The good folks at WRCCDC 1) were kind enough to release packet captures (PCAPS) of the recently concluded event. The entire corpus is roughly 1TB. Now the question is : What are the tools that can help you unravel the information in the PCAPs?
This is Part-1 of a 3 Part series
The strategy to avoid getting overwhelmed by giant PCAPs is similar to capturing live traffic for the very first time from big networks. You start from knowledge about the organization and then build a baseline analysis. Then you can spread out into different analysis paths depending on what you are looking for. The tooling you have must support this process end to end.
In this particular case, here is What we know for sure :
We like to divvy up the work into two distinct tasksets
We like to build a baseline understanding of the network from the PCAPs from the following four angles. In that order.
First step is to get the “lay of the land”. We created TrisulNSM to excel in this area. You can try answering these traffic questions.
Once you get a solid understanding of the traffic profiles, next step is to ask basic questions about the flows 2) . These yield the second level of understanding.
Next you can look at the same PCAPs from a security angle. You can use Snort or Suricata with all rules enabled and also use a Cyber Crime Intel feed to check your traffic. The TrisulNSM Docker image uses Suricata with all rules from the Emerging Threats Open Ruleset to run a 2nd pass over the PCAP dump. This gives a really good baseline security view from which you can tee off to more detailed exploration.
We generally enable all rules while looking at PCAPs because we have luxury of time and CPU. A large rule load can result in packet drops on live networks but doable in offline mode.
Steps 1-3, will give you a rather solid foundation. By this time, you should have atleast a dozen potential starting points to dig deeper. For example : “Hey, I am seeing a dozen 500MB+ downloads , need to check what it is”. At this point, we like to dig a little deeper into advanced counter groups that are available in TrisulNSM out of the box. These give excellent medium resolution for you to investigate. Some of the useful counter groups are :
Trisul gives you 20 more counter groups, but the above five are good medium resolution starting points.
The relevant factor in Drilldown is whether the analyst is looking for something specific. A security oriented analyst may only want to follow certain drilldown paths from certain starting points. A more general threat-hunting analyst might want to drilldown on all possible leads. These techniques are useful
Enough of theory. Part-2 of this series explains how you can get the TrisulNSM Docker image to run over the PCAP dump