Automating the IR and investigation processes
In this section, we are going to start an investigation from the generation of an alert and the creation of a case of an incident. First, we need to emulate an attack.
Emulating the attack
To emulate malicious behavior and generate the detection of this activity, we will use the following tools:
- Certutil: A Windows command-line utility that is regularly used to get certificate authority information and to configure certificate services. A threat actor can abuse this utility to download malicious programs from the internet and/or encode the content of these files to avoid detection.
- ProcDump: This tool is part of the Windows Sysinternals utility suite and is used to monitor applications and generate crash dumps to analyze and determine the causes of the failure. A threat actor can abuse this tool by creating a dump of processes such as Local Security Authority Subsystem (LSASS), from which Windows credentials can be extracted...