively targeted by attackers?) and by outcome (for example, is financial loss more impactful than sensitive data loss?). Once you understand what is most impactful to the organization, you can evaluate how that impact can manifest by mapping attacker actions to a model like the Kill Chain. For example, in the case of targeted attackers, they typically begin at the first stage of the kill chain (Reconnaissance) and carry out each subsequent stage until they achieve their final goal (ending with Actions on Objectives). As they carry out their mission, their actions become more and more impactful to the target organization– this means that as a defender, it's a good practice to plan detection efforts from the end of the kill chain to the beginning; this ensures you have coverage for the most impactful attacker activity. In the context of this webinar, it’s important to note that command and control is near the end of the kill chain, which means it is a high-impact stage of attacker activity.
  5. This leads into the larger point of why we need to detect command and control. The primary reason is that it's a required step of the kill chain for remote attacks, of which the majority of cyber attacks are. In most situations, the attacker must remotely infiltrate your network and exfiltrate data out of your network. Speaking broadly, C&C has a fairly predictable architecture, but attackers have multiple options of implementing and executing it. The architecture is based on either a client-server model, where there is an established compromised client and C&C server, or a peer-to-peer model, where each node in the compromised group can act as client and server. Though the architecture is limited, there's plenty of room for attackers to be creative in how they build their C2 channel. Leading techniques include using encryption to hide C2 channels, such as HTTPS or custom protocols (for example, utilizing XOR encryption); using domain generation algorithms to evade detection and establish connection with a C&C server (this is utilized by multiple families of malware, including-- most prominently-- ransomware); and using tunneling to hide C2 channels in common protocols, like DNS (this is utilized by some families of malware-- including Point of Sale malware that target the retail industry-- as well as specialized remote access tools). Consider that these techniques are just a few examples-- you can see that attackers have a breadth of options for creating their C2 channel, so defenders need a breadth of options as well for detecting C2 channels.
  6. Next, we’ll take a brief look at the Hunting Maturity Model.
  7. If you haven't seen it before, the Hunting Maturity Model is a way to evaluate your organization’s hunting capabilities and it can also act as a simple guide to understand how you can mature your hunting program. In the case of detecting C2, you can think of the maturity model as a way to track how capable you are at hunting for command and control activity– for example, if you are capable of doing indicator searches, then a good next step to mature your hunting program and the detection of command and control is to implement C2-related data analysis procedures created by others. At Sqrrl, most customers we talk to find themselves in the first half of the model– their capabilities range from relying primarily on automated alerts (HM0) to following data analysis procedures created by others (HM2). So with that in mind, for the remainder of the webinar, I’ll be discussing identifying command and control activity at the lower levels of the maturity model.
  8. Finally, it’s important to talk about types of data you can use to find C2 activity.
  9. We think of data in four domains: Network, Endpoint, Application, and Enrichment. Most data in these domains comes from internal data sources. Network domain: session (flow) metadata, application protocol metadata Endpoint domain: process execution metadata, host authentication metadata Application domain: contains sources that have data unique to particular service or tool (for example, Anti-Virus software) Enrichment domain: is typically used to add contextual information across the other three domains; includes indicators of compromise, geolocation information for servers, passive DNS data for domain history Something to consider is that one data source can contribute to multiple data domains. For example, Sysmon is a free tool from Microsoft that primarily records endpoint data (process executions and file modifications), but it can also capture network data because it can identify when a process makes a network connection, so it does exist somewhat in both domains. Having accessible data from multiple domains is important because it supports a larger number of use cases-- especially complex ones that may combine data from different domains. For ease of use, it’s crucial that this data is joined together and accessible from a single place or tool. For detecting C2 activity, the most commonly accessible data is in the network domain (for example, session data, like flow records or firewall logs), but with the right level of data collection, data in the endpoint domain can be effective at finding C2 as well (especially process execution data). Enrichment data can also play a big part in detecting C2 activity, especially indicators for commonly observed malware families.
