Network Threats

Most malware performs command-and-control operations over the network

Threat hunters search trough network traffic for potentially malicious content

A list of listening ports on the network is extremely valuable for threat hunting (SMTP, HTTP, FTP and proxy servers)

External monitoring servers may also be set up to aid in traffic monitoring

Concepts

Understanding fundamental networking concepts is an essential skill for a threat hunter

Malware frequently abuses common protocols to communicate with their controlling servers

Important concepts include:

  • The networking stack (TCP, UDP, ICMP and IP)

  • Common protocols (DNS, HTTP, etc)

  • How common protocols should (and shouldn't) be used

Understanding what's "normal" helps with identifying important anomalies

Devices and communications

When threat hunting, no device on the network should be ignored

Attackers may move laterally within the network to search for additional data, cover their tracks or achieve persistence

A complete network diagram detailing devices on the network and their expected operations (webserver, email server, workstation, etc) is huge asset to a threat hunter

  • This information helps differentiate a malicious anomaly from the noise

Session recording

Recording data at the session or flow level can be valuable for statistical and trends analysis

Windows

  • TDIMon

Linux/Unix

  • Argus

Packet capture

Hunters may use various tools for capturing data packets for in-depth analysis of traffic

Windows

  • Windump

  • Wireshark/Ethereal

Linux/Unix

  • tcpdump

  • Wireshark/Ethereal

Network state monitoring

Network state monitoring tools allow hunters to easily view active TCP/UDP endpoints and their connection statuses

Windows

  • tcpvcon

  • Netstat

  • Fport

Linux/Unix

  • lsof

  • Netstat

Last updated