Evaluate and establish a baseline of normal network activity and detect deviations that may indicate malicious behaviors such as lateral movement, beaconing, exfiltration, or command and control (C2) activity.
Given access to Security Onion, Zeek logs, Suricata alerts, full packet capture (PCAP), and knowledge of the environment’s expected network layout and mission roles.
A network baseline is documented and deviations from normal behavior are identified and tagged for escalation or eradication actions.
Confirm which telemetry sources are active on Security Onion:
sudo so-status
Operator Note: If Zeek is down, restart sensors before proceeding. Zeek is critical for establishing the baseline.
Area | What to Baseline | Why |
---|---|---|
Internal to Internal | AD, DNS, SMB, RDP, File Shares | Identify lateral movement pathways |
Internal to External | Web, Email, VPN | Identify normal business flows |
Inbound | VPN, Reverse Proxies | Ensure only expected services are exposed |
Outbound to Unusual Destinations | Rare external IPs/Domains | Potential C2 or data exfiltration |
event.dataset:zeek.conn AND network.direction:"outbound"
event.dataset:zeek.dns
event.dataset:zeek.ssl
Operator Note: Record observed legitimate hosts and expected domains (office365.com, google.com, internal NTP servers).
Using Zeek conn logs:
zcat /nsm/zeek/logs/current/conn.log.gz | zeek-cut id.orig_h id.resp_h id.resp_p service
Example results:
192.168.1.10 192.168.1.1 53 dns
192.168.1.10 192.168.1.5 445 smb
192.168.1.10 8.8.8.8 443 ssl
Document in table format:
Source IP | Dest IP | Port | Service | Notes |
---|---|---|---|---|
192.168.1.10 | 192.168.1.5 | 445 | SMB | Normal domain traffic |
192.168.1.10 | 8.8.8.8 | 443 | SSL | Expected web traffic |
Indicator Type | How to Find | Example IOC |
---|---|---|
Beaconing Behavior | Zeek conn logs → periodic, regular intervals | conn.log → Check duration/intervals |
External Connections to Rare IPs | Zeek conn logs + threat feeds | IP addresses → known malicious IPs |
DNS Tunneling | Zeek dns.log → very long query names | suspicious.domain.exfil.data.com |
Non-standard Ports | Zeek conn.log → high or unexpected ports | RDP (3389) → from internal clients |
SMB/LDAP Lateral Movement | Zeek smb.log or conn.log → host-to-host SMB traffic | Multiple internal hosts communicating unexpectedly |
Cleartext Credentials | Zeek http.log, Suricata alerts | HTTP login forms over port 80 |
Unusual User-Agent Strings | Zeek http.log | Custom User-Agent indicating tool-based C2 |
Operator Note: Use correlation and time-series views in Kibana to look for repeat patterns or relationships between hosts.
Operator Note: Always ask → many false positives can be ruled out by simple questions to owners.
Tool | Platform | Installation | Usage |
---|---|---|---|
Zeek | Built-in (Security Onion) | Native | Network metadata analysis |
Wireshark | Cross-platform | Package manager | PCAP analysis |
ELK / Kibana | Built-in (Security Onion) | Native | Search and visualization |
Threat Intelligence Feeds | External | N/A | IOC correlation |
Date | Version | Description | Author |
---|---|---|---|
2025-05-02 | 2.0 | Fully expanded version with IOCs, examples, and deep operator context | Leo |