ZEEK
NSM & ZEEK
What is the installed Zeek instance version number?
root@thm:~$ which zeek
/opt/zeek/bin/zeek
root@thm:~$ zeek -v
zeek version 4.2.1What is the version of the ZeekControl module?
root@thm:~$ which zeekctl
/opt/zeek/bin/zeekctl
root@thm:~$ zeekctl
Warning: new zeek version detected (run the zeekctl "deploy" command)
Welcome to ZeekControl 2.4.0
Type "help" for help.
[ZeekControl] > Investigate the "sample.pcap" file. What is the number of generated alert files?
root@thm:~$ cd Desktop/Exercise-Files
root@thm:~$ ls
TASK-2 TASK-3 TASK-5 TASK-6 TASK-7 TASK-8 TASK-9 clear-logs.sh
root@thm:~$ cd Desktop/Exercise-Files/TASK-2
root@thm:~$ ls
clear-logs.sh sample.pcap
root@thm:~$ zeek -C -r sample.pcap
* log files will be created in the background but no terminal output will be produced
root@thm:~$ ls
clear-logs.sh dhcp.log ntp.log sample.pcap ssh.log
conn.log dns.log packet_filter.log snmp.log syslog.log
* the generated alert files are: conn.log, dhcp.log, dns.log, ntp.log, packet_filter.log, snmp.log, ssh.log, syslog.logZEEK LOGS
Investigate the sample.pcap file. Investigate the dhcp.log file. What is the available hostname?
root@thm:~$ cd Desktop/Exercise-Files
root@thm:~$ ls
TASK-2 TASK-3 TASK-5 TASK-6 TASK-7 TASK-8 TASK-9 clear-logs.sh
root@thm:~$ cd Desktop/Exercise-Files/TASK-3
root@thm:~$ ls
clear-logs.sh sample.pcap
root@thm:~$ zeek -C -r sample.pcap
* log files will be created in the background but no terminal output will be produced
root@thm:~$ ls
clear-logs.sh dhcp.log ntp.log sample.pcap ssh.log
conn.log dns.log packet_filter.log snmp.log syslog.log
* the generated alert files are: conn.log, dhcp.log, dns.log, ntp.log, packet_filter.log, snmp.log, ssh.log, syslog.log
root@thm:~$ grep -rE "\bquery" ./dns.log
* this cmd will quickly identify the log file where a field contains the name "query"
root@thm:~$ cat dns.log |zeek-cut query | uniq
blog.webernetz.net
ip.webernetz.netInvestigate the sample.pcap file. Investigate the dns.log file. What is the number of unique DNS queries?
Investigate the sample.pcap file. Investigate the conn.log file. What is the longest connection duration?
ZEEK SIGNATURES
Investigate the http.pcap file. Create the HTTP signature shown in the task and investigate the pcap. What is the source IP of the first event?
Investigate the http.pcap file. Create the HTTP signature shown in the task and investigate the pcap. What is the source port of the second event?
Investigate the conn.log. What is the total number of the sent and received packets from source port 38706?
Create the global rule shown in the task and investigate the ftp.pcap file. Investigate the notice.log. What is the number of unique events?
Create the global rule shown in the task and investigate the ftp.pcap file. Investigate the notice.log. What is the number of ftp-brute signature matches?
ZEEK SCRIPTS: FUNDAMENTALS
Investigate the smallFlows.pcap file. Investigate the dhcp.log file. What is the domain value of the "vinlap01" host?
Investigate the bigFlows.pcap file. Investigate the dhcp.log file. What is the number of identified unique hostnames?
Investigate the bigFlows.pcap file. Investigate the dhcp.log file. What is the identified domain value?
ZEEK SCRIPTS: SIGNATURES
Investigate the sample.pcap file with 103.zeek script. Investigate the terminal output. What is the number of the detected new connections?
Investigate the ftp.pcap file with ftp-admin.sig signature and 201.zeek script. Investigate the signatures.log file. What is the number of signature hits?
Investigate the signatures.log file. What is the total number of "administrator" username detections?
Investigate the ftp.pcap file with all local scripts, and investigate the loaded_scripts.log file. What is the total number of loaded scripts?
Investigate the ftp-brute.pcap file with "/opt/zeek/share/zeek/policy/protocols/ftp/detect-bruteforcing.zeek" script. Investigate the notice.log file. What is the total number of brute-force detections?
ZEEK SCRIPTS: FRAMEWORKS
Investigate the case1.pcap file with intelligence-demo.zeek script. Investigate the intel.log file. Look at the second finding, where was the intel info found?
nvestigate the case1.pcap file with intelligence-demo.zeek script. Investigate the http.log file. What is the name of the downloaded .exe file?
Investigate the case1.pcap file with hash-demo.zeek script. Investigate the files.log file. What is the MD5 hash of the downloaded .exe file?
Investigate the case1.pcap file with file-extract-demo.zeek script. Investigate the "extract_files" folder. Review the contents of the text file. What is written in the file?
ZEEK SCRIPTS: PACKAGES
Investigate the http.pcap file with the zeek-sniffpass module. Investigate the notice.log file. Which username has more module hits?
Investigate the case2.pcap file with geoip-conn module. Investigate the conn.log file. What is the name of the identified City?
Last updated