- Network Topology
- Description of Targets
- Monitoring the Targets
- Patterns of Traffic & Behavior
- Suggestions for Going Further
The following machines were identified on the network:
- Target 1
- Operating System: Microsoft
- Purpose: Webserver
- IP Address: 192.168.1.110
- Target 2
- Operating System: Microsoft
- Purpose: Webserver
- IP Address: 192.168.1.115
- Etc.
The target of this attack was: Target 1 192.168.1.110.
Target 1 is an Apache web server and has SSH enabled, so ports 80 and 22 are possible ports of entry for attackers. As such, the following alerts have been implemented:
Traffic to these services should be carefully monitored. To this end, we have implemented the alerts below:
Excessive HTTP Error alert is implemented as follows:
- Metric: hhtp.response.status_code
- Threshold: 400 in 5 minutes
- Vulnerability Mitigated: Apache HTTP Server exploitation
- Reliability: medium
HTTP Request Size Monitor is implemented as follows:
- Metric: http.request.bytes
- Threshold: 3500 in 1 minutes
- Vulnerability Mitigated: Brute Force
- Reliability: high
CPU Usage Monitor is implemented as follows:
- Metric: system.process.cpu
- Threshold: 0.5 in 5 minutes
- Vulnerability Mitigated: Malicious Software and Programs
- Reliability: low