WhileNetworking

  • Home
  • CCNA
  • Cisco Packet Tracer Download
    • Cisco packet tracer 6.3
    • cisco packet tracer 6.2
    • Cisco Packet Tracer 7
  • Linux Server Management
  • About Us
  • Privacy Policy
  • Contact Us

Security Operations Center Analyst Tools

You are most welcome to this post.
Really thanks to you for your interest in this topics. :)

A SOC relies on a supporting infrastructure of tools and systems that provide the following services:

  • Network mapping
  • Network monitoring
  • Vulnerability detection
  • Penetration testing
  • Data collection
  • Threat and anomaly detection
  • Data aggregation and correlation

Examples of tools that are used in a SOC include:

  • Security Onion: A Linux-based distribution that is provided by Doug Burks.Security Onion provides tools that offer the following:
    1. Log management
    2. Network security monitoring (NSM)
    3. IDS capabilities

    Security Onion is composed of the following components:

      • Snort
      • Suricata
      • Bro
      • OSSEC
      • Sguil
      • Squert
      • ELSA
      • Xplico
      • NetworkMiner 

    Each of these tools aids the guard shrink in vigil textile telemetry collection and then analyzing that accumulation to mold if a cloth intrusion has occurred. For information, IDS alerts are generated from Inhale or Suricata. A instrument psychiatrist could use ELSA to ask log collection from otherwise sources to reassert the lively messages that are received from Inhale. Sguil is a real-time event and term monitoring agency that displays aggregation for a assets psychiatrist in an nonrational GUI. These types of tools are utilised by department analysts to accomplish their jobs.

    Mesh shrink tools: Offer boat bewitch and mesh reciprocation IP rate analytics capabilities that can be utilized to happen anomalous meshing trait.

    Popular network analyst tools include:

    1. Wireshark
    2. Netwitness
    3. OSSEC
    4. NetFlow
    5. Cisco Stealthwatch

      Below is an example of NetFlow data being displayed in Cisco StealthWatch. Cisco StealthWatch can show different views of the IP flows on the network, which are based on network devices that are configured to send NetFlow data to Cisco StealthWatch.

      NetFlow data being displayed in Cisco StealthWatch

      NetFlow data being displayed in Cisco StealthWatch

      Penetration investigating tools: The purport of onrush investigating is to actually employ weaknesses. A onset essay simulates the actions of an attacker who aims to rift the substance department of the structure. Using more tools and techniques, the onset quizzer (honourable hacker) attempts to utilise captious systems and mount make to tender assemblage. A danger categorisation is the operation that looks for proverbial vulnerabilities in the aggregation systems and reports possibility exposures. Penetration investigating and vulnerability categorisation are ofttimes incorrectly used interchangeably, which has created mistake for more enterprises. Most organizations usually begin with a vulnerability sorting, and act on its results to either destroy those weaknesses or concentrate in their improved safeguard bear. Kali Linux contains a magnanimous signaling of onslaught testing tools from varied niches of the surety and forensics comic, tools such as Metasploit Framing, Armitage, and SET (Ethnical Soul Toolkit). The illustration below shows an ideal of using Armitage to exploit the Athapaskan Struts danger to open a blow instrumentation to the defenceless Athapascan computer (192.168.1.107).

      using Armitage to exploit the Apache Struts vulnerability

      Using Armitage to exploit the Apache Struts vulnerability

Aug 6, 2018Himadri
 

Share with friends :

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • Click to email a link to a friend (Opens in new window)
  • Click to share on Pocket (Opens in new window)
  • Click to share on Telegram (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to print (Opens in new window)

Related

Security Operations Center & its typesSecurity Operations Center: Data Analytics

Leave a Reply Cancel reply

four × one =

Himadri

Hi, I'm Himadri. I love blogging with tech topics, specially computer networking. We'll have more fun in the upcoming day. Stay with me. :)

August 6, 2018 Cyber Security242
Feel Free to Share :)
0
GooglePlus
0
Facebook
0
Twitter
0
Digg
0
Delicious
0
Stumbleupon
0
Linkedin
0
Pinterest
Find Us on Facebook
Choose a category !!
  • CCNA
  • Cisco Certification Exam
  • cisco packet tracer 6.2
  • Cisco packet tracer 6.3
  • Cisco Packet Tracer 7
  • Cisco Packet Tracer 7.1
  • Cisco Packet Tracer 7.2.1
  • Cisco Packet Tracer 7.3
  • Cyber Security
  • Engineering Ebooks
  • Excel
  • IELTS Ebook
  • Internet
  • Know computer
  • Know your computer
  • Laser Processing of Material
  • Linux installation and server management
  • PDF
  • Technology
  • Uncategorized
Top posts
  • Free download Principles of Electronics by VK Mehta
  • Free download Cisco Packet Tracer 7 for linux (64 bit)
  • Packet tracer 6.2 student version for Linux - Free download
Archieves
Get latest updates by Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 19 other subscribers
W
SC
wordpress counter
Analytics
Recent Comments
    Browse by categories
    Cyber SecurityLinux installation and server managementCCNAKnow your computerKnow computerCisco Packet Tracer 7UncategorizedCisco Certification ExamInternetPDFCisco Packet Tracer 7.3Engineering EbooksCisco packet tracer 6.3cisco packet tracer 6.2Cisco Packet Tracer 7.1TechnologyExcelLaser Processing of MaterialCisco Packet Tracer 7.2.1IELTS Ebook
    Feel free to contact with us

    Hi, any kind of comment or suggestion is valuable to us. So feel free to contact with us.

    Email: himadri.shekhar.bd@gmail.com

    Name: WhileNetworking.com

    2021 © WhileNetworking
     

    Loading Comments...