Blue Team Tools For SOC Analysts
Blue Team Tools For SOC Analysts
Blue Team Tools For SOC Analysts
Tools
for SOC Analysts
Table of
Contents
03 Procmon
04 Volatility
05 Caldera
06 Wireshark
07 Immunity
Debugger
letsdefend.io
PROC M ON
V OL A TIL ITY
Volatility is a tool that enables the analysis of memory dumps taken from
a compromised machine during the incident response process. Volatility is
one of the memory dump analysis tools that should be used when it is
desired to analyze the memory dump instead of performing memory
analysis on the live machine. Volatility is written in python and runs on the
command line. With this tool, memory dump analysis of both Windows
and Linux machines can be done. It is an important tool used to detect
malicious process activities on systems. The modules, it contains, enables
the carrying out of the analysis process in a target-oriented manner. For
example, it provides the analyst with important information such as which
processes are running on the system, which subprocesses these
processes are connected to, and which process is running which command
on the command line.
Volatility: https://www.volatilityfoundation.org/
To perform an analysis of a hacked system with Volatility:
https://app.letsdefend.io/training/lessons/memory-forensics
letsdefend.io
C A L D E RA
Caldera: https://caldera.mitre.org/
letsdefend.io
W IRE S H A RK
If you want to use Wireshark as a SOC Analyst, you can follow this free
hands-on course: https://app.letsdefend.io/training/lessons/malware-
traffic-analysis-with-wireshark
letsdefend.io
IM M U N ITY D E BU G G E R
The Immunity Debugger tool is a tool with a graphical user interface (GUI).
An example image of the Immunity Debugger tool is as follows: