Must-Have Tools For SOC Analysts - TCM Security
Must-Have Tools For SOC Analysts - TCM Security
com/
MUST-
HAVE
TOOLS FOR
SOC
ANALYSTS
Andrew Prince
TCM Blue Team
Expert
https://certifications.tcm-sec.com/
Tcpdump
This is a popular command-line tool that captures
network packets in real time. It’s lightweight,
ubiquitous (as it’s found on most systems), and can
handle very high network throughput. It also allows
for filtering and capturing only the traffic of
interest, making it useful for high-traffic
environments.
Wireshark
Wireshark is a more graphic-based and feature-rich
tool that allows users to capture and analyze
packets in great detail. While it is not as lightweight
as tcpdump (and unsuitable for high throughput
environments), its user-friendly interface makes it
one of the most popular choices for network traffic-
related tasks. However, rather than traffic
acquisition, it’s more often used for in-depth
inspection of individual packets, conversations, and
protocols.
https://certifications.tcm-sec.com/
NETWORK TRAFFIC
ANALYSIS TOOLS
Network traffic analysis tools help analysts
sift through large amounts of acquired traffic
data to identify interesting artifacts,
summarize statistics, or dig into protocols
and packet data. Additionally, these tools
often allow for deep inspection and
correlation of network traffic, which can be a
very useful way to retrace an attack timeline.
https://certifications.tcm-sec.com/
NETWORK TRAFFIC
ANALYSIS TOOLS
Popular network traffic analysis tools include:
Wireshark, again!
This is one of the most widely used network protocol
analyzers. It provides a graphical interface and several
statistical features for analyzing network packets,
conversations, and packet contents in detail.
NETWORK
DETECTION TOOLS
Network detection tools focus on identifying and
flagging suspicious or malicious behavior based on
traffic patterns and flow data. Having and
maintaining a network detection solution is an
important part of a SOC’s monitoring capability, as
it allows for real-time identification of potential
intrusions.
Snort
Snort is an open-source intrusion detection system
(IDS) that can also function as an intrusion
prevention system (IPS). It analyzes network traffic
in real time and matches it against a configurable
signature database to identify known attack
patterns.
https://certifications.tcm-sec.com/
NETWORK
DETECTION TOOLS
Suricata
Suricata is an additional network IDS/IPS that can
perform real-time traffic analysis and intrusion
detection. Like Snort, it matches network traffic to
known attack signatures and offers additional
advanced features such as multi-threading and flow
capture.
SYSTEMS-RELATED
EVIDENCE
A complement to network visibility is system-related
evidence, which is a broad category of data that provides
important context for investigations and is often
necessary to uncover the full scope of an attack timeline.
This category of evidence includes operating system logs,
authentication logs, and various other system-level
artifacts that give us insight into what’s happening on
individual endpoints within the network.
SYSTEMS-RELATED
EVIDENCE
Sysmon Logs
Sysmon enhances the verbosity of system monitoring. With
a good Sysmon configuration, we can gain access to much
more detailed visibility into the happenings on a Windows
system, specifically around process creations, network
connections, API calls, and changes to file creation
timestamps. Sysmon configurations and exclusions are
highly customizable and provide SOCs invaluable evidence
for tracking an attacker’s actions within an environment.
SYSTEMS-RELATED
EVIDENCE
Many system utilities have been developed that aid
forensic investigations and threat hunting, as they help
analysts gain detailed insights into the behavior, state,
and configuration of a system. Analysts should know how
to effectively use these tools to interpret the data they
provide in the context of security incidents.
Sysinternals Suite
The Sysinternals Suite is a powerful collection of system
utilities developed by Microsoft, often used to investigate
and analyze Windows-based systems. Various tools from
this suite can provide us with real-time insights into
system activity, processes, file systems, registry changes,
and network activity. Check out the examples on the next
page.
https://certifications.tcm-sec.com/
SYSTEMS-RELATED
EVIDENCE
Process Explorer
This tool provides detailed information about running
processes, including their memory usage, handles, and
associated binaries. It is useful for identifying suspicious
or unknown processes running on a system, identifying
process parent-child relationships, and correlating them
to additional activity occurring over the network.
