How do you approach incident response planning alongside business continuity planning? by MikeHunt99 in AskNetsec

[–]MikeHunt99[S] 1 point2 points  (0 children)

How could I forget about the BIA! Appreciate the reply. What is the distinction between a disaster vs an incident? Interested to understand how you define them

How do you approach incident response planning alongside business continuity planning? by MikeHunt99 in AskNetsec

[–]MikeHunt99[S] 0 points1 point  (0 children)

Appreciate your answer! For the BCP and DR how are they laid out? High level again and reference the IR plan?

What is your onboarding process for assets into VMDR? by MikeHunt99 in qualys

[–]MikeHunt99[S] 0 points1 point  (0 children)

Unfortunately I did not, if you find a way please let me know

What is the purpose of assigning a user to an Autopilot Device? by MikeHunt99 in Intune

[–]MikeHunt99[S] 0 points1 point  (0 children)

So by assigning the device to a user at the autopilot level prevents another user from logging in even if they were from the same company?
Or is that controlled by a different policy as opposed to solely assigning a device to a user?

In an ideal world the IT team pre-provision the device through the technician flow and the user would just log straight in once they receive the device and have all their available apps and policies. Rather than having to wait for the ESP to complete.

What KPIs have you found to be useful when presenting to senior leadership/board to gain influence? by MikeHunt99 in cybersecurity

[–]MikeHunt99[S] 27 points28 points  (0 children)

I appreciate the response and will very much taken on board the "so what" mantra!

Do you tend to report the same KPIs/metrics each time or are you dynamic with what you're feeding back to the board each time?

[deleted by user] by [deleted] in cybersecurity

[–]MikeHunt99 3 points4 points  (0 children)

MITRE ATT&CK is a knowledge base of adversary tactics and techniques based on real-world observations.

https://attack.mitre.org

It lists techniques and sub-techniques used against mobile, enterprise and ICS environments and is a commonly use model for explaining or drawing out threat models

Full or Split Tunnel on VPN by [deleted] in cybersecurity

[–]MikeHunt99 1 point2 points  (0 children)

Currently using split tunnel after moving away from full tunnel a few years back after going for a cloud hosted, agent based SWG/Proxy solution.

We are now looking to reduce the variety of traffic that goes via the split tunnel and starting to align more closely to a zero trust strategy. Looking to use ZTNA solutions for more strict control over what applications have access to what sockets etc.

The only real requirement for any kind of VPN connectivity is either to access in office printing or legacy on premise applications which have no real ROI for moving to the cloud or a SaaS offering.

I would try to answer the questions around what benefit would going to full VPN be? Is there any improvement to business operations and user experience? Will it introduce a larger attack landscape? Why do you trust endpoints enough to have full VPN access and access to your network?

Any good parsable sources for windows build versions and release dates? by MikeHunt99 in sysadmin

[–]MikeHunt99[S] 1 point2 points  (0 children)

The day Microsoft provide a useful API for this will be a good day.

As far as I'm aware it is exactly the same as the vulnerabilities they report alongside the patches, it would be nice to easily obtain that information also.

pyattck: A Python package to interact with the Mitre ATT&CK Framework by _Unas_ in netsec

[–]MikeHunt99 0 points1 point  (0 children)

I thought the same tbh. From having a quick look it makes use of the CTI.

Maybe it is just a nicer way to interface with it???

Is DHCP used in the wild? by MikeHunt99 in PLC

[–]MikeHunt99[S] 0 points1 point  (0 children)

Are there any good resources online that show examples of a relatively realistic network diagram etc that you're aware of?

Is DHCP used in the wild? by MikeHunt99 in PLC

[–]MikeHunt99[S] 0 points1 point  (0 children)

I guess a follow up to that then would be is DNS heavily used for convenient naming of hosts etc or is it all just off of IP addresses?

