Advertisement
Shiva108

SOC Core Skills w/ John Strand (16 Hours)

Dec 16th, 2020
1,351
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. SOC Core Skills w/ John Strand (16 Hours)
  2. Mon, Dec 14, 2020 4-9PM UCT
  3.  
  4. Comments & feedback:
  5.  
  6. Dedicated SOC Core Skills Discord Server:
  7. https://discord.gg/MmRKwEpWwu
  8.  
  9. Preparation instructions and hands-on labs installation guide:
  10. https://wildwesthackinfest.com/training/soc-core-skills-instructions/
  11.  
  12. Slides:
  13. https://handouts-live.s3.amazonaws.com/b0b53ddc19754bb7b2e376b85646a1ae?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20201214T160824Z&X-Amz-SignedHeaders=host&X-Amz-Expires=86400&X-Amz-Credential=AKIAJICNIQWVMWBRIUMQ%2F20201214%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=a0c42d706063156eaf7aa6e368dd7e333d1d7fa32ac23852b4785f474d33d207
  14.  
  15. ADHD Win VM:
  16. https://introclassjs.s3.us-east-1.amazonaws.com/WINADHD.7z
  17. Checksums:
  18. Algorithm: SHA256
  19. Hash: 54C461A0BFC6E9599B0A9BC92D3BD16CB21E5020100D4C2532FE7C43B1807129
  20. https://www.activecountermeasures.com/free-tools/adhd/
  21. GitHub Labs:
  22. https://github.com/strandjs/IntroLabs
  23. https://github.com/strandjs/IntroLabs/blob/master/IntroClassFiles/navigation.md
  24.  
  25. Security Onion:
  26. https://github.com/Security-Onion-Solutions/security-onion
  27. https://securityonionsolutions.com/software/
  28.  
  29. SOC Core Skills w/ John Strand (16 Hours - Pay What You Can)
  30. Tue-Fri 2-5 Feb 2021 11AM-3PM CST
  31. https://register.gotowebinar.com/register/5912460362618462478
  32.  
  33. Getting Started in Security with BHIS and MITRE ATT&CK w/ John Strand (16-Hours - Pay What You Can)
  34. Tue-Fri 23-26 Feb 2021 11AM-3PM CST
  35. https://register.gotowebinar.com/register/3559987064714262542
  36.  
  37. Active Defense & Cyber Deception w/ John Strand (16 Hours - Pay What You Can)
  38. Tue-Fri 16-19 Mar 2021 11AM-3PM CDT
  39. https://register.gotowebinar.com/register/3272325136631560973
  40.  
  41. LINKS (BHIS):
  42.  
  43. https://www.blackhillsinfosec.com/
  44. https://wildwesthackinfest.com/online-training/
  45. https://www.activecountermeasures.com/
  46.  
  47. Your 5 Year Path: Success in Infosec:
  48. https://youtu.be/Uv-AfK7PkxU
  49. https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_Your5YearPlanIntoInfoSec.pdf
  50.  
  51. Contacts:
  52. https://www.twitch.tv/banjocrashland
  53. https://www.twitch.tv/banjocrashland/schedule
  54. https://twitter.com/BanjoCrashland
  55. https://www.linkedin.com/in/jasonsblanchard/
  56. https://twitter.com/debthedeb
  57. https://www.linkedin.com/in/deborahwigley/
  58. https://twitter.com/BHinfoSecurity
  59.  
  60. Training:
  61. https://wildwesthackinfest.com/training-schedule/
  62. https://www.blackhillsinfosec.com/webcast-the-soc-age-or-a-young-soc-analysts-illustrated-primer/
  63. https://www.youtube.com/channel/UCJ2U9Dq9NckqHMbcUupgF0A
  64.  
  65. How to Hunt for Jobs like a Hacker w/ Jason Blanchard
  66. https://youtu.be/Air1c697tjw
  67.  
  68. Cyber Range:
  69. https://www.blackhillsinfosec.com/services/cyber-range/
  70.  
  71. 4-hours of free intro Threat Hunting Training from Chris Brenton:
  72. https://youtu.be/FzYPT1xTVHY
  73.  
  74. How to build your own home lab to use to get experience:
  75. https://youtu.be/t7bhnK47Ygo
  76.  
