CND
  • CND
    • WHOAMI
    • PROJECTS
      • DEV
        • PERSONAL WEBSITE
        • GITHUB
        • ARDUINO
        • CTFD
      • CYBER
        • PERSONAL CYBER RANGE
    • SELF DEVELOPMENT
      • TRAINING PLATFORMS
      • PREP MATERIALS
        • OPERATOR DEVELOPMENT & INTEGRATION EFFORT (ODIE) ASSESSMENT
        • COMPUTER NETWORK ASSESSMENT BATTERY (CNAB)
        • COMPUTER NETWORK OPERATIONS QUALIFICATION COURSE (CNOQC)
        • COMPUTER NETWORK OPERATIONS DEVELOPMENT PROGRAM (CNODP)
        • DATA ENGINEER
        • CYBER COMMON TECHNICAL CORE (CCTC)
      • WRITEUPS/WALKTHROUGHS
        • HTB ACADEMY
          • 01.BUG BOUNTY HUNTER
          • 02.PENETRATION TESTER
        • HTB LABS
          • STARTING POINT
            • TIER 0
              • 01.MEOW (TELNET)
              • 02.FAWN (FTP)
              • 03.DANCING (SMB)
              • 04.REDEEMER (REDIS DB - ANONYMOUS ACCESS)
              • 05.EXPLOSION (RDP - WEAK CREDS)
              • 06.PREIGNITION (WEB FORM LOGIN)
              • 07.MONGOD (MONGODB)
              • 08.SYNCED (RSYNC)
            • TIER 1
              • 01.APPOINTMENT (SQL INJECTION)
              • 02.SEQUEL (MYSQL)
              • 03.CROCODILE (FTP & WEB FORM LOGIN)
              • 04.RESPONDER (RFI, NTLM CAPTURE, PW CRACKING & WINRM)
              • 05.THREE (AWS S3 BUCKET)
              • 06.IGNITION (DIRECTORY ENUMERATION & BRUTE FORCE)
              • 07.BIKE (SSTI)
              • 08.FUNNEL (PASSWORD SPRAYING & LOCAL PORT FORWARDING)
              • 09.PENNYWORTH (GROOVY SCRIPTING & REVERSE SHELL)
              • 10.TACTICS (SMB)
            • TIER 2
              • 01.ARCHETYPE (PRIVESC & MSSQL SERVER)
              • 02.OOPSIE
              • 03.VACCINE
              • 04.UNIFIED
              • 04.INCLUDED
              • 05.MARKUP
              • 06.BASE
          • INTRO TO BLUE TEAM
            • BRUTUS (SSH)
            • BFT (MFT)
            • UNIT42 (SYSMON/EVENT LOGS)
        • THM
          • ADVENT OF CYBER
            • 2024
            • 2023
            • 2022
          • SOC LEVEL 1
            • PRACTICAL EXERCISES
              • NETWORK SECURITY & TRAFFIC ANALYSIS
                • SNORT
                • NETWORK MINER
                • ZEEK
                • BRIM
                • WIRESHARK: BASICS
                • WIRESHARK: PACKET OPERATIONS
                • WIRESHARK: TRAFFIC ANALYSIS
                • TSHARK: THE BASICS
                • TSHARK: CLI WIRESHARK FEATURES
              • ENDPOINT SECURITY MONITORING
                • INTRO TO ENDPOINT SECURITY
            • SKILLS ASSESSMENT
              • NETWORK SECURITY & TRAFFIC ANALYSIS
                • SNORT CHALLENGE (BASICS)
                • SNORT CHALLENGE (LIVE ATTACKS)
                • ZEEK EXERCISES
                • TSHARK CHALLENGE I: TEAMWORK
                • TSHARK CHALLENGE II: DIRECTORY
              • ENDPOINT SECURITY MONITORING
        • HOLIDAY HACK CHALLENGE (SANS)
          • 2024:SNOW-MAGGEDON
      • PROVING GROUNDS
        • ADVENT OF CYBER: SIDE QUEST (THM)
          • 2024
        • CMU
        • CYBER FLAG
