CrowdStrike Training PDF
CrowdStrike Training PDF
TRAINING
Pattadon M.
▪ Overview
▪ Administrator
AGENDA ▪ Responder
▪ Hunter
▪ Integrator
CROWDSTRIKE
Overview
OUTMODED DEFENSES
32% PREVENTION
68% HIGH
HARDER TO PREVENT
MALWARE
& DETECT
LOW
THREAT
SOPHISTICATION
LOW
NON-MALWARE
ATTACKS
HIGH
TERRORISTS HACKTIVISTS/ CYBER- ORGANIZED NATION-
VIGILANTES CRIMINALS CRIMINAL GANGS STATES
2020 CROWDSTRIKE, INC. AL L RIGHTS RESERVED.
Overview
Proactive
Threat Hunting
PROTECTION
SIEM Correlation
TECHNIQUES Behavioral Analysis
Threat Hunting
Exploit Blocking
Signatures Reputation Sandbox Host IPS
IOCs/Blacklisting Machine Learning
Machine Learning Whitelisting
DIFFICUL TY
ATTA CK
SOPHISTICA TION
FILE BASED MALWARE FILELESS AND EXPLOITS LIVE ATTACKER/INSIDER
Malware Zero-Day Exploitation of Zero-Day Credential Living off Hands-on
Malware vulnerabilities Malware Theft the land keyboard
CROWDSTRIKE
Overview
Initial Access Execution Persistence Privilege Defense Credential Discovery Lateral Collection Exfiltration Command & Impact
Escalation Evasion Access Movement Control
Clouds Identities
Endpoints
Active Directory
Data Centers
Workstations Mobile
User Accounts
BUSINESS VALUE
Improves protection
Machine Block
Learning Known Bad
Reduces number of
incidents
Reduces complexity
135 MILLION
IOA DECISIONS/MIN
5 TRILLION+
EVENTS/WEEK
150+
ADVERSARIES
TRACKED
BUSINESS VALUE
Reduce time-to-respond
Real-time and Record
Historical Everything
Search Improve SOC
productivity
Reduced time
to remediation
Augment skills and
expertise
Real-time Reduce risk
Response and Threat
Containment Hunting
Gain security efficiency
and efficacy
COLLECT INFO
Network
Processes File System Registry Activities Memory OS Events
TAKE ACTION
1 2 3
No infrastructure No fine-tuning, Install the Verify the No reboot No signatures No scan Remove legacy
setup rule writing Falcon Agent installation updates products
https://falcon.us-2.crowdstrike.com/
ts01-gyr-maverick.cloudsink.net: 443
lfodown01-gyr-maverick.cloudsink.net: 443
Dashboards
Host Mgmt.
Machine learning
Malicious behavior
Incidents
Host search
Event search
Threat hunting
Workflows
Automating actions
- Notifications
- Get/remove files
- Retrieve connection
- Retrieve processes
- Contain hosts
- Context enrichment
▪ Set up users
▪ Configure alerts
▪ Install sensors
Set up users
Set up users
https://falcon.us-
2.crowdstrike.com/document
ation/74/users-and-roles
Configuration >
General Settings
Configuration >
Workflows
Configuration >
Workflows
Host group
Prevention Policy
Host
Sensor Update Policy
Response Policy
Firewall Policy
Recommend
Create one policy used for uninstallation
Response Policy
Exclusions
Create exclusion
Create exclusion
Use **\HiveNightmare.exe
for exclude HiveNightmare.exe
ts01-gyr-maverick.cloudsink.net: 443
lfodown01-gyr-maverick.cloudsink.net: 443
ts01-gyr-maverick.cloudsink.net
US-2: falcon.us-2.crowdstrike.com
lfodown01-gyr-maverick.cloudsink.net
If you have SSL encryption, SSL decrypt, or any deep packet inspection…
You need to set up a bypass for all that traffic.
Sensor Downloads
123456789012-A0
123456789012-A0
Proxy Configuration
Uninstall
CSUninstallTool.exe
Directory: C:\windows\system32drivers\crowdstrike
Registry Key: HKLM\System\CrowdStrike
Host Management
Sensor Downloads
123456789012-A0
4. Provide CID
sudo
/Applications/Falcon.app/Contents/Resources/fal
conctl license 123456-A0
123456789012-A0
123456789012-A0
Host Management
Sensor Downloads
123456789012-A0
4. Provide CID
sudo /Applications/Falcon.app/Contents/Resources/falconctl license 123456-A0
Delete host
Hosts > Host Management
Select host and delete
Sensor Downloads
Ubuntu
sudo dpkg -i <installer>
RHEL, CentOS, Amazon Linux
sudo yum install <installer>
SLES
sudo zypper install <installer>
Ubuntu
6. Confirm that sensor is running service falcon-sensor start
RHEL, CentOS
ps -e | grep falcon-sensor systemctl start falcon-sensor
Proxy Configuration
Uninstall
Ubuntu
sudo apt-get purge falcon-sensor
RHEL, CentOS, Amazon Linux
sudo yum remove falcon-sensor
SLES
sudo zipper remove falcon-sensor
Detections
Detections
File-based
Detections
File-based
Detections
File-based
Detections
File-based
Quarantine
Detections
Fileless
Detections
Fileless
Detections
Fileless
IOA Exclusion
RTR
RTR
Containment
Contain an infected host
Incidents
Host Search
User Search
Hunt
Event Search
Event Search
Show me any instances of common reconnaissance tools
event_simpleName=ProcessRollup2 (FileName=net.exe OR FileName=ipconfig.exe
OR FileName=whoami.exe OR FileName=quser.exe OR FileName=ping.exe OR
FileName=netstat.exe OR FileName=tasklist.exe OR FileName=Hostname.exe OR
FileName=at.exe) | table ComputerName UserName FileName CommandLine
Show me processes that only ran a few of times
event_simpleName=ProcessRollup2 OR event_simpleName=SyntheticProcessRollup2
| stats count by SHA256HashData ImageFileName ComputerName UserName |
where count <5 | sort – count
Support >
API Clients and Keys
TESTCASES
Technique Test
TESTCASES
Technique Test