Skip to content

Latest commit

 

History

History
57 lines (41 loc) · 1.55 KB

File metadata and controls

57 lines (41 loc) · 1.55 KB

Blue Team: Summary of Operations

Table of Contents

  • Network Topology
  • Description of Targets
  • Monitoring the Targets
  • Patterns of Traffic & Behavior
  • Suggestions for Going Further

Network Topology

The following machines were identified on the network:

  • Target 1
    • Operating System: Microsoft
    • Purpose: Webserver
    • IP Address: 192.168.1.110
  • Target 2
    • Operating System: Microsoft
    • Purpose: Webserver
    • IP Address: 192.168.1.115
  • Etc.

Description of Targets

The target of this attack was: Target 1 192.168.1.110.

Target 1 is an Apache web server and has SSH enabled, so ports 80 and 22 are possible ports of entry for attackers. As such, the following alerts have been implemented:

Monitoring the Targets

Traffic to these services should be carefully monitored. To this end, we have implemented the alerts below:

Name of Alert 1

Excessive HTTP Error alert is implemented as follows:

  • Metric: hhtp.response.status_code
  • Threshold: 400 in 5 minutes
  • Vulnerability Mitigated: Apache HTTP Server exploitation
  • Reliability: medium

Name of Alert 2

HTTP Request Size Monitor is implemented as follows:

  • Metric: http.request.bytes
  • Threshold: 3500 in 1 minutes
  • Vulnerability Mitigated: Brute Force
  • Reliability: high

Name of Alert 3

CPU Usage Monitor is implemented as follows:

  • Metric: system.process.cpu
  • Threshold: 0.5 in 5 minutes
  • Vulnerability Mitigated: Malicious Software and Programs
  • Reliability: low