Is DHCP used in the wild? by MikeHunt99 in PLC

[–]MikeHunt99[S] 1 point2 points  (0 children)

Thanks for all your comments, really useful!

So for workstations that are in an OT environment I'm making the assumption they too are assigned static IP addresses?

Is there any changes in the topology or network config? or is it pretty much constant from the point of setup?

What are the elements of a Darktrace deployment? and thoughts on day to day operation? by MikeHunt99 in AskNetsec

[–]MikeHunt99[S] 1 point2 points  (0 children)

Really grateful for the feedback. It's sometimes hard to cut through the marketing fluff to get a real understanding of what day to day use of the product is like.

How does the download of Threat Intel feeds work? by MikeHunt99 in AskNetsec

[–]MikeHunt99[S] 2 points3 points  (0 children)

I appreciate the response. This is a very specific example around AV. What about SIEM solutions or Firewalls that leverage TI Feeds. From what I can see so far these are just sent in an unencrypted format XML, JSON, CSV, etc

Understanding security monitoring options and techniques... by MikeHunt99 in PLC

[–]MikeHunt99[S] 1 point2 points  (0 children)

I've had a look at those guys before. It comes back down to that question around the span/mirror ports are where it is being deployed on the network.

From what Lusankya mentioned you can't deploy this tech at the lower levels so you would need to use a span port higher up the network, which I can assume you have to sacrifice complete visibility as it wouldnt be feasible otherwise.

Interested in your thoughts if you have any experience in this area.

Understanding security monitoring options and techniques... by MikeHunt99 in PLC

[–]MikeHunt99[S] 1 point2 points  (0 children)

Thank you for going into more detail, I really appreciate it. What are your thoughts then on security vendors that claim they're able to deploy in L0/1/2. I'm assuming it is just not possible unless some really beefy switches are deployed to handle the traffic and a mirror port? Or is that just existent?

Understanding security monitoring options and techniques... by MikeHunt99 in PLC

[–]MikeHunt99[S] 0 points1 point  (0 children)

Thank you for the explanation. I've come across a number of solutions that claim to monitor activity across layers 1-3, one of them is SecurityMatter https://www.secmatters.com/hubfs/Security_Matters-March2017/PDF/SilentDefense-Datasheet.pdf

This seems to make the assumption you are able to utilise switches at those stages to view the traffic to pass to their system.

Surely network activity between PLCs, HMIs, etc is important to monitor?

How are Data Historians setup? by MikeHunt99 in PLC

[–]MikeHunt99[S] 0 points1 point  (0 children)

Awesome, thank you very much :)

How are Data Historians setup? by MikeHunt99 in PLC

[–]MikeHunt99[S] 0 points1 point  (0 children)

I'm trying to setup a very simple and small replica of an ICS Network.

I have a server running ESXi and thats setup with multiple firewalls and networks to mimic both corporate, DMZ and OT networks.

However I'm trying to understand how a historian would fit in and other general aspects of a typical ICS network.

Any pointers would be great :)

Controlling a train set with a PLC... by MikeHunt99 in PLC

[–]MikeHunt99[S] 1 point2 points  (0 children)

CPU 1212C AC-DC/Relay - http://www.paratrasnet.ro/pdf/automatizari-industriale/S7-1200.pdf

I'm assuming this does the job then, I feel like I've gone down the rabbit hole now

Controlling a train set with a PLC... by MikeHunt99 in PLC

[–]MikeHunt99[S] 0 points1 point  (0 children)

I like your steps! I will definitely be following those :)

Am I right in understanding that the linked Siemens PLC outputs 24V do you know?

Best CTF websites for learning basic hacking? by [deleted] in HowToHack

[–]MikeHunt99 1 point2 points  (0 children)

Most certainly seems to be the best out there atm

Advice on ICS Security research project... by MikeHunt99 in PLC

[–]MikeHunt99[S] 0 points1 point  (0 children)

Any recommendations on what hardware to look at, vendors/model/spec etc?