NG-SOC in Taiwan The realities , the difficulties and the future
Senior Technical Consultant Jack Chou
NG-SOC in Taiwan The realities , the difficulties and the future - - PowerPoint PPT Presentation
NG-SOC in Taiwan The realities , the difficulties and the future Senior Technical Consultant Jack Chou Who am I : : Incident Response CEH CHFI Palo Alto Network ACE Penetration Testing
NG-SOC in Taiwan The realities , the difficulties and the future
Senior Technical Consultant Jack Chou
Who am I
就是一個不長
Agenda
新一代SOC-OODA(1)
大人物(Tactics Techniques and Procedures)
http://correlatedsecurity.com/an-ooda-driven-soc- strategy-using-siem-soar-edr/新一代SOC-OODA(2)
包山包海的CTI
http://correlatedsecurity.com/why-cyber-threat- intelligence-informed-security-operations-is-important/Taiwan SOC
Security Operation Center 客戶的期望是甚麼???
SOC監控共同供應契約
次就是代表不限範圍與目標數
我們都是萬能的資安從業人員…
客戶還有您的老闆對我們的高度期待…
https://sansorg.egnyte.com/dl/K0PbjzWWau/台灣的威脅情資
資通安全情資分享辦法
SOC&IR如何找未知???
KPI用CTI
回饋分享…
Offensive OSINT
Attack Surface Management
Attack Surface Management
Asset Discovery
來源及方法例舉
Dark Web Monitoring
Hunting Leaked & Misconfig
或樣本,發現可能洩漏的帳號密碼
API
Potential squatting
/
domain scanner)
(update、admin、365、windows、 Microsoft…等)
Leaked/Stolen Credentials
com/
/kevthehermit/Past eHunter
Report
/s-rah/onionscan
Dark Data Discovery(暗網情資蒐集)
Defensive OSINT
攻擊者視角
Digital Discovery
ec/
e/
Looker-X
Outbound Hunting
連線 metadata
Intelligence-Driven Incident Response and Threat Hunting
問世間 情資是何物…
Pivot and Threat Attribution
Sample
Algorithm
version, title, author name)
Make Enrichment Great Again Infrastructure
server version, hosting provider, HTTP headers, Whois …)
addresses on public sandboxes results
情資蒐集方法及來源
tab.com/page/BQ9hxrRER9GYDMd 5d_v09Q
CTI Lifecycle
Pivot Enrichment Attribution
HTTP_PlugX_Trojan _CnC 185.161.209.234 185.161.209.234 追蹤與分析 VT Hunting & Crowdstrike Enrichment Deliver & Response IPS Detection VT similar-to: VT code- similar-to: CTI platform IP / DN Block Sample(175+) AV Block https://www.carbonblac k.com/2020/02/20/threa t-analysis-active-c2- discovery-using- protocol-emulation- part2-winnti-4-0/ 該IP經追蹤後可關聯到 VMWARE提出的威脅情資 報告 該入侵源頭標記為 Winnti4.0 該文章可取得樣本共19隻 VT: tag:winnti Infra enrichmentAttack Surface Management
platform/
Commercial
Human-Intelligence Network Anomaly Detection
工人智慧
SOC&IR如何找未知
設備 RULE
AI Network Anomaly Detection
ExtraHop & DarkTrace
SOC&IR如何找未知
連線 metadata
SOC&IR如何找未知
防毒 RULE
Endpoint Visibility and Response
傳統端點偵測應處
EVTX分析
滅證
人工IR的極限
端點偵測應處
Hunting HypothesisEDR
SOAR
Automating Threat Hunting
如果有東西把前面講的一堆手工方法半自動化…
+
ISSDU 新世代SOC架構
=
Thank You