  10. Now we're ready to discuss how we can uncover C2 activity with Sqrrl. Where we'll start is with a review and demo of some Sqrrl C2 detection analytics, move to a C2 indicator search, and finish with a commonly available data analysis procedure for identifying C&C.
  11. To start, we'll look at our C2 detection analytics. Sqrrl has multiple analytics that can automatically discover and detect threats for you, including command and control activity. The first is a Beacon analytic, which we’ll interactively look at in a moment. The next two are detection analytics that identify patterns related to techniques I described earlier in the webinar-- domain generation algorithms, used to establish connectivity with a C2 server, and DNS tunneling, used for hiding a C2 channel in DNS traffic. In these screenshots you can see an example of a DGA detection in the background and the entities involved in the detection displayed on the Sqrrl Explore graph, ready to be explored, in the foreground.
  12. Now I'm going to exit out of the PowerPoint and we'll begin demos, starting with looking at a Beacon detection.
  13. Let's summarize what we've seen today.
  14. As shown throughout the webinar, there are multiple benefits to using Sqrrl for detecting threats like command and control. First, Sqrrl isolates attacker tactics, techniques, and procedures with detection analytics, including analytics that can identify beaconing, domain generation algorithms, and tunneling activities related to C2. This gives your organization additional coverage to detect attacker activity and frees up time for your team to hunt for new threats. Second, Sqrrl makes it easy to quickly determine the context of an attack or threat– I showed this earlier during the indicator search demo, where I was able to quickly establish how the compromised website led to the Sundown Exploit Kit, which led to a successful infection. Our linked data model combines a variety of data from multiple data domains, including Proxy logs and Netflow from the network domain and Windows Event logs from the endpoint domain– this gives you many opportunities for establishing the context of how attacks are carried out in your network. Third, Sqrrl gives you multiple ways to find emerging threats in your network– in today’s demo, you saw examples of using indicators to find the exploit kit activity and using the stacking technique to identify C2 in network session data. It’s important that your threat hunting platform gives you multiple options and the best tools to carry out your hunts, tools like graph exploration, effective indicator searching, and a power search language.
  15. As shown throughout the webinar, there are multiple benefits to using Sqrrl for detecting threats like command and control. First, Sqrrl isolates attacker tactics, techniques, and procedures with detection analytics, including analytics that can identify beaconing, domain generation algorithms, and tunneling activities related to C2. This gives your organization additional coverage to detect attacker activity and frees up time for your team to hunt for new threats. Second, Sqrrl makes it easy to quickly determine the context of an attack or threat– I showed this earlier during the indicator search demo, where I was able to quickly establish how the compromised website led to the Sundown Exploit Kit, which led to a successful infection. Our linked data model combines a variety of data from multiple data domains, including Proxy logs and Netflow from the network domain and Windows Event logs from the endpoint domain– this gives you many opportunities for establishing the context of how attacks are carried out in your network. Third, Sqrrl gives you multiple ways to find emerging threats in your network– in today’s demo, you saw examples of using indicators to find the exploit kit activity and using the stacking technique to identify C2 in network session data. It’s important that your threat hunting platform gives you multiple options and the best tools to carry out your hunts, tools like graph exploration, effective indicator searching, and a power search language.
  16. As shown throughout the webinar, there are multiple benefits to using Sqrrl for detecting threats like command and control. First, Sqrrl isolates attacker tactics, techniques, and procedures with detection analytics, including analytics that can identify beaconing, domain generation algorithms, and tunneling activities related to C2. This gives your organization additional coverage to detect attacker activity and frees up time for your team to hunt for new threats. Second, Sqrrl makes it easy to quickly determine the context of an attack or threat– I showed this earlier during the indicator search demo, where I was able to quickly establish how the compromised website led to the Sundown Exploit Kit, which led to a successful infection. Our linked data model combines a variety of data from multiple data domains, including Proxy logs and Netflow from the network domain and Windows Event logs from the endpoint domain– this gives you many opportunities for establishing the context of how attacks are carried out in your network. Third, Sqrrl gives you multiple ways to find emerging threats in your network– in today’s demo, you saw examples of using indicators to find the exploit kit activity and using the stacking technique to identify C2 in network session data. It’s important that your threat hunting platform gives you multiple options and the best tools to carry out your hunts, tools like graph exploration, effective indicator searching, and a power search language.
