Scripts and signatures

Zeek scripts can refer to signatures and other Zeek scripts. This flexibility provides a massive advantage in event correlation.

Questions

Ensure you are in the right directory to find the pcap file and accompanying files: Desktop/Exercise-Files/TASK-7

Go to folder TASK-7/101. Investigate the sample.pcap file with the 103.zeek script. Investigate the terminal output. What is the number of the detected new connections?

ubuntu@ip-10-10-218-60:~/Desktop/Exercise-Files/TASK-7/101$ zeek -C -r sample.pcap 103.zeek | grep "New Connection Found" | wc -l
87

Go to folder TASK-7/201. Investigate the ftp.pcap file with ftp-admin.sig signature and 201.zeek script. Investigate the signatures.log file.

zeek -C -r ftp.pcap -s ftp-admin.sig 201.zeek

What is the number of signature hits?

ubuntu@ip-10-10-218-60:~/Desktop/Exercise-Files/TASK-7/201$ cat signatures.log | grep "ftp-admin" | wc -l
1401

Investigate the signatures.log file. What is the total number of administrator username detections?

ubuntu@ip-10-10-218-60:~/Desktop/Exercise-Files/TASK-7/201$ cat signatures.log | grep "administrator" | wc -l
731

Investigate the ftp.pcap file with all local scripts, and investigate the loaded_scripts.log file. What is the total number of loaded scripts?

zeek -C -r ftp.pcap local
ubuntu@ip-10-10-218-60:~/Desktop/Exercise-Files/TASK-7/201$ cat loaded_scripts.log | grep ".zeek" | wc -l
498

Go to folder TASK-7/202. Investigate the ftp-brute.pcap file with the /opt/zeek/share/zeek/policy/protocols/ftp/detect-bruteforcing.zeek script.

zeek -C -r ftp-brute.pcap /opt/zeek/share/zeek/policy/protocols/ftp/detect-bruteforcing.zeek

Investigate the notice.log file. What is the total number of brute-force detections?

ubuntu@ip-10-10-218-60:~/Desktop/Exercise-Files/TASK-7/202$ cat notice.log | grep "Bruteforcing" | wc -l
2