  77. Pillage the Village:
  78. https://www.youtube.com/watch?v=n2nptntIsn4
  79.  
  80. Backdoors and Breaches:
  81. https://www.blackhillsinfosec.com/projects/backdoorsandbreaches/
  82.  
  83. RITA:
  84. https://www.activecountermeasures.com/free-tools/rita/
  85.  
  86. Videos:
  87. https://www.youtube.com/c/BlackHillsInformationSecurity/videos
  88. News:
  89. https://youtu.be/QZOW0itnyLU
  90.  
  91. The SOC Age Or, A Young SOC Analyst's Illustrated Primer | John Strand | 1 Hour
  92. https://www.youtube.com/watch?v=Lhol4rZo_ts
  93.  
  94. How to update the VM labs:
  95. •Delete: C:\IntroLabs\
  96. •Double-click: C:\labupdate.bat
  97. •Note: don't run as an Administrator, the files will not be placed in the correct directory
  98. If this fails somehow, or the labupdate.bat file is not present:
  99. •Open Notepad and paste the following in, then save as C:\labupdate.bat and run it again:
  100. @ECHO OFF
  101. git clone https://github.com/strandjs/IntroLabs
  102. exit
  103. LABS shortcut on the Desktop is missing/broken:
  104. •Update the labs again
  105. •or manually open: C:\IntroLabs\IntroClassFiles\index.html
  106.  
  107. Stop Windows 10 updates:
  108. •In the Run command (Win+R), type in "services. msc" and hit Enter
  109. •Select the Windows Update service from the Services list
  110. •Click on the "General" tab and change the "Startup Type" to "Disabled"
  111. •Restart your machine
  112.  
  113. VMware Workstation does not support nested virtualization on this host.
  114. Module 'MonitorMode' power on failed.
  115. Failed to start the vitual machine.
  116. Fixed: bcdedit /set hypervisorlaunchtype off
  117.  
  118. dism.exe /online /enable-feature /featurename:Microsoft-Windows-Subsystem-Linux /all /norestart
  119.  
  120. netstat:
  121. https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/netstat
  122. tasklist:
  123. https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/tasklist
  124. DeepBlueCLI:
  125. https://github.com/sans-blue-team/DeepBlueCLI
  126. DeepWhiteCLI:
  127. https://github.com/darkoperator/Posh-VirusTotal
  128. VirusTotal:
  129. https://www.virustotal.com/gui/
  130. VirusTotal API Key:
  131. https://www.virustotal.com/en/documentation/public-api/
  132.  
  133. https://www.opendns.com/
  134. https://github.com/davehull/Kansa
  135. https://adblockplus.org/
  136. https://pi-hole.net/
  137. https://portswigger.net/daily-swig/sad-dns-researchers-pull-source-code-as-dns-cache-poisoning-technique-deemed-too-dangerous
  138. https://www.windows-commandline.com/get-computer-model/
  139. https://requestpolicycontinued.github.io/
  140. https://www.virustotal.com/gui/
  141. https://www.velocidex.com/
  142. https://github.com/ComodoSecurity/openedr
  143. https://www.activecountermeasures.com/free-tools/passer/
  144. https://github.com/activecm/passer
  145. https://github.com/sans-blue-team/DeepBlueCLI
  146.  
  147.  
  148. LINKS (Students):
  149.  
  150. https://www.timeanddate.com/time/map/
  151.  
  152. https://jensoroger.wordpress.com/2020/07/22/if-you-are-attending-getting-started-in-security-with-bhis-and-mitre-attck-with-strandjs-next-week-and-running-linux-and-virtualbox-how-to-import-the-machine-bhinfosecurity-wwhackinfest/
  153.  
  154. I was able to run the Soc VM in Hyper-v. Just follow Converting a VMDK virtual disk copied from ESXi and The entry 1 is not a supported disk database entry for the descriptor in this guide:
  155. https://www.nakivo.com/blog/how-to-convert-vmware-vm-to-hyper-v/#:~:text=The%20entry%201%20is%20not,of%20the%20disk%20database%20entries
  156. In the entry 1 error guide section, you don't need to run boot repair, just uncomment the dbtools lline and run dsfi to save back. I converted it to vhdx and created a gen 2 vm in hyper-v. It booted up just fine, but FYI they don't support you running it like this. This is also handy if you want to run vmware images from vulnhub on hyper-v. Just note that depending on errors you may need to uncomment other lines in descriptor.txt. On some of them on vulnhub, especially old linux ones, I have had to make vm gen 1. Also convert vmdk to vhd, and use a legacy network adapter in hyper-v. Sometimes this doesn't work so your just stuck only running it in vmware or virtualbox.
