ZEEK

NSM & ZEEK

What is the installed Zeek instance version number?
root@thm:~$ which zeek
 /opt/zeek/bin/zeek
root@thm:~$ zeek -v
 zeek version 4.2.1
What is the version of the ZeekControl module?
root@thm:~$ which zeekctl 
 /opt/zeek/bin/zeekctl
root@thm:~$ zeekctl   
 Warning: new zeek version detected (run the zeekctl "deploy" command)
 Welcome to ZeekControl 2.4.0
 Type "help" for help.
[ZeekControl] > 
Investigate the "sample.pcap" file. What is the number of generated alert files?
root@thm:~$ cd Desktop/Exercise-Files
root@thm:~$ ls
 TASK-2  TASK-3  TASK-5  TASK-6  TASK-7  TASK-8  TASK-9  clear-logs.sh
root@thm:~$ cd Desktop/Exercise-Files/TASK-2
root@thm:~$ ls
 clear-logs.sh  sample.pcap
 
root@thm:~$ zeek -C -r sample.pcap
 * log files will be created in the background but no terminal output will be produced
root@thm:~$ ls
 clear-logs.sh  dhcp.log  ntp.log            sample.pcap  ssh.log
 conn.log       dns.log   packet_filter.log  snmp.log     syslog.log
 
 * the generated alert files are: conn.log, dhcp.log, dns.log, ntp.log, packet_filter.log, snmp.log, ssh.log, syslog.log

ZEEK LOGS

Investigate the sample.pcap file. Investigate the dhcp.log file. What is the available hostname?
root@thm:~$ cd Desktop/Exercise-Files
root@thm:~$ ls
 TASK-2  TASK-3  TASK-5  TASK-6  TASK-7  TASK-8  TASK-9  clear-logs.sh
root@thm:~$ cd Desktop/Exercise-Files/TASK-3
root@thm:~$ ls
 clear-logs.sh  sample.pcap
 
root@thm:~$ zeek -C -r sample.pcap
 * log files will be created in the background but no terminal output will be produced
root@thm:~$ ls
 clear-logs.sh  dhcp.log  ntp.log            sample.pcap  ssh.log
 conn.log       dns.log   packet_filter.log  snmp.log     syslog.log
 
 * the generated alert files are: conn.log, dhcp.log, dns.log, ntp.log, packet_filter.log, snmp.log, ssh.log, syslog.log
 
root@thm:~$ grep -rE "\bquery" ./dns.log

 * this cmd will quickly identify the log file where a field contains the name "query"

root@thm:~$ cat dns.log |zeek-cut query | uniq 
 blog.webernetz.net
 ip.webernetz.net
Investigate the sample.pcap file. Investigate the dns.log file. What is the number of unique DNS queries?
Investigate the sample.pcap file. Investigate the conn.log file. What is the longest connection duration?

ZEEK SIGNATURES

Investigate the http.pcap file. Create the HTTP signature shown in the task and investigate the pcap. What is the source IP of the first event?
Investigate the http.pcap file. Create the HTTP signature shown in the task and investigate the pcap. What is the source port of the second event?
Investigate the conn.log. What is the total number of the sent and received packets from source port 38706?
Create the global rule shown in the task and investigate the ftp.pcap file. Investigate the notice.log. What is the number of unique events?
Create the global rule shown in the task and investigate the ftp.pcap file. Investigate the notice.log. What is the number of ftp-brute signature matches?

ZEEK SCRIPTS: FUNDAMENTALS

Investigate the smallFlows.pcap file. Investigate the dhcp.log file. What is the domain value of the "vinlap01" host?
Investigate the bigFlows.pcap file. Investigate the dhcp.log file. What is the number of identified unique hostnames?
Investigate the bigFlows.pcap file. Investigate the dhcp.log file. What is the identified domain value?

ZEEK SCRIPTS: SIGNATURES

Investigate the sample.pcap file with 103.zeek script. Investigate the terminal output. What is the number of the detected new connections?
Investigate the ftp.pcap file with ftp-admin.sig signature and 201.zeek script. Investigate the signatures.log file. What is the number of signature hits?
Investigate the signatures.log file. What is the total number of "administrator" username detections?
Investigate the ftp.pcap file with all local scripts, and investigate the loaded_scripts.log file. What is the total number of loaded scripts?
Investigate the ftp-brute.pcap file with "/opt/zeek/share/zeek/policy/protocols/ftp/detect-bruteforcing.zeek" script. Investigate the notice.log file. What is the total number of brute-force detections?

ZEEK SCRIPTS: FRAMEWORKS

Investigate the case1.pcap file with intelligence-demo.zeek script. Investigate the intel.log file. Look at the second finding, where was the intel info found?
nvestigate the case1.pcap file with intelligence-demo.zeek script. Investigate the http.log file. What is the name of the downloaded .exe file?

Investigate the case1.pcap file with hash-demo.zeek script. Investigate the files.log file. What is the MD5 hash of the downloaded .exe file?
Investigate the case1.pcap file with file-extract-demo.zeek script. Investigate the "extract_files" folder. Review the contents of the text file. What is written in the file?

ZEEK SCRIPTS: PACKAGES

Investigate the http.pcap file with the zeek-sniffpass module. Investigate the notice.log file. Which username has more module hits?
Investigate the case2.pcap file with geoip-conn module. Investigate the conn.log file. What is the name of the identified City?
Investigate the case2.pcap file with geoip-conn module. Investigate the conn.log file. Which IP address is associated with the identified City?
Investigate the case2.pcap file with sumstats-counttable.zeek script. How many types of status codes are there in the given traffic capture?

Last updated