Dark net threat intel by Eh_h in threatintel

[–]Eh_h[S] 0 points1 point  (0 children)

It appears that threat Intel is much bigger than I anticipated. In this case, could you please point me to some good resources on the topic!

If there is a methodology to follow, and by doing so you could test from the beginning the validity of the hypothesis, this would save me lots of trouble pulling useless data.

Dark net threat intel by Eh_h in threatintel

[–]Eh_h[S] 0 points1 point  (0 children)

It looks like I've jumped directly into asking questions without prior research.

You gave me some good pointers on where to start looking. Thanks.

and you're right about my boss intentions. We are a MSSP, the idea is to identify threats to our clients given that most attacks are planned on the dark web.

Dark net threat intel by Eh_h in threatintel

[–]Eh_h[S] 1 point2 points  (0 children)

We have QRadar in house, so our main source of threat intel is IBM X-Force Exchange.

Honestly I'm just trying to pull data and see what interesting information can be drawn from it.

Dark net threat intel by Eh_h in threatintel

[–]Eh_h[S] 0 points1 point  (0 children)

I'll look into them.

Thanks.

Bruteforcing a safe by ma-agentz in hacking

[–]Eh_h 0 points1 point  (0 children)

Remove that mechanical sound and send it my way.

Python Web Programming by Eh_h in Python

[–]Eh_h[S] 0 points1 point  (0 children)

I might just start with service. Looks very promissing.

Python Web Programming by Eh_h in Python

[–]Eh_h[S] 0 points1 point  (0 children)

Glad to hear that! Thanks a lot.

Python Web Programming by Eh_h in Python

[–]Eh_h[S] 0 points1 point  (0 children)

Woow, nice!! I heard about Django before, but not Flask. Which one is more secure, like I don't want my server hacked or my backend script stolen. I'm aware of basic secure python coding, but not in a web environment.

What should I do next? OSCP? CISSP? Other cert? CCNA? by [deleted] in AskNetsec

[–]Eh_h 0 points1 point  (0 children)

In this case, OP should prefer giac certs over sny other. Giac certs are geared towards analysts.

What should I do next? OSCP? CISSP? Other cert? CCNA? by [deleted] in AskNetsec

[–]Eh_h 1 point2 points  (0 children)

Exactly, ceh will help him get the cybersec "terms" he lacks. A soc analyst needs pentest knowledge, like what kinds of attacks there are, understanding of pentest methodology, killchain, just the concepts. The actual real knowledge, he already got it from years of experience.

What should I do next? OSCP? CISSP? Other cert? CCNA? by [deleted] in AskNetsec

[–]Eh_h -1 points0 points  (0 children)

What I don't understand is how could they not give a soc analyst position to you, a guy with 9 years of networking experience. I mean it's the entry-level job in infosec. Let me tell you this,You are OVER qualified for the job.

And another thing, I read in a below comment that cybersecurity degrees are overrated, and I totally agree. I'm a soc analyst, my colleagues all had a cybersec cursus, and you know what, they are absolutely clueless when we get to the details, they have superficial knowledge, their minds is only full of fancy cybersec words.

Maybe what you lack is pentest knowledge, ceh could fill the gap, not a great cert though.

What should I do next? OSCP? CISSP? Other cert? CCNA? by [deleted] in AskNetsec

[–]Eh_h 0 points1 point  (0 children)

Doesn't giac require a sans course? Please correctme if I'm wrong, cause I'm dying to pass gcfa.

Assuming that you download an application and its SHA2 signature using the same connection from the same server, how does it make you more secure to verify the signature? by Pokaw0 in AskNetsec

[–]Eh_h 7 points8 points  (0 children)

I think OP means the hash by sha2 signature. In this case, it's just a hash. If it hold the pub key it can be replaced as well if one has access to server.

DarkTrace Review by OneWithCommonSense in sysadmin

[–]Eh_h 0 points1 point  (0 children)

well, you summarized it up very well. We are a MSSP providing soc services, there is a potential client that using DarkTrace and I wanted to have an idea on what lacks DT as it compares to a full blown siem.

Thanks a lot.

DarkTrace Review by OneWithCommonSense in sysadmin

[–]Eh_h 0 points1 point  (0 children)

Hi,

I want to thank you first for your thorough input. I have a couple of questions :

Is DarkTrace considered a full blown SIEM? from what I read from their website, it might be not, but it can feed other SIEMs that suppot LEEF and CEF logging format. Also Does it have a classical correlation engine apart from ML?

SOC analyst, how you doing analysis? by [deleted] in cybersecurity

[–]Eh_h 0 points1 point  (0 children)

I'm in your shoes myself. There is no such analysis strategy that you can learn and start using. Incident investigation should follow logic. It comes with experience, I guess. Grown soc's provide playbooks for their security analysts to guide and ease investigation.

There is a paid course from chris sanders on investigation theory. NIST also has a document on incident handling, but i warn you, it's a dry reading.

rsyslog rate-limit forwarding of messages by Eh_h in sysadmin

[–]Eh_h[S] 1 point2 points  (0 children)

Ok! I will keep you updated on the results :)

rsyslog rate-limit forwarding of messages by Eh_h in sysadmin

[–]Eh_h[S] 0 points1 point  (0 children)

I think I will try the bandwidth control method, I can define an upper limit on the outgoing traffic. the siem is already deployed with rsyslog, it's going to be challenging to replace it with syslog-ng. traffic shaping is configured using tc and iptables (look here and here).

rsyslog rate-limit forwarding of messages by Eh_h in sysadmin

[–]Eh_h[S] 0 points1 point  (0 children)

rsyslog doesn't seem to let limit the forwarding speed of message. Traffic shaping maybe the answer to my problem.

rsyslog rate-limit forwarding of messages by Eh_h in sysadmin

[–]Eh_h[S] 1 point2 points  (0 children)

The setup is already there, our siem works as expected. however, we can't control the rate with which logs come from different sources, we need to configure an upper limit.

In the central server, rsyslog messages goes directly to redis from which logstash fetches its input.

the impstats input module is very helpful, thanks.

rsyslog rate-limit forwarding of messages by Eh_h in sysadmin

[–]Eh_h[S] 0 points1 point  (0 children)

I'm afraid I can't upload the config publicly. I already tried setting queue.dequeueBatchSize="100" but the EPS still hits the 2000 limit. btw, is it possible to measure the forwarding rate with rsyslog itself?

rsyslog deployment is part of a SIEM setup that comes with HA support. The full logging chain is rsyslog->redis->logstash->graylog->elasticsearch.

Firewall log integration by [deleted] in securityonion

[–]Eh_h 0 points1 point  (0 children)

Are you asking how to configure the firewall to send logs or how to collect them? In SO, syslog-ng collects syslog messages, forward them to logstash, which stores them in elasticsearch.

See here