Autoruns
Oftentimes, attackers will implant persistence
mechanisms on compromised systems to maintain access
or continue executing malware after initial detection. The
Autoruns utility effectively identifies what programs are
set to run automatically when a system starts through
common registry locations, services, scheduled tasks, and
more. The baseline detection capabilities can hint at
potential persistence mechanisms or malicious
configurations that aren’t usually present and warrant
further investigation.
https://certifications.tcm-sec.com/
DISK-RELATED EVIDENCE
Effective SOC Analysts should be comfortable with
collecting and analyzing disk-related artifacts for
incident investigations. Disk-based evidence gives
us much more endpoint-level visibility and can
provide deeper insights into indicators of malicious
activity on individual systems.
FTK Imager
FTK Imager is one of the most commonly used acquisition
tools in forensic investigations. It creates exact disk
images in a forensically sound manner, supports different
formats, and captures the data without altering the
original media. It also provides capabilities for previewing
files, carving deleted data, and generating hashes for
verifying integrity.
dd
dd is a command-line tool widely used in Unix-based
environments that allows for raw disk cloning. dd is often
used in incident response scenarios due to its lightweight
nature and ability to perform raw cloning at scale.
However, it comes with fewer safeguards compared to
more specialized tools like FTK Imager.
https://certifications.tcm-sec.com/
MEMORY-RELATED EVIDENCE
Memory-related evidence also plays an increasing role in
modern incident response and forensic investigations.
Volatile memory, or RAM, contains artifacts about the state
of a system at any given time, including running processes,
open network connections, user activity, volatile
configurations, and more. Unlike persistent disk-based
evidence, which typically remains on a system even after a
reboot, memory evidence is often lost once a system is
powered off.
WinPMEM
As the name suggests, WinPMEM is a widely used
tool for acquiring live memory on Windows
systems. As with all memory capture tools, it
creates a memory dump file, which can be
analyzed later to identify artifacts related to
processes, network activity, and other evidence,
all of which are handy when building an attack
timeline.
https://certifications.tcm-sec.com/
Redline
Developed by FireEye, Redline is a GUI-based
memory and host forensic tool that can analyze
memory dumps, disk images, and system
information.
https://certifications.tcm-sec.com/
THREAT INTELLIGENCE-
RELATED EVIDENCE
Lastly, the most effective evidence sources aren’t limited
to only what is inside our networks. Threat intelligence-
related evidence is extremely useful in helping SOC
Analysts detect, investigate, and better understand
threats by providing context on the nature of the attack.
Threat intelligence includes information about the tactics,
techniques, and procedures (TTPs) used by attackers, as
well as data about indicators of compromise (IOCs) from
documented attacks, such as IP addresses, domains, URLs,
and email addresses.
REPUTATION TOOLS
One of the most crucial aspects of threat intelligence is
understanding the reputation of certain entities within the
network. Reputation tools help assess the trustworthiness
of file or network elements, such as domains, IP
addresses, URLs, and email addresses by checking their
historical involvement in malicious activity.
Some popular reputation tools include:
VirusTotal
As essentially the Swiss army knife for any analyst,
VirusTotal is a widely used tool that aggregates results
from multiple antivirus engines and scanning tools to
analyze files, URLs, and IP addresses for potential threats.
It helps analysts quickly assess the disposition of a given
file, hash value, or link by providing a comprehensive
report of how different security vendors classify it.
https://certifications.tcm-sec.com/
REPUTATION TOOLS
Cisco Talos
In a similar realm, Cisco Talos is a leading provider of threat
intelligence that offers insights into domains, IP addresses, URLs,
and other indicators of compromise (IOCs).
DomainTools
DomainTools is a powerful tool for domain and IP address
research. It provides historical and real-time data about domain
ownership, registration details, and network associations, which
can help analysts uncover suspicious activity or malicious
dispositions tied to specific domains or IP addresses.
MxToolbox
MxToolbox offers a range of network and email diagnostic tools,
including checks for DNS records, blacklists, and email headers. It
is commonly used for investigating suspicious domains, email
activity, and verifying if an entity is listed on blacklists.
URLScan
URLScan is a tool that scans and analyzes URLs to assess their
security risk. It is commonly used to identify malicious websites,
phishing attempts, and suspicious links.