Module 1 - Introduction To Network Hunting
Module 1 - Introduction To Network Hunting
1 Introduction
After using CTI to aid you in the hunt where would you begin
looking for threats? You’ll look at the network through
network analysis to find any signs of a threat.
Network
Keep in mind that alerts can also arise within the SIEM as well
which will be visible to the IT Security Team. So the
notification can come from within the IT Security Team in
addition to the Network Team.
These packets are broken up at the source host and they are
reconstructed at the receiving host. These packets contain a
header and is followed by the payload.
This will ensure that the receiving host can correctly interpret
the payload and handle the overall communication.
You can find more information regarding the OSI model here.
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved
OSI & TCP/IP MODEL
You can read more about the TCP/IP and how it relates to the
OSI model here.
In the same way as routers, which work with IP addresses, switches work
with MAC addresses.
That means you should be very familiar with the network infrastructure,
different network segments, IP addressing scheme, any specific internal
network rules, egress points, etc. as mentioned before.
Within the next module we’ll use these tools and analyze
different variations of network traffic.
You can also use an Inline Network Tap. This type of tap would be
inserted ‘inline’ between to physically network devices, such as a
firewall and a switch.
MAC Flooding is meant to stress the switch and fill its CAM
table. When the space in the CAM table is filled with fake
MAC addresses the switch can no longer learn new MAC
addresses. The only way to keep the network alive is to
forward the frames meant to be delivered to the unknown
MAC address on all ports of the switch, thus making it fail
open and act like a hub.
Many other packet sniffing and analysis tools that are based
on libpcap were created for special functions, such as:
tcpflow and ngrep. There are many libpcap-based tools but
we are only focusing on the most popular within this course.
This means that you can use it to analyze every packet, traffic
stream, or connection that hits your computer’s network
interface(s).
On the main screen you can select the interface you would
like to use to capture network traffic and you can also enter
any filters you would like to narrow down the specific traffic
you would like capture.
It should also be noted that other tools are bundled within the
Wireshark distribution, such as tshark and dumpcap.
Both of these tools are command-line based tools and can be used
to capture packets.
Much like Wireshark, tcpdump has the ability to filter traffic and
save packets to a file for later analysis.
The best way to learn more about it is by going through its man
page.
You can see list of BPF syntax here. Also check out these
display filter cheat sheets for tcpdump and Wireshark.
Display Filters
Display Filters (tcpdump)
(Wireshark)
Threat Hunting - © Caendra Inc 2017 - All Rights Reserved