Step 1: Understand the Objective
Objective:
12:10 AM to 12:12 AM on August 17, 2024
CCOA Threat Bulletin.pdf
~/Desktop/CCOA Threat Bulletin.pdf
Step 2: Prepare for Investigation
2.1: Ensure Access to the File
ls ~/Desktop | grep "CCOA Threat Bulletin.pdf"
xdg-open ~/Desktop/CCOA\ Threat\ Bulletin.pdf
Alternatively, convert to plain text for easier analysis:
pdftotext ~/Desktop/CCOA\ Threat\ Bulletin.pdf ~/Desktop/threat_bulletin.txt
cat ~/Desktop/threat_bulletin.txt
2.2: Analyze the Content
Look for domain names listed in the bulletin.
Make note ofany domainsorURLsmentioned as IoCs (Indicators of Compromise).
Example:
suspicious-domain.com
malicious-actor.net
threat-site.xyz
Step 3: Locate Network Logs
3.1: Find the Logs Directory
/var/log/
/home/administrator/hids/logs/
/var/log/httpd/
/var/log/nginx/
cd /var/log/
ls -l
ls -l | grep -E "dns|network|http|nginx"
Step 4: Search Logs for Domain Contacts
4.1: Use the Grep Command to Filter Relevant Timeframe
Since we are looking for connections between12:10 AM to 12:12 AMonAugust 17, 2024:
grep "2024-08-17 00:1[0-2]" /var/log/dns.log
Explanation:
grep "2024-08-17 00:1[0-2]": Matches timestamps between00:10and00:12.
Replace dns.log with the actual log file name, if different.
4.2: Further Filter for Domain Names
grep -E "(suspicious-domain.com|malicious-actor.net|threat-site.xyz)" /var/log/dns.log
If the logs are in another file, adjust the file path:
grep -E "(suspicious-domain.com|malicious-actor.net|threat-site.xyz)" /var/log/nginx/access.log
Step 5: Correlate Domains and Timeframe
5.1: Extract and Format Relevant Results
grep "2024-08-17 00:1[0-2]" /var/log/dns.log | grep -E "(suspicious-domain.com|malicious-actor.net|threat-site.xyz)"
2024-08-17 00:11:32 suspicious-domain.com accessed by 192.168.1.50
2024-08-17 00:12:01 malicious-actor.net accessed by 192.168.1.75
Step 6: Verification and Documentation
6.1: Verify Domain Matches
Cross-check the domains in the log output against those listed in theCCOA Threat Bulletin.pdf.
Ensure that the time matches the specified range.
6.2: Save the Results for Reporting
grep "2024-08-17 00:1[0-2]" /var/log/dns.log | grep -E "(suspicious-domain.com|malicious-actor.net|threat-site.xyz)" > ~/Desktop/domain_hits.txt
cat ~/Desktop/domain_hits.txt
Step 7: Report the Findings
Final Answer:
Domain(s) Contacted:
suspicious-domain.com
malicious-actor.net
Time of Contact:
Between 12:10 AM to 12:12 AM on August 17, 2024
Reasoning:
Step 8: Recommendations:
Immediate Block:
Monitor for Further Activity:
Perform IOC Scanning:
Incident Report: