Network Monitoring Workshop - Incident Response Overview

Slide Note
Embed
Share

This workshop covers various aspects of incident response, including tools and techniques such as network taps, protocol analysis with Wireshark, data summarization with Bro/Zeek, alerting with Snort/Suricata, and more. Sessions delve into topics like TLS inspection, wireless network monitoring, and traffic capturing methods. Participants will gain insights into network security practices and practical skills for handling incidents effectively.


Uploaded on Sep 23, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Welcome to NC CRRC Incident Response

  2. This Mornings Plan Talk about who we are What will we do in this workshop Breakout labs Eat lunch Incident Response 2

  3. Who are Kyle & Cody Incident Response 3

  4. What well cover: Session I We re all birds of a different feather High level overview of what these tools are Network taps Protocol analysis (wireshark) Summarize data (bro/zeek) Alerting on bad stuff (snort/suricata) Methods of capturing network traffic What does our data look like: NSM centric Incident Response Deeper dive into wireshark File extraction Scavenger hunt 4

  5. Session II Incident Response 5

  6. Session III Incident Response 6

  7. Session IV: TLS Inspection For those with more money than time Dip into commercial firewall applications Palo Alto It s ok: academics can get it for free Application ID Issues in capturing traffic: encryption Methods of solving: encryption Incident Response 7

  8. Session V: Wireless We hype packet level analysis But we often forget wifi Key pieces of 802.11: management frames Normal stuff: associations & disassociations What trashy things do people do on 802.11? How we can detect/monitor for this Incident Response 8

  9. Session VI The last session! Network monitoring scavenger hunt Incident Response 9

  10. Getting Traffic Just use a hub Port mirroring/SPAN port Network TAP Incident Response 10

  11. Using Hubs Just kidding

  12. SPAN Ports Mirror all traffic from a switch to a device Device can be: An analysis/capture device A VLAN A virtual machine Can drop traffic if oversubscribed Incident Response The switch treats SPAN data with a lower priority than regular port-to-port data - Cisco 12

  13. Oversubscription Incident Response 13

  14. Network TAP TAP: Test Access Point Can be active or passive Meets extra legal requirements sometimes* Incident Response Isn t hindered with oversubscriptions 14

  15. Incident Response 15

  16. Challenges Incident Response 16

  17. Types of Data in NSM Incident Response 17

Related


More Related Content