  17. As shown throughout the webinar, there are multiple benefits to using Sqrrl for detecting threats like command and control. First, Sqrrl isolates attacker tactics, techniques, and procedures with detection analytics, including analytics that can identify beaconing, domain generation algorithms, and tunneling activities related to C2. This gives your organization additional coverage to detect attacker activity and frees up time for your team to hunt for new threats. Second, Sqrrl makes it easy to quickly determine the context of an attack or threat– I showed this earlier during the indicator search demo, where I was able to quickly establish how the compromised website led to the Sundown Exploit Kit, which led to a successful infection. Our linked data model combines a variety of data from multiple data domains, including Proxy logs and Netflow from the network domain and Windows Event logs from the endpoint domain– this gives you many opportunities for establishing the context of how attacks are carried out in your network. Third, Sqrrl gives you multiple ways to find emerging threats in your network– in today’s demo, you saw examples of using indicators to find the exploit kit activity and using the stacking technique to identify C2 in network session data. It’s important that your threat hunting platform gives you multiple options and the best tools to carry out your hunts, tools like graph exploration, effective indicator searching, and a power search language.
  18. As shown throughout the webinar, there are multiple benefits to using Sqrrl for detecting threats like command and control. First, Sqrrl isolates attacker tactics, techniques, and procedures with detection analytics, including analytics that can identify beaconing, domain generation algorithms, and tunneling activities related to C2. This gives your organization additional coverage to detect attacker activity and frees up time for your team to hunt for new threats. Second, Sqrrl makes it easy to quickly determine the context of an attack or threat– I showed this earlier during the indicator search demo, where I was able to quickly establish how the compromised website led to the Sundown Exploit Kit, which led to a successful infection. Our linked data model combines a variety of data from multiple data domains, including Proxy logs and Netflow from the network domain and Windows Event logs from the endpoint domain– this gives you many opportunities for establishing the context of how attacks are carried out in your network. Third, Sqrrl gives you multiple ways to find emerging threats in your network– in today’s demo, you saw examples of using indicators to find the exploit kit activity and using the stacking technique to identify C2 in network session data. It’s important that your threat hunting platform gives you multiple options and the best tools to carry out your hunts, tools like graph exploration, effective indicator searching, and a power search language.
  19. As shown throughout the webinar, there are multiple benefits to using Sqrrl for detecting threats like command and control. First, Sqrrl isolates attacker tactics, techniques, and procedures with detection analytics, including analytics that can identify beaconing, domain generation algorithms, and tunneling activities related to C2. This gives your organization additional coverage to detect attacker activity and frees up time for your team to hunt for new threats. Second, Sqrrl makes it easy to quickly determine the context of an attack or threat– I showed this earlier during the indicator search demo, where I was able to quickly establish how the compromised website led to the Sundown Exploit Kit, which led to a successful infection. Our linked data model combines a variety of data from multiple data domains, including Proxy logs and Netflow from the network domain and Windows Event logs from the endpoint domain– this gives you many opportunities for establishing the context of how attacks are carried out in your network. Third, Sqrrl gives you multiple ways to find emerging threats in your network– in today’s demo, you saw examples of using indicators to find the exploit kit activity and using the stacking technique to identify C2 in network session data. It’s important that your threat hunting platform gives you multiple options and the best tools to carry out your hunts, tools like graph exploration, effective indicator searching, and a power search language.
