◼️
General Knowledge
  • Introduction
  • Building a Home Lab
  • Certification Roadmap
  • Basics
    • Basic Networking
    • Basic Gigamon Configuration
  • Firewalls
    • PFSense
    • Cisco ASA
  • Hardware Setup and Device Networking
    • Cisco Device
    • MaxVision Servers
    • Gigamon
  • Reporting
    • Network Activity Report (NAR)
    • Network Change Request (NCR)
    • Redmine
  • DCO Tools
    • Splunk
      • Threat Hunting with Splunk
    • Security Onion 2.4
      • Threat Hunting with Security Onion
    • OsQuery
  • Methodology
    • Gather Information
    • Gather Documents
    • Prepare Equipment and Team Procedures
    • Conduct Network Reconnaissance
    • MITTRE ATT&CK Framework
    • Considerations when Recommending Remedial Action
    • Document Everything
    • Defensive Cyber Operations Checklist
  • Requirements
    • Power Requirements
    • Port Density Requirements
    • Opened Port Requirements
  • Building a Virtual Testing Environment
    • Identify Requirements
    • Gather Equipment and tools
    • Initial Draft
    • Building the Environment
    • Example
Powered by GitBook
On this page
  • Introduction
  • Scanning the Network
  • Baselining Sensor Logs
  1. Methodology

Conduct Network Reconnaissance

Excerpt from "Hunt Methodology" By Christian B.

Introduction

While you have gathered all of the network diagrams and vulnerability scan data to gain insight as to the configuration of the network, understand that it is likely that changes have been made to the network that might not be reflected in your diagrams. When you fall into a network it is important to conduct reconnaissance, baseline network traffic, and verify your findings with the network administrators.

Scanning the Network

The first thing you should do is conduct a series of ping sweeps and port scans on the network to assist you in building your own diagram and identifying open ports across the network. Sometimes there will be open ports on the network that are not needed, and you can use these scan results to identify those unnecessary ports and make appropriate recommendations to the local administrators. These scans can be conducted in a variety of ways including bash scripts, Network Mapper (NMAP), ZMap, etc.

It may also be worthwhile, if possible, to ask the systems administrators to run an additional vulnerability scan to ensure that those results match the results that were initially provided to you.

Understand that none of these scans should be conducted without authorization from the mission owner. The analysts should also know the scan source, destinations, and switches used prior to the scan being conducted to prevent any confusion.

Baselining Sensor Logs

On any given exercise or operation, your analysts could be filtering through millions of network and host logs. Their task can be made easier by filtering out redundant or non-anomalous logs as best as possible. Be aware that over-filtering your logs could potentially result in missing anomalous traffic.

PreviousPrepare Equipment and Team ProceduresNextMITTRE ATT&CK Framework

Last updated 1 year ago