Blue Team Handbook Incident Response Edition
Blue Team Handbook Incident Response Edition
Blue Team Handbook Incident Response Edition
List of Tables
Table 1 Step One: Preparation 5
Table 2 Step Two: Identification 9
Table 3 Step Three: Containment 11
Table 4 Step Four: Eradication 14
Table 5 Step Five: Recovery 14
Table 6 Step Six: Lessons Learned (or Follow Up) 15
Table 7 Categorize Cyber Attack's Effects (MITRE) 17
Table 8 PenTest Authorization Letter (Skoudis) 20
Table 9 Six Step Structured Incident Response Template 26
Table 10 Commercial Structured Incident Response Template 28
Table 11 Google Search Examples 35
Table 12 Google Search Terms for Incident Response 35
Table 13 NetCat Relay Setup 43
Table 14 Masscan Examples 47
Table 15 WFT Quick Start 51
Table 16 Mandiant RedLine Quickstart 52
Table 17 Prepare Environment for Collection (Windows) 54
Table 18 Mandiant Memoryze Quick Start 55
Table 19 Volatility Example for Win2008 SP1 56
Table 20 Windows Environment Data Collection (Native) 57
Table 21 Windows Environment Data Collection (Third Party) .59
Table 22 FTK Imager Collection 60
Table 23 Supplemental System Collection (Windows) 61
Table 24 Process Explorer View of Normal Processes 62
ii
Table of Contents
List of Figures
Figure 1 Conflict Superimposed on Six Steps 4
Figure 2 Seven Domains of IT Infrastructure 16
Figure 3 Malware/Automated Attacker General Process 33
Figure 4 Determined Attacker General Process 33
Figure 5 NIST 800-115 Penetration Test Process 34
iii
Table of Contents
iv