Sophie Chen
ResumeLinkedInGitHubBluesky
Work
Work
  • Work
  • Digital Forensics Lab
    • 1 Setting Up
    • 2 Basic Computer Skills for Digital Forensics
      • 2.1 Number Systems
      • 2.2 PC Introduction
      • 2.3 Windows Command Line Tutorial
      • 2.4 Linux Command Line Tutorial
      • 2.5 Advanced Linux Command Line Tutorial
    • 3 Basic Networking Skills for Digital Forensics
      • 3.1 HTTP Analysis using Wireshark 1
      • 3.2 HTTP Analysis using Wireshark 2
      • 3.3 SYN Flood Attack Investigation using tshark
      • 3.4 SMTP Forensics
      • 3.5 ARP Poisoning Forensics
      • 3.6 Firewall
      • 3.7 DNS Introduction
      • 3.8 DNS Spoofing Forensics
      • 3.9 WEP40 Wireless Aircrack
    • 4 Computer and Digital Forensics
      • 4.1 Introduction to Digital Forensics
      • 4.2 Sleuth Kit Tutorial
      • 4.3 USB Image Acquisition
      • 4.4 Evidence Search - A Pattern Match Game
      • 4.5 Evidence Search - File Metadata
      • 4.6 Data Carving
      • 4.7 Steganography
      • 4.8 Forensic Report Template
    • 5 Computer Forensics Case Studies
      • 5.1 Investigating NIST Data Leakage
        • 5.1.1 Environment Setting Up
        • 5.1.2 Windows Registry
        • 5.1.3 Windows Event and XML
        • 5.1.4 Web History and SQL
        • 5.1.5 Email Investigation
        • 5.1.6 File Change History and USN Journal
        • 5.1.7 Network Evidence and shellbag
        • 5.1.8 Network Drive and Cloud
        • 5.1.9 Master File Table ($MFT) and Log File ($logFile) Analysis
        • 5.1.10 Windows Search History
        • 5.1.11 Windows Volume Shadow Copy Analysis/SQL database carving
        • 5.1.12 Recycle Bin and Anti-Forensics
        • 5.1.13 Data Carving
        • 5.1.14 Crack Windows Passwords
      • 5.2 Investigating P2P Data Leakage
        • 5.2.1 Lab Environment Setting Up
        • 5.2.2 Disk Image and Partitions
        • 5.2.3 Windows Registry and File Directory
        • 5.2.4 MFT Timeline
        • 5.2.5 USN Journal Timeline
        • 5.2.6 uTorrent Log File
        • 5.2.7 File Signature
        • 5.2.8 Emails
        • 5.2.9 Web History
        • 5.2.10 Website Analysis
        • 5.2.11 Timeline (Summary)
      • 5.3 Investigating Illegal Possession of Images
        • 5.3.1 Review HTTP Analysis using Wireshark (text)
        • 5.3.2 Rhion Possession Investigation 1: File recovering
        • 5.3.3 Rhion Possession Investigation 2: Steganography
        • 5.3.4 Rhion Possession Investigation 3: Extract Evidence from FTP Traffic
        • 5.3.5 Rhion Possession Investigation 4: Extract Evidence from HTTP Traffic
      • 5.4 Investigating Email Harassment
        • 5.4.1 Investigating Harassment Email using Wireshark
        • 5.4.2 t-shark Forensic Introduction
        • 5.4.3 Investigating Harassment Email using t-shark
      • 5.5 Investigating Illegal File Transferring
      • 5.6 Investigating Hacking Case
      • 5.7 Investigating Morris Worm Attack
        • 5.7.1 Morris Worm Attack
        • 5.7.2 Investigating Morris Worm Attack
    • 6 Mobile/IoT Forensics Case Studies
      • 6.1 Investigating Echo Show 8
        • 6.1.1 Echo Show Introduction
        • 6.1.2 Echo Show Evidence Planting
        • 6.1.3 Device Teardown and eMMC Chip-off
        • 6.1.4 Image Acquisition and Mounting
        • 6.1.5 Specifications: Device and OS Info
        • 6.1.6 Specifications: User Info
        • 6.1.7 Specifications: Network Connectivity Info
        • 6.1.8 Web Activity
        • 6.1.9 Phone Communication
        • 6.1.10 Multimedia: Photos and related Data
        • 6.1.11 Multimedia: Videos and related Data
        • 6.1.12 Multimedia: Audio and related Data
      • 6.2 Investigating Android 10
        • 6.2.1 Intro Pixel 3
        • 6.2.2 Pixel 3 Image
        • 6.2.3 Pixel 3 Device
        • 6.2.4 Pixel 3 System Setting
        • 6.2.5 Overview: App Life Cycle
        • 6.2.6 AOSP App Investigations: Messaging
        • 6.2.7 AOSP App Investigations: Contacts
        • 6.2.8 AOSP App Investigations: Calendar
        • 6.2.9 GMS App Investigations: Messaging
        • 6.2.10 GMS App Investigations: Dialer
        • 6.2.11 GMS App Investigations: Maps
        • 6.2.12 GMS App Investigations: Photos
        • 6.2.13 Third-Party App Investigations: Kik
        • 6.2.14 Third-Party App Investigations: textnow
        • 6.2.15 Third-Party App Investigations: whatapp
        • 6.2.16 Pixel 3 Rooting
      • 6.3 Investigating iPhone iOS 13.4.1
        • 6.3.1 Intro Intro iPhone iOS 13
        • 6.3.2 iOS 13.4.1 Image
        • 6.3.3 iPhone Device Investigation
        • 6.3.4 iOS System Settings
        • 6.3.5 Overview of App Life Cycle
        • 6.3.6 Messages Investigations
        • 6.3.7 Contacts Investigations
        • 6.3.8 Calendar Investigations
        • 6.3.9 Safari Investigations
        • 6.3.10 Photo Investigations
        • 6.3.11 KnowledgeC Investigations
        • 6.3.12 Health Investigations
        • 6.3.13 Location Investigations
        • 6.3.14 Cellebrite Investigations
        • 6.3.15 Magnet Axiom Investigations
        • 6.3.16 Jailbreak Investigations
      • 6.4 Investigating Drone DJI
        • 6.4.1 DJI Mavic Air Mobile
        • 6.4.2 DJI Mavic Air MicroSD Raw
        • 6.4.3 DJI Mavic Air MicroSD Encase Format
  • CTF Walkthroughs
    • Hack The Box
      • Linux Fundamentals
      • Windows Fundamentals
    • TryHackMe
      • Linux Fundamentals Part 1
      • Linux Fundamentals Part 2
      • Linux Fundamentals Part 3
      • Introductory Networking
      • HTTP in Detail
      • DNS in Detail
      • Intro to Cyber Threat Intel
      • Threat Intelligence Tools
      • MAL: Malware Introductory
      • Intro to Digital Forensics
      • Digital Forensics Case B4DM755
  • Multithreaded Network File Server
  • Thread Library
  • Virtual Memory Pager
Powered by GitBook
On this page
  • Task 1: Introduction
  • Task 2: Cyber Threat Intelligence
  • Task 3: CTI Lifecycle
  • Task 4: CTI Standards & Frameworks
  • Task 5: Practical Analysis
  1. CTF Walkthroughs
  2. TryHackMe

