This post is primarily for customers of RSA NetWitness (Security Analytics), although it may be interesting to security practitioners that conduct security investigations. We describe how to use the the Threat Analytics Chrome Extension (http://www.criticalstart.com/2013/01/threat-analytics-search-extension-for-chrome/) to open a NetWitness Investigator drill from a Chrome browser. This is similar to the SIEMLink tool but doesn't require any software to be installed. This could also be used to create custom REST API queries.
Many people use security tools that have a web interface in conjunction with NetWitness Investigator.
You will need:
The easiest way to find the last two items is to “Copy URL” from Investigator and paste into a text editor.
You will get something like:
nw://10.1.1.1:50003/collection=BROKER&name=%s&where=ip.dst%3D%s&time=Last+24+Hours+of+Collection+Time&
history=collection%3BROKER%26time%3DLast+24+Hours+of+Collection+Time
The IP address and port is highlighted in yellow. The collection name is highlighted in green. Your information should be different than the example shown.
We will manually add three different search providers to the Chrome Extensions (in Chrome use Tools > Extensions – Options). You will need to modify the examples below in a text editor by replacing the IP address and collection information with your specific information obtained in the steps above.
NW DST IP < 24
nw://10.1.1.1:50003/?collection=BROKER&name=%s&where=ip.dst%3D%s&time=Last+24+Hours+of+Collection+Time
&history=collection%3DBROKER%26time%3DLast+24+Hours+of+Collection+Time
NW IP SRC < 24
nw://10.1.1.1:50003/?collection=BROKER&name=%s&where=ip.src%3D%s&time=Last+24+Hours+of+Collection+Time
&history=collection%3DBROKER%26time%3DLast+24+Hours+of+Collection+Time
NW Alias.Host < 24
nw://10.1.1.1:50003/?collection=BROKER&name=%22%s%22&where=alias.host%3D%22%s%22&time=Last+24+Hours+of+Collection+Time
&history=collection%3DBROKER%26time%3DLast+24+Hours+of+Collection+Time
Example of adding a search provider in the Chrome Extension:
Example of using extension to drill into destination IP address in Investigator.
Any feedback let me know.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.