BRIM

BASICS

Process the "sample.pcap" file and look at the details of the first DNS log that appear on the dashboard. What is the "qclass_name"?

root@thm:~$ which brim
 /usr/bin/brim

root@thm:~$ brim
BRIM > Import Files > Desktop > Exercise-Files > sample.pcap
BRIM > Dashboard > 2017-03-03T20:02:33.387074Z dns CjZFhy3jhLPcrHP1jc ... > right-click > open details
 * look for the 1st occurrence of dns log in the dashboard
 
 * qclass_name: C_INTERNET
Look at the details of the first NTP log that appear on the dashboard. What is the "duration" value?
root@thm:~$ which brim
 /usr/bin/brim

root@thm:~$ brim
BRIM > Import Files > Desktop > Exercise-Files > sample.pcap
BRIM > Dashboard > 2017-03-03T20:02:45.706238Z ntp CYGUjM1Ar2CyNM7zGh ... > right-click > open details
 * look for the 1st occurrence of ntp log in the dashboard
 
 * Duration: 0.005 seconds
Look at the details of the STATS packet log that is visible on the dashboard. What is the "reassem_tcp_size"?
root@thm:~$ which brim
 /usr/bin/brim

root@thm:~$ brim
BRIM > Import Files > Desktop > Exercise-Files > sample.pcap
BRIM > Dashboard > 2017-03-03T20:02:11.009848Z stats zeek ... > right-click > open details
 * look for the 1st occurrence of STATS log in the dashboard
 
 * reassem_tcp_size: 540

DEFAULT QUERIES

Investigate the files. What is the name of the detected GIF file?
root@thm:~$ which brim
 /usr/bin/brim

root@thm:~$ brim
BRIM > Import Files > Desktop > Exercise-Files > task4-sample-b.pcap
BRIM > QUERIES > FILE ACTIVITY
BRIM > DASHBOARD > MIME_TYPE > image/gif > right-click > open details
 * look for a file that has a .gif extension
 
 * filename: cat01_with_hidden_text.gif
Investigate the conn logfile. What is the number of the identified city names?
Investigate the Suricata alerts. What is the Signature id of the alert category "Potential Corporate Privacy Violation"?

EXERCISE: THREAT HUNTING WITH BRIM | MALWARE C2 DETECTION

What is the name of the file downloaded from the CobaltStrike C2 connection?
What is the number of CobaltStrike connections using port 443?
There is an additional C2 channel in used the given case. What is the name of the secondary C2 channel?

EXERCISE: THREAT HUNTING WITH BRIM | CRYPTO MINING

How many connections used port 19999?
What is the name of the service used by port 6666?
What is the amount of transferred total bytes to "101.201.172.235:8888"?
What is the detected MITRE tactic id?

Last updated