Investigation Scenario π
You've discovered a host with multiple instances of Chrome running the --hidden option.
What do you look for to investigate whether an incident occurred?
Security Analyst, Author, and Instructor, Ed.D.
Studying the intersection of security investigation doctrine, cognitive psychology, and education.
Founder of Applied Network Defense and Rural Tech Fund
Books:
π― Intrusion Detection Honeypots
π¦ Practical Packet Analysis
π Applied Network Security Monitoring
Former: Mandiant, InGuardians, Dept of Defense, Roadside Fruit Vendor.
A question well stated is a problem half-solved. #InvestigationTheory
https://chrissanders.org/links/
| Blog | https://chrissanders.org/ |
| Training Courses | http://networkdefense.co/courses/ |
| https://twitter.com/chrissanders88 | |
| Books | https://chrissanders.org/publications |
| More Links | https://chrissanders.org/links/ |
Investigation Scenario π
You've discovered a host with multiple instances of Chrome running the --hidden option.
What do you look for to investigate whether an incident occurred?
Investigation Scenario π
Browser history for an HR user shows repeated visits to chat.openai[.]com, followed by creation of C:\Users\chris\AppData\Local\Temp\cleanup[.]ps1. The file is not available, and the hash shows no matches in OSINT resources.
What do you look for to investigate whether an incident occurred?
Investigation Scenario π
A host on your network executed the command βnetsh wlan show profileβ for the first time.
What do you look for to investigate whether an incident occurred?
Investigation Scenario π
Your SIEM flags an OAuth consent grant to βAdobe Secure Shareβ from a user's M365 account at 07:13 AM. The audit log shows consent to files.readwrite.all.
What do you look for to investigate whether an incident occurred?