  20. As shown throughout the webinar, there are multiple benefits to using Sqrrl for detecting threats like command and control. First, Sqrrl isolates attacker tactics, techniques, and procedures with detection analytics, including analytics that can identify beaconing, domain generation algorithms, and tunneling activities related to C2. This gives your organization additional coverage to detect attacker activity and frees up time for your team to hunt for new threats. Second, Sqrrl makes it easy to quickly determine the context of an attack or threat– I showed this earlier during the indicator search demo, where I was able to quickly establish how the compromised website led to the Sundown Exploit Kit, which led to a successful infection. Our linked data model combines a variety of data from multiple data domains, including Proxy logs and Netflow from the network domain and Windows Event logs from the endpoint domain– this gives you many opportunities for establishing the context of how attacks are carried out in your network. Third, Sqrrl gives you multiple ways to find emerging threats in your network– in today’s demo, you saw examples of using indicators to find the exploit kit activity and using the stacking technique to identify C2 in network session data. It’s important that your threat hunting platform gives you multiple options and the best tools to carry out your hunts, tools like graph exploration, effective indicator searching, and a power search language.
  21. As shown throughout the webinar, there are multiple benefits to using Sqrrl for detecting threats like command and control. First, Sqrrl isolates attacker tactics, techniques, and procedures with detection analytics, including analytics that can identify beaconing, domain generation algorithms, and tunneling activities related to C2. This gives your organization additional coverage to detect attacker activity and frees up time for your team to hunt for new threats. Second, Sqrrl makes it easy to quickly determine the context of an attack or threat– I showed this earlier during the indicator search demo, where I was able to quickly establish how the compromised website led to the Sundown Exploit Kit, which led to a successful infection. Our linked data model combines a variety of data from multiple data domains, including Proxy logs and Netflow from the network domain and Windows Event logs from the endpoint domain– this gives you many opportunities for establishing the context of how attacks are carried out in your network. Third, Sqrrl gives you multiple ways to find emerging threats in your network– in today’s demo, you saw examples of using indicators to find the exploit kit activity and using the stacking technique to identify C2 in network session data. It’s important that your threat hunting platform gives you multiple options and the best tools to carry out your hunts, tools like graph exploration, effective indicator searching, and a power search language.
  22. As shown throughout the webinar, there are multiple benefits to using Sqrrl for detecting threats like command and control. First, Sqrrl isolates attacker tactics, techniques, and procedures with detection analytics, including analytics that can identify beaconing, domain generation algorithms, and tunneling activities related to C2. This gives your organization additional coverage to detect attacker activity and frees up time for your team to hunt for new threats. Second, Sqrrl makes it easy to quickly determine the context of an attack or threat– I showed this earlier during the indicator search demo, where I was able to quickly establish how the compromised website led to the Sundown Exploit Kit, which led to a successful infection. Our linked data model combines a variety of data from multiple data domains, including Proxy logs and Netflow from the network domain and Windows Event logs from the endpoint domain– this gives you many opportunities for establishing the context of how attacks are carried out in your network. Third, Sqrrl gives you multiple ways to find emerging threats in your network– in today’s demo, you saw examples of using indicators to find the exploit kit activity and using the stacking technique to identify C2 in network session data. It’s important that your threat hunting platform gives you multiple options and the best tools to carry out your hunts, tools like graph exploration, effective indicator searching, and a power search language.
  23. As shown throughout the webinar, there are multiple benefits to using Sqrrl for detecting threats like command and control. First, Sqrrl isolates attacker tactics, techniques, and procedures with detection analytics, including analytics that can identify beaconing, domain generation algorithms, and tunneling activities related to C2. This gives your organization additional coverage to detect attacker activity and frees up time for your team to hunt for new threats. Second, Sqrrl makes it easy to quickly determine the context of an attack or threat– I showed this earlier during the indicator search demo, where I was able to quickly establish how the compromised website led to the Sundown Exploit Kit, which led to a successful infection. Our linked data model combines a variety of data from multiple data domains, including Proxy logs and Netflow from the network domain and Windows Event logs from the endpoint domain– this gives you many opportunities for establishing the context of how attacks are carried out in your network. Third, Sqrrl gives you multiple ways to find emerging threats in your network– in today’s demo, you saw examples of using indicators to find the exploit kit activity and using the stacking technique to identify C2 in network session data. It’s important that your threat hunting platform gives you multiple options and the best tools to carry out your hunts, tools like graph exploration, effective indicator searching, and a power search language.