  157.  
  158. https://www.cisa.gov/news/2020/12/13/cisa-issues-emergency-directive-mitigate-compromise-solarwinds-orion-network
  159. https://cyber.dhs.gov/ed/21-01/
  160. SANS Webcast tonight about it:
  161. https://www.sans.org/webcasts/emergency-webcast-about-solarwinds-supply-chain-attack-118015
  162. Details initial access, execution, and C2 with extra details:
  163. https://msrc-blog.microsoft.com/2020/12/13/customer-guidance-on-recent-nation-state-cyber-attacks/
  164. FireEye:
  165. https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html
  166. ISC DShield:
  167. https://isc.sans.edu/diary/rss/26884
  168. SwiftOnSecurity:
  169. https://twitter.com/SwiftOnSecurity/status/1338279792727257088?s=20
  170. Reminder of why just throwing hashes into VT isn't good enough for hunting: https://twitter.com/MalwareJake/status/1338332539379998730?s=20
  171. Countermeasures:
  172. https://github.com/fireeye/sunburst_countermeasures
  173. Orion Hashes:
  174. https://pastebin.com/N0bfywTB
  175. MalwareJake about NMS/Solarwinds:
  176. https://twitter.com/MalwareJake/status/1338278185692246016?s=20
  177. SAML tokens were forged, learn more about SAML here:
  178. https://twitter.com/SwiftOnSecurity/status/1217942428243632128?s=20
  179. https://techcrunch.com/2020/12/14/gmail-youtube-google-docs-and-other-services-go-down-simultaneously-in-multiple-countries/
  180. https://www.washingtonpost.com/national-security/russian-government-spies-are-behind-a-broad-hacking-campaign-that-has-breached-us-agencies-and-a-top-cyber-firm/2020/12/13/d5a53b88-3d7d-11eb-9453-fc36ba051781_story.html
  181. https://content.govdelivery.com/attachments/USDHSCISA/2020/12/14/file_attachments/1625402/UNCLASSIFIED_TLPWHITE_20201214_Sector_Alert_SolarWinds.pdf
  182.  
  183. https://www.professormesser.com/
  184. https://www.youtube.com/channel/UCkefXKtInZ9PLsoGRtml2FQ
  185.  
  186. https://linuxjourney.com/
  187. https://www.youtube.com/watch?v=HbgzrKJvDRw
  188.  
  189. https://pentesterlab.com/
  190.  
  191. https://support.microsoft.com/en-gb/help/2977003/the-latest-supported-visual-c-downloads
  192.  
  193. https://www.cyberseek.org/pathway.html
  194.  
  195. https://www.youtube.com/watch?v=8armE3Wz0jk
  196.  
  197. https://docs.microsoft.com/en-us/archive/blogs/johnla/defenders-think-in-lists-attackers-think-in-graphs-as-long-as-this-is-true-attackers-win
  198.  
  199. https://github.com/ComodoSecurity/openedr
  200.  
  201. https://medium.com/tenable-techblog/psexec-local-privilege-escalation-2e8069adc9c8
  202.  
  203. https://nostarch.com/rootkits
  204. https://attack.mitre.org/techniques/T1014/
  205.  
  206. https://www.saddns.net/
  207. https://ublockorigin.com/
  208.  
  209. https://ss64.com/nt/wmic.html
  210.  
  211. https://keexybox.org/
  212.  
  213. https://www.amazon.com/Standing-Sitting-Perching-Ergonomic-Computer/dp/B00HCLJDSK
  214.  
  215. https://www.forensicnotes.com/
  216.  
  217. https://www.sophos.com/en-us/products/free-tools/sophos-xg-firewall-home-edition.aspx
  218.  
  219. https://support.opendns.com/hc/en-us/articles/227986647-Can-I-Block-Advertisers-and-Ad-Servers-
  220.  
