Security Operation Center - Operations Development
Security Operation Center - Operations Development
Operations Development
Joas Antonio https://www.linkedin.com/in/joas-antonio-dos-santos
Security Operation
Center Tools
Sooty
• https://eternal-todo.com/tools/peepdf-pdf-
analysis-tool
PyREBox
• Fail2ban scans log files (e.g. /var/log/apache/error_log) and bans IPs that show the
malicious signs -- too many password failures, seeking for exploits, etc. Generally
Fail2Ban is then used to update firewall rules to reject the IP addresses for a specified
amount of time, although any arbitrary other action (e.g. sending an email) could also
be configured. Out of the box Fail2Ban comes with filters for various services (apache,
courier, ssh, etc).
• https://github.com/ossec/ossec-hids
• https://www.ossec.net/
RKHunter and CHRookit
• http://rkhunter.sourceforge.net/
• http://chkrootkit.org/
Process Hacker
https://atomicredteam.io/
Metta
• https://www.zabbix.com/network
_monitoring
Icinga
• Redline®, FireEye's premier free endpoint security tool, provides host investigative capabilities to users to find
signs of malicious activity through memory and file analysis and the development of a threat assessment
profile.
With Redline, you can:
• Thoroughly audit and collect all running processes and drivers from memory, file-system metadata, registry
data, event logs, network information, services, tasks and web history.
• Analyze and view imported audit data, including the ability to filter results around a given timeframe using
Redline’s Timeline functionality with the TimeWrinkle™ and TimeCrunch™ features.
• Streamline memory analysis with a proven workflow for analyzing malware based on relative priority.
• Perform Indicators of Compromise (IOC) analysis. Supplied with a set of IOCs, the Redline Portable Agent is
automatically configured to gather the data required to perform the IOC analysis and an IOC hit result review.
• https://www.fireeye.com/services/freeware/redline.html
Yara
• Connect Open-Source Security Tools: Threat Bus is a pub-sub broker for threat intelligence data. With Threat
Bus you can seamlessly integrate threat intel platforms like OpenCTI or MISP with detection tools and
databases like Zeek or VAST.
• Native STIX-2: Threat Bus transports indicators and sightings encoded as per the STIX-2 open format
specification.
• Plugin-based Architecture: The project is plugin-based and can be extended easily. Read about the different
plugin types and how to write your own. We welcome contributions to adopt new open source tools!
• Official Plugins: We maintain many plugins right in the official Threat Bus repository. Check out our
integrations for MISP, Zeek, CIFv3, and generally apps that connect via ZeroMQ, like vast-threatbus and our
OpenCTI connector.
• Snapshotting: The snapshot feature allows subscribers to directly request threat intelligence data for a certain
time range from other applications. Threat Bus handles the point-to-point communication of all involved apps.
• https://github.com/tenzir/threatbus
Threat Ingestor
• User guide for MISP - The Open Source Threat Intelligence Sharing
Platform. This user guide is intended for ICT professionals such as
security analysts, security incident handlers, or malware reverse
engineers who share threat intelligence using MISP or integrate
MISP into other security monitoring tools. The user guide includes
day-to-day usage of the MISP's graphical user interface along with
its automated interfaces (API), in order to integrate MISP within a
security environment and operate one or more MISP instances.
• https://github.com/MISP/misp-book
Malware-IOC
• Here are indicators of compromise (IOCs) of our various investigations. We are doing this to help the broader
security community fight malware wherever it might be.
• .yar files are Yara rules
• .rules files are Snort rules
• samples.md5, samples.sha1 and samples.sha256 files are newline separated list of hexadecimal digests of
malware samples
• If you would like to contribute improved versions please send us a pull request.
• If you’ve found false positives give us the details in an issue report and we’ll try to improve our IOCs.
• These are licensed under the permissive BSD two-clause license. You are allowed to modify these and keep
the changes to yourself even though it would be rude to do so.
• https://github.com/eset/malware-ioc
Cobalt Strike Scan
• Scan files or process memory for Cobalt Strike beacons and parse their
configuration.
• CobaltStrikeScan scans Windows process memory for evidence of DLL
injection (classic or reflective injection) and/or performs a YARA scan on
the target process' memory for Cobalt Strike v3 and v4 beacon signatures.
• Alternatively, CobaltStrikeScan can perform the same YARA scan on a file
supplied by absolute or relative path as a command-line argument.
