Exercise 1

Scenario:

You are testing out a new IP based network threat feed. Determine all of the threat categories listed in the feed. Which threat category is the most prevalent in this feed?

Exercise 1 Threat Feed

Exercise 2

Scenario:

You are provided with two IP based network threat feeds. Determine the overlap (if any) between the two feeds.

Exercise 2 Threat Feed 1

Exercise 2 Threat Feed 2

Exercise 3

Scenario:

You have a sample network log and a sample threat feed list. The entries in each file have already been labeled with an ingress/egress flag depending on the flow direction of the network connection of threat. Using IP address and direction, determine how many alerts you would have in this small network data sample.

Exercise 3 Sample Network Data

Exercise 3 Threat Feed

Exercise 4

Scenario:

You have been provided with a sample list of threat feed alerts which have triggered in your environment. The sample list is composed of target ip address and a description of the threat. Use the provided passive DNS sample file to figure out how many domains have been seen for each IP address in your alerts.

Exercise 4 Threat Feed Alerts

Exercise 4 Forward DNS Data

Hints

The linux comm command can be used to compare similar lines between two files. Here is an example of how to use the command

comm -12 file1.txt file2.txt

You can use awk to print a single column from a CSV. The following example shows how:

awk -F',' '{print $1}' file.csv

You can stream the results of a linux sub command though stdin to make it act as if your data is a file. Here is an example:

cat <(echo "how now brown cow")