0x00 Preface

0 24
0x00 PrefaceThe annual offensive and defensive exercise is about to start, and e...

0x00 Preface

The annual offensive and defensive exercise is about to start, and everyone has also begun to prepare for the network defense. As everyone knows, the offensive and defensive exercise tests not only the 'strategic missiles' of the attack team but also the 'Iron Dome' of the defense side. The value of the blue team often needs to be verified through attacks. In order to let everyone not be a 'peaceful bird' during the network defense, this article will refer to the ATT&CK model and discuss the three modules of investigation, resource development, and initial access, draw and analyze attack methods, and identify attack methods through fingerprints, so as to find that 'TA' in the massive alarms.

0x01 Investigation

Analysis of attack methods

During the investigation phase, attackers usually actively and passively discover and collect target subdomains, fingerprints, supply chain information, etc. The active collection initiated is definitely recorded by traffic devices, and the passively collected assets also need to be authenticated for the effectiveness of the collected assets. We can discover this behavior through the following dimensions:

1. Dimension of time

0x00 Preface

As a tool for collecting assets, the biggest characteristic is that it can initiate a large number of requests in a short period of time and point to different domains. It can summarize and analyze statistical data through the way of Excel table summary for device alarms (referring to devices such as situation awareness, WAF, load balancing, etc. that can record normal traffic).
Analysis indicators
1.1 Large-scale visits by the same IP to the same site in a short period of time
Pasted image 20240624230911.png
1.2 Large-scale visits by the same IP to different sites in a short period of time
Pasted image 20240624232942.png

2. Dimension of fingerprint

It is easy to detect when the same IP makes a large number of requests. We know it, and the red team also knows it, so some red teams have rich IP proxy pools. All the probes are initiated and collected by different IPs to avoid detection by the blue team. In this case, we can discover IPs that may exist attack behaviors through threat intelligence.
Pasted image 20240624233803.png

3. Dimension of scenario

Certainly, someone will ask, we all know these two. Some IPs are in the new pool and have not been marked, they are still pure. How do we discover the attacker in this case?

Overall scenario correlation


What is abnormal traffic? It is conflicting and unrelated to the daily scenario. Many of our websites contain a large number of framework files such as JS and CSS. When we normally load the browser, it is never just a single page that is loaded.
Pasted image 20240624234402.

你可能想看:
最后修改时间:
admin
上一篇 2025年03月25日 00:49
下一篇 2025年03月25日 01:12

评论已关闭