• If a Cobalt Strike beacon is detected in the file or process, the beacon's
configuration will be parsed and displayed to the console.
• https://github.com/Apr4h/CobaltStrikeScan
Harden Tools
• The Windows Secure Host Baseline (SHB) provides an automated and flexible
approach for assisting the DoD in deploying the latest releases of Windows 10 using a
framework that can be consumed by organizations of all sizes.
• The DoD CIO issued a memo on November 20, 2015 directing Combatant Commands,
Services, Agencies and Field Activities (CC/S/As) to rapidly deploy the Windows 10
operating system throughout their respective organizations with the objective of
completing deployment by the end of January 2017. The Deputy Secretary of Defense
issued a memo on February 26, 2016 directing the DoD to complete a rapid
deployment and transition to Microsoft Windows 10 Secure Host Baseline by the end
of January 2017.
• https://github.com/nsacyber/Windows-Secure-Host-Baseline
Any Run
• The log manager gathers log messages from all over your system, consolidating
the different formats they are written in to be stored and searched together. The
dashboard shows all events live on the screen, and there is also an analytical tool
that helps you search through stored log files for pertinent security information.
The log manager also protects logfiles from tampering with a file integrity monitor.
• The Security Event Manager isn’t just a SIEM. It includes a threat intelligence feed,
which pools threat detection experiences from all of the clients of the SolarWinds
system. The security system uses the guidance from the feed when searching
through log messages for indicators of attack.
• https://www.solarwinds.com/security-event-manager
Cortex
• OpenEDR is free and its source code is open to public. OpenEDR allows
you to analyze what’s happening across your entire environment at base-
security-event level. This granularity enables accurate root-causes analysis
needed for faster and more effective remediation. Proven to be the best
way to convey this type of information, process hierarchy tracking provide
more than just data, they offer actionable knowledge. It collects all the
details on endpoints, hashes, and base and advanced events. You get
detailed file and device trajectory information and can navigate single
events to uncover a larger issue that may be compromising your system.
• https://openedr.com/
Vistumbler
https://github.com/archanchoudhury/SOC-OpenSource
EDR Stack Architecture
https://github.com/archanchoudhury/SOC-
OpenSource
Open Source Threat Management
https://securityfirst.com.br/soc/
OpeN Source SOC
https://www.ciscopress.com/articles/article.asp?p=24
55014
Security Operation Center
https://www.sketchbubble.com/en/presentation-
security-operations-center.html
Security Operation Center - Concept
Security Operation Center - Concept
Security Operation Center - Triad
Security Operation Center Governance
Intelligence-Driven SOC
SOC Tiers
https://gbhackers.com/how-to-build-and-run-a-
security-operations-center/
SOC Tiers 2
https://medium.com/predict/security-operations-
center-soc-e5f47e277a35
SOC Tiers 3
https://www.accenture.com/us-en/blogs/security/level-up-soc-
game-one-logical-step-at-a-time
SOC Maturity Progression
https://www.accenture.com/us-en/blogs/federal-
viewpoints/leveling-up-your-cybersecurity-how-
agencies-mature-security-programs
Incident Response
https://www.exabeam.com/incident-
response/incident-response-plan/
Incident Response Organized
AWESOME!
• https://github.com/fabacab/awesome-cybersecurity-blueteam
• https://github.com/CyberSecurityUP/Awesome-Red-Team-Operations
• https://github.com/infosecn1nja/Red-Teaming-Toolkit
• https://github.com/an4kein/awesome-red-teaming
• https://socradar.io/how-to-build-a-soc-with-open-source-solutions/
• https://github.com/counteractive/incident-response-plan-template/blob/master/playbooks/playbook-ransomware.md
• https://www.rapid7.com/globalassets/_pdfs/whitepaperguide/rapid7-insightidr-ransomware-playbook.pdf
• https://cyber.gc.ca/en/guidance/ransomware-playbook-itsm00099
• https://www.cisa.gov/sites/default/files/publications/Federal_Government_Cybersecurity_Incident_and_Vulnerability_Response
_Playbooks_508C.pdf
• https://www.atlassian.com/incident-management/incident-response/how-to-create-an-incident-response-playbook
• https://frsecure.com/blog/incident-response-playbooks/
• https://www.youtube.com/watch?v=52HA_Y8A1Zs