Intro to Cyber Threat Intel


Task 1: Introduction

This room introduces us to the basics of cyber threat intelligence. In this room, we will learn:

  • The basics of CTI and its various classifications

  • The lifecycle followed to deploy and use intelligence during threat investigations

  • Frameworks and standards used in distributing intelligence

Task 2: Cyber Threat Intelligence

Cyber Threat Intelligence (CTI) is evidence-based knowledge about adversaries, including their indicators, tactics, motivations, and actionable advice against them.

Intelligence is the correlation of data and information to extract patterns of actions based on contextual analysis. Threat intelligence can be gathered internally, from the community forums, or from external sources such as public sources and threat intelligence feeds.

There are a few different types of intelligence:

  • Strategic intel: Looks into the organization's threat landscape and maps out risk areas

  • Technical intel: Looks into evidence and artifacts of an attack performed by an adversary

  • Tactical intel: Assesses adversaries' tactics, techniques, and procedures (TTPs)

  • Operational intel: Looks into the adversary's motives and intent to attack

What does CTI stand for?

Cyber Threat Intelligence

CTI is short for cyber threat intelligence, a subfield of cybersecurity that focuses on intelligence about adversaries.

IP addresses, Hashes and other threat artifacts would be found under which Threat Intelligence classification?

technical intel

Technical intelligence includes specific artifacts and evidence on system, such as IP addresses and hashes.

Task 3: CTI Lifecycle

Cyber threat intelligence follows six, cyclic steps that form a feedback process loop.

  1. Planning & direction: Define objectives and goals and identify crucial parameters such as information assets, tools, sources of intelligence, etc.

  2. Collection: Gather the required data to address objectives

  3. Processing: Extract, sort, organize, and correlate data to present it in a usable and understandable format

  4. Analysis: Derive insights from the data and potentially investigate a threat or strengthen security controls

  5. Dissemination: Disseminate intelligence to stakeholders

  6. Feedback: Seek feedback from stakeholders

At which phase of the CTI lifecycle is data converted into usable formats through sorting, organizing, correlation and presentation?

processing

Processing is the phase where raw data is converted into understandable insights.

During which phase do security analysts get the chance to define the questions to investigate incidents?

direction

Defining questions to investigate incidents should happen at the first phase (direction), of the CTI lifecycle.

Task 4: CTI Standards & Frameworks

Standards and frameworks in CTI allow for common terminology and the distribution of threat intelligence across the industry. Common frameworks include:

  • MITRE ATT&CK: A knowledge base of adversary behavior, focusing on indicators and tactics

  • TAXII: Defines two models, collection and channel, for exchanging threat intelligence

  • STIX: Provides relationships between threat information such as attack campaigns, indicators, etc.

  • Cyber Kill Chain: Breaks down adversary into 7 steps: (1) reconnaissance, (2) weaponization, (3) delivery, (4) exploitation, (5) installation, (6) command and control, and (7) actions on objectives

  • The Diamond Model: Looks at intrusion analysis and tracking attack groups over time using four key areas: (1) adversary, (2) victim, (3) infrastructure, and (4) capabilities

What sharing models are supported by TAXII?

Collection and Channel

The collection model makes threat intelligence available upon request by users while the channel model pushes threat intelligence to users from a central server.

When an adversary has obtained access to a network and is extracting data, what phase of the kill chain are they on?

Actions on Objectives

After obtaining access and extracting data, the adversary has already established control over the system. Thus, they are on the last phase of the kill chain: actions on objectives.

Task 5: Practical Analysis

Open the site associated with the task to answer the following questions.

What was the source email address?

vipivillain@badbank.com

Notice the alert described as "Email received by John Doe from vipivillain@badbank.com".

What was the name of the file downloaded?

flbpfuh.exe

Notice the alert described as "File download initiated by John Doe. File name: flbpfuh.exe"

After building the threat profile, what message do you receive?

THM{NOW_I_CAN_CTI}

Scroll down and click on each question in a white box. After answering all questions, the flag pops up.

Last updated 4 months ago