1.3 Given a scenario, use appropriate tools or techniques to determine malicious activity.

• Tools

  • Packet capture
    o Wireshark
    o tcpdump
  • Log analysis/correlation
    o Security information and
    event management (SIEM)
    o Security orchestration,
    automation, and response
    (SOAR)
  • Endpoint security
    o Endpoint detection and
    response (EDR)
  • Domain name service (DNS) and
    Internet Protocol (IP) reputation
    o WHOIS
    o AbuseIPDB
  • File analysis
    o Strings
    o VirusTotal
  • Sandboxing
    o Joe Sandbox
    o Cuckoo Sandbox
    • Common techniques
  • Pattern recognition
    o Command and control
  • Interpreting suspicious
    commands
  • Email analysis
    o Header
    o Impersonation
    o DomainKeys Identified Mail
    (DKIM)
    o Domain-based Message
    Authentication, Reporting,
    and Conformance (DMARC)
    o Sender Policy Framework
    (SPF)
    o Embedded links
  • File analysis
    o Hashing
  • User behavior analysis
    o Abnormal account activity
    o Impossible travel
    • Programming languages/scripting
  • JavaScript Object Notation
    (JSON)
  • Extensible Markup Language
    (XML)
  • Python
  • PowerShell
  • Shell script
  • Regular expressions