BRIM
BASICS
Process the "sample.pcap" file and look at the details of the first DNS log that appear on the dashboard. What is the "qclass_name"?
root@thm:~$ which brim
/usr/bin/brim
root@thm:~$ brim
BRIM > Import Files > Desktop > Exercise-Files > sample.pcap
BRIM > Dashboard > 2017-03-03T20:02:33.387074Z dns CjZFhy3jhLPcrHP1jc ... > right-click > open details
* look for the 1st occurrence of dns log in the dashboard
* qclass_name: C_INTERNETLook at the details of the first NTP log that appear on the dashboard. What is the "duration" value?
root@thm:~$ which brim
/usr/bin/brim
root@thm:~$ brim
BRIM > Import Files > Desktop > Exercise-Files > sample.pcap
BRIM > Dashboard > 2017-03-03T20:02:45.706238Z ntp CYGUjM1Ar2CyNM7zGh ... > right-click > open details
* look for the 1st occurrence of ntp log in the dashboard
* Duration: 0.005 secondsLook at the details of the STATS packet log that is visible on the dashboard. What is the "reassem_tcp_size"?
root@thm:~$ which brim
/usr/bin/brim
root@thm:~$ brim
BRIM > Import Files > Desktop > Exercise-Files > sample.pcap
BRIM > Dashboard > 2017-03-03T20:02:11.009848Z stats zeek ... > right-click > open details
* look for the 1st occurrence of STATS log in the dashboard
* reassem_tcp_size: 540DEFAULT QUERIES
Investigate the files. What is the name of the detected GIF file?
root@thm:~$ which brim
/usr/bin/brim
root@thm:~$ brim
BRIM > Import Files > Desktop > Exercise-Files > task4-sample-b.pcap
BRIM > QUERIES > FILE ACTIVITY
BRIM > DASHBOARD > MIME_TYPE > image/gif > right-click > open details
* look for a file that has a .gif extension
* filename: cat01_with_hidden_text.gifInvestigate the Suricata alerts. What is the Signature id of the alert category "Potential Corporate Privacy Violation"?
EXERCISE: THREAT HUNTING WITH BRIM | MALWARE C2 DETECTION
There is an additional C2 channel in used the given case. What is the name of the secondary C2 channel?
EXERCISE: THREAT HUNTING WITH BRIM | CRYPTO MINING
Last updated