  24. As shown throughout the webinar, there are multiple benefits to using Sqrrl for detecting threats like command and control. First, Sqrrl isolates attacker tactics, techniques, and procedures with detection analytics, including analytics that can identify beaconing, domain generation algorithms, and tunneling activities related to C2. This gives your organization additional coverage to detect attacker activity and frees up time for your team to hunt for new threats. Second, Sqrrl makes it easy to quickly determine the context of an attack or threat– I showed this earlier during the indicator search demo, where I was able to quickly establish how the compromised website led to the Sundown Exploit Kit, which led to a successful infection. Our linked data model combines a variety of data from multiple data domains, including Proxy logs and Netflow from the network domain and Windows Event logs from the endpoint domain– this gives you many opportunities for establishing the context of how attacks are carried out in your network. Third, Sqrrl gives you multiple ways to find emerging threats in your network– in today’s demo, you saw examples of using indicators to find the exploit kit activity and using the stacking technique to identify C2 in network session data. It’s important that your threat hunting platform gives you multiple options and the best tools to carry out your hunts, tools like graph exploration, effective indicator searching, and a power search language.
  25. As shown throughout the webinar, there are multiple benefits to using Sqrrl for detecting threats like command and control. First, Sqrrl isolates attacker tactics, techniques, and procedures with detection analytics, including analytics that can identify beaconing, domain generation algorithms, and tunneling activities related to C2. This gives your organization additional coverage to detect attacker activity and frees up time for your team to hunt for new threats. Second, Sqrrl makes it easy to quickly determine the context of an attack or threat– I showed this earlier during the indicator search demo, where I was able to quickly establish how the compromised website led to the Sundown Exploit Kit, which led to a successful infection. Our linked data model combines a variety of data from multiple data domains, including Proxy logs and Netflow from the network domain and Windows Event logs from the endpoint domain– this gives you many opportunities for establishing the context of how attacks are carried out in your network. Third, Sqrrl gives you multiple ways to find emerging threats in your network– in today’s demo, you saw examples of using indicators to find the exploit kit activity and using the stacking technique to identify C2 in network session data. It’s important that your threat hunting platform gives you multiple options and the best tools to carry out your hunts, tools like graph exploration, effective indicator searching, and a power search language.
  26. As shown throughout the webinar, there are multiple benefits to using Sqrrl for detecting threats like command and control. First, Sqrrl isolates attacker tactics, techniques, and procedures with detection analytics, including analytics that can identify beaconing, domain generation algorithms, and tunneling activities related to C2. This gives your organization additional coverage to detect attacker activity and frees up time for your team to hunt for new threats. Second, Sqrrl makes it easy to quickly determine the context of an attack or threat– I showed this earlier during the indicator search demo, where I was able to quickly establish how the compromised website led to the Sundown Exploit Kit, which led to a successful infection. Our linked data model combines a variety of data from multiple data domains, including Proxy logs and Netflow from the network domain and Windows Event logs from the endpoint domain– this gives you many opportunities for establishing the context of how attacks are carried out in your network. Third, Sqrrl gives you multiple ways to find emerging threats in your network– in today’s demo, you saw examples of using indicators to find the exploit kit activity and using the stacking technique to identify C2 in network session data. It’s important that your threat hunting platform gives you multiple options and the best tools to carry out your hunts, tools like graph exploration, effective indicator searching, and a power search language.