This week: Windows, Sysmon, logs, SIEM

Windows #

I learned more about Windows architecture, registry, and core processes, what's normal and what's not.

SANS webinar - Evolution of SOC Automation #

By Erik Van Buggenhout and Wouter Stinkens They both work at Nviso This is was a super interesting demo and explanations. From what I understand it's still difficult to have consistent results which is necessary. A bit like in functionnal programming, if you have the same event, you should get you the same result wheter it's a true positive or a false positive.

Tools and Skills for Security Analysts #

This conversation was super insightful.

A few notes:

Logstail academy #

I had the opportunity to get access to Logstail learning platform. The strong point of this platform is the hands-on labs with the possibility of performing attacks and then using the Logstail SIEM to detect the attack. I did the following courses:

But the quiz were really too easy though

TIL #

Why does a nmap SYN scan needs permission and not a TCP scan? #

For a TCP scan, the TCP handshake is completed, so it's less discreet than a SYN scan, but you don't need sudo permission.

nmap -sT 192.168.1.1

During a SYN scan, the TCP handshake is not completed.

nmap -sS 192.168.1.1

So you need to create just a SYN packet and creating raw packets is a privileged operation in most operating systems, as it could be abused.