https://www.itu.int/en/ITU-D/Cybersecurity/Documents/CyberDrill-2020/Cyber%20Threat%20Hunting%20Workshop%20-%20ITU%2019112020.pdfarrow-up-right
其中2019 BlackHat Arsenal的SysmonHunter以Github得到1294顆星星名列第四,https://github.com/baronpan/SysmonHunterarrow-up-right
Preliminary study
EvtxToElk: A Python Module to Load Windows Event Logs into ElasticSearch, https://www.dragos.com/blog/industry-news/evtxtoelk-a-python-module-to-load-windows-event-logs-into-elasticsearch/arrow-up-right
(Medium) LogonTracer is a tool to investigate malicious logon by visualizing and analyzing Windows Active Directory event logs. https://github.com/JPCERTCC/LogonTracerarrow-up-right
(Easy-Medium) Analyzing Packet Captures with Python, https://vnetman.github.io/pcap/python/pyshark/scapy/libpcap/2018/10/25/analyzing-packet-captures-with-python-part-1.htmlarrow-up-right
(Easy) Using Python Pandas for Log Analysis, https://akshayranganath.github.io/Using-Python-Pandas-for-Log-Analysis/arrow-up-right
Hacking communities in the deep web [updated 2021], https://resources.infosecinstitute.com/topic/hacking-communities-in-the-deep-web/arrow-up-right
How to Elastic SIEM (part 1), https://itnext.io/how-to-elastic-siem-part-1-a39167b8bd23arrow-up-right
(*) Detecting Signs of Ransomware: WannaCry and the Elastic Stack, https://www.elastic.co/blog/malware-analysis-wannacry-elastic-stackarrow-up-right
Elastcisearch, WannaCry在系統惡意行為(1~2 teams)-> Threat Hunting
Threat Hunting with Windows Event Logs & Sysmon, https://www.netscylla.com/blog/2020/02/01/Threat-hunting-with-Windows-Event-Logs.htmlarrow-up-right
Windows EVTX Samples [200 EVTX examples]:, https://github.com/sbousseaden/EVTX-ATTACK-SAMPLESarrow-up-right
(*) A Python package to interact with MITRE ATT&CK Frameworks, https://github.com/swimlane/pyattckarrow-up-right
ThreatHunting-book, https://github.com/12306Bro/Threathunting-bookarrow-up-right
Learning the Associations of MITRE ATT&CK Adversarial Techniques, https://arxiv.org/pdf/2005.01654.pdfarrow-up-right
EVTX2CSV: https://github.com/jeriel20?tab=repositoriesarrow-up-right
EVTX2XML: https://www.alishaaneja.com/evtx/arrow-up-right
https://superuser.com/questions/1332580/is-there-a-powershell-way-to-convert-evt-to-csvarrow-up-right
docker下安装elasticSearch报错:[1]: max virtual memory areas vm.max_map_count [65530] is too low
系統實測
下載VM(Ubuntu 16.04 Desktop)
https://drive.google.com/drive/u/0/folders/1lXVJmMEvdYJ7YMsk_aaewLMwva-uNI6Rarrow-up-right
(password: password@@)
https://github.com/baronpan/SysmonHunterarrow-up-right
sysmonhunter_server:
(OS: ubuntu 16.04)
Python 2.7
繳交時間 6/20前,以github連結繳交(透過LINE的回文貼上自己的github作業位置,建議連同之前作業,期末作業已專題報告形式呈現,題目可涵蓋本學期的課程範圍,以下幾個題目建議同學可以參考(3人以下)。
(1) SysmonHunter 系統建構與資料收容實證:以BlackHat 2019的Arsenal的SysmonHunter專案,透過Winlogbeat在個人電腦收集運作日誌,並透過SysmonHunter中的ATT&CK對攻擊類型的定義,進行入侵偵測,其中可演練一些知名的攻擊事件分析。
建議可先說明SysmonHunter這個工具的功能,接著說明如何運作,安裝實驗架構為何?Winlogbeat安裝設定方式,並收集電腦日誌進行分析。
Winlogbeat -> Elasticsearch -> winlogbeat(Index) -> SysmonHunter -> Behaviors -> Events
https://github.com/sbousseaden/EVTX-ATTACK-SAMPLES/tree/master/arrow-up-right https://github.com/williballenthin/python-evtxarrow-up-right
(2) Python Data Analytics 分析資安日誌的異常事件:可參考利用Pandas對於Excel的檔案進行分析,並參考網路相關利用Pandas對於access log進行關聯與分析,並從其中找出異常事件。
建議可先說明參考資料的來源與內容,並將範例實作,將實作底結果做一個說明,最後說明實作困難點。
(3) 暗網探索:透過tor對於DarkWeb進行分析,可以從Reddit找出2021的DarkWeb位置清單,對於今年暗網的發展趨勢給予一個分析報告。