  221. https://social.technet.microsoft.com/Forums/ie/en-US/cba40481-7400-4c25-aaf6-4f378dcca5b7/service-vs-process?forum=operationsmanagergeneral
  222.  
  223. https://www.2600.com/
  224.  
  225. https://docs.microsoft.com/en-us/sysinternals/downloads/process-explorer
  226. https://processhacker.sourceforge.io/
  227.  
  228. https://github.com/Tripwire/tripwire-open-source
  229.  
  230. https://otx.alienvault.com/browse/global?include_inactive=0&sort=-modified&page=1&indicatorsSearch=modified:%22%22
  231.  
  232. https://www.crowdstrike.com/resources/reports/netwalker-ransomware-technical-analysis/
  233. https://www.crowdstrike.com/resources/reports/2020-crowdstrike-global-threat-report/
  234.  
  235. https://cyware.com/news/ransomware-makes-up-half-of-all-major-incidents-79f3704e
  236.  
  237. https://www.darkreading.com/application-security/ransomware-makes-up-half-of-all-major-incidents/d/d-id/1339667
  238.  
  239. https://mitre-engenuity.org/attackevaluations/
  240.  
  241. https://github.com/iamadamdev/bypass-paywalls-chrome
  242.  
  243. https://docs.microsoft.com/en-us/troubleshoot/windows-client/deployment/dynamic-link-library
  244.  
  245. https://lolbas-project.github.io/
  246.  
  247. https://docs.microsoft.com/en-us/windows/wsl/install-win10
  248.  
  249. https://gchq.github.io/CyberChef/
  250.  
  251. https://wadcoms.github.io/
  252.  
  253. https://docs.microsoft.com/en-us/sysinternals/downloads/
  254.  
  255. https://strontic.github.io/xcyclopedia/intro
  256.  
  257. https://blog.didierstevens.com/my-software/
  258.  
  259. https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.utility/get-filehash?view=powershell-7.1
  260.  
  261. https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon#overview-of-sysmon-capabilities
  262. https://github.com/SwiftOnSecurity/sysmon-config
  263. https://github.com/olafhartong/sysmon-modular
  264.  
  265. https://www.hybrid-analysis.com/
  266.  
  267. https://www.tenforums.com/tutorials/46769-enable-disable-windows-subsystem-linux-wsl-windows-10-a.html
  268.  
  269. Disable-WindowsOptionalFeature -Online -FeatureName Microsoft-Windows-Subsystem-Linux
  270.  
  271. https://thehackernews.com/2020/12/zero-click-wormable-rce-vulnerability.html
  272.  
  273. https://securitybytes.io/blue-team-fundamentals-part-two-windows-processes-759fe15965e2
  274.  
  275. https://osquery.io/
  276.  
  277. https://www.elastic.co/endpoint-security/
  278.  
  279. https://www.eff.org/pages/tools
  280.  
  281. https://github.com/Cyb3rWard0g/HELK
  282.  
  283. https://github.com/google/grr
  284.  
  285. https://nmap.org/book/man-os-detection.html
  286. https://nmap.org/book/man-version-detection.html
  287.  
  288. https://nsacyber.github.io/unfetter/
  289.  
  290. https://github.com/JPCERTCC/LogonTracer
  291.  
  292. https://www.rumble.run/
  293.  
  294. https://www.prelude.org/
  295.  
  296. https://github.com/fireeye/iocs
  297. https://github.com/fireeye/red_team_tool_countermeasures/
  298. https://github.com/fireeye/red_team_tool_countermeasures/blob/master/all-snort.rules
  299.  
  300. https://www.picussecurity.com/resource/blog/techniques-tactics-procedures-utilized-by-fireeye-red-team-tools
  301.  
  302. https://github.com/kitabisa/teler
  303.  
  304. https://www.youtube.com/watch?v=iB_xCLsgQZI
  305. https://www.youtube.com/watch?v=Uv-AfK7PkxU
  306.  
  307. https://www.iocbucket.com/
  308.  
  309. https://www.cyberseek.org/index.html#
  310.  
  311. https://pauljerimy.com/security-certification-roadmap/
  312.  
  313. https://www.youtube.com/watch?v=17UUS3fY2Nw&feature=youtu.be
  314.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement