As one of the fundamental protocols of the Internet, DNS is involved in nearly every traffic flow into or out of an enterprise environment. Despite its ubiquity, however, DNS is not always recognized for the forensic potential it holds. By capturing and analyzing DNS requests and replies from the local network, security teams can then enrich those events with external, threat-oriented DNS data to help with triage and risk assessment.
But the possibilities extend well beyond simply assessing the risk of individual traffic flows. Since hostile domains are almost always part of a larger campaign, any DNS activity related to one domain can represent the leading edge of a process that can lead to insights into, and protection from, these larger campaigns. Consider:
Armed with this information, threat hunters, incident responders, and other SOC personnel can take specific responsive or proactive actions, including:
None of these actions would be possible without a) awareness of domains requested by trusted hosts; and b) enrichment of those domains with DNS, Whois, and other such data.
In this live presentation, host Tim Helming will illustrate methods for identifying key sources of DNS data, and for enriching those logs or events with DomainTools APIs, UI-based tools, and third-party integrations, using recently-active threat infrastructure for demonstration.