New #cyphercon talk

Great opening.
We aren’t taught to investigate. We are taught to analyze. These are not the same.

Structure is needed.

If they ask how long, tell them what you plan to do. Shows you have a plan.

Forensics means it’s done. IR means ongoing.
Not sure I agree, this is more philosophical.

Don’t just move from unknown to known. You have to move further to provable.

Scientific method.
Observe.
Question.
Hypothesize.
Test.
Conclusion.

Best use of Mitre Att&ck - common taxonomy.
Consistent vocabulary.

ADAPT

Approach
Disco
Association
Profile
Timeline

Cisco guy loves acronyms

Approach

Have a plan. Ruskies don’t take dumps without a plan (even if it’s dumb).

Identify win conditions. Win co dictions are different for different teams.

Ask the right questions.

Plan your documentation structure.
Build templates.

Assign a scribe. (Like this. Because I already do it).

Doc method - cloud or local, txt or word doc, etc.

Know where to look. Prioritize evidence sources.

Logs
Sec tools
Threat Intel
Forensic analysis
Triage

Which source answers your question the fastest?

Acquire evidence.

Have your plan, know your sources, now go get it.

I am so glad I’ve built these plans and procedures years ago.

Now to get the team to follow it.

DISCO

Start your hunt.

You need a baseline to know normal. Otherwise what is abnormal?

Do not chase squirrels.

PEAK threat hunting framework? Never heard of it, worth a look.
Document any finding even if we don’t know if it’s useful.
Explain the relevance of the finding in the docs. It helps for others.
Document the gaps. That will be relevant. Good context. Especially during review.

How do you know when you found something?

The finding is objective. The context can have a hint of subjective. Context aids decision making.

Use resources in other departments. Let them help define normal.

ASSOCIATIONS

timeline things. What event directly connects to what? Is there a time gap? Capture indicators - to fuel more hunts.

Normalize.

Consistent timestamps.
Consistent terminology.
Vendor agnostic.

PROFILE

Cough attribution Cough.

Does this line up with a known adversary? More to hunt. Patterns to seek.

Template

Indicator
Indicator type
Context
Description

TIMELINE
timestamp
Origin
Target
User
Evidence source
Event type
Description
MITRE Technique
Document how long an investigation takes, including people hours. So management knows how we use our resources and why we need more.
Use this to list your accomplishments.
Demonstrate value.
ChocolateCoat4N6

Incident Response, Investigations & Ramblings

ChocolateCoat4N6