        • PRESIDENT'S CUP
        • MEC-T
      • COLLEGE
        • 03.DAKOTA STATE UNIVERSITY (DSU)
          • 2025
            • 01.CSC428: REVERSE ENGINEERING
          • 2024
            • 01.CSC314: ASSEMBLY LANGUAGE
            • 02.CSC300: DATA STRUCTURES
              • 01.C++ OVERVIEW: CLASSES & DATA ABSTRACTION
              • 02.OBJECT ORIENTED DESIGN & C++
              • 03.POINTERS
              • 04.ARRAY-BASED LIST
              • 05.LINKED LISTS
              • 06.DOUBLY LINKED LIST
              • 07.STACKS
              • 08.QUEUES
              • 09.BINARY TREES
          • 2023
            • 01.CSC250: COMPUTER SCIENCE II
            • 02.CSC334: WEB DEVELOPMENT
            • 03.MATH201: INTRODUCTION TO DISCRETE MATHEMATICS
        • 02.UNIVERSITY OF ARIZONA (UA)
        • 01.TECHNICAL COLLEGE OF THE LOWCOUNTRY
      • NOTES
  • PLAYBOOK
    • DCO
      • 01.PRE-ENGAGEMENT
        • PLAN
          • PDSS
            • 02.ROE
        • PREPARE
          • MPN
          • HSMC
            • 01.CTI
            • 02.DETECTION ENGINEERING
            • RFI
      • 02.ENGAGEMENT
        • EXECUTE
          • 01.PRE-HUNT
            • TAP/SENSOR DEPLOYMENT
          • 02.THREAT HUNTING
            • 00.INFORMATION GATHERING
            • 01.TRAFFIC ANALYSIS
              • LOW-HANGING FRUIT
                • HOST IDENTIFICATION
                  • WIRESHARK
                  • TSHARK
                • CLEARTEXT CREDENTIALS
                  • WIRESHARK
                • CLEARTEXT PROTOCOLS
                  • WIRESHARK
                    • FTP ANALYSIS
                    • HTTP ANALYSIS
                    • LOG4J ANALYSIS
                • DNS QUERIES
                  • TSHARK
                • USER-AGENTS
                  • TSHARK
              • PORT SCANS
                • WIRESHARK
                • KIBANA
                • SPLUNK
              • ARP POISONING
                • WIRESHARK
              • TUNNELING (DNS/ICP)
                • WIRESHARK
                  • ICMP TUNNELING
                  • DNS TUNNELING
              • ENCRYPTED PROTOCOLS
                • WIRESHARK
                  • HTTPS ANALYSIS
                    • SNI INSPECTION
                    • ENCRYPTION KEY LOG FILE
            • 02.LOG ANALYSIS
          • INCIDENT RESPONSE
            • 01.PREPARATION
            • 02.IDENTIFICATION
            • 03.CONTAINMENT
            • 04.ERADICATION
            • 05.RECOVERY
            • 06.LESSONS LEARNED
          • FORENSICS
            • 01.ACQUISITION
            • MALWARE ANALYSIS
            • REVERSE ENGINEERING
        • ASSESS
      • 03.POST-ENGAGEMENT
        • DEBRIEF
        • DOCUMENTATION
          • MISSION DEFENSE PLAN/RISK MITIGATION PLAN
            • VULNERABILITY GUIDE
    • OCO
      • 01.PRE-ENGAGEMENT
        • 01.PDSS
        • 02.ROE
        • 03.RESOURCE DEVELOPMENT
          • 01.INFRASTRUCTURE DEVELOPMENT
          • 02.MALWARE DEVELOPMENT
          • 03.EXPLOIT DEVELOPMENT
      • 02.ENGAGEMENT
        • 01.IN
          • 01.PRE-ACCESS
            • 01.VPN CONNECTION
            • 02.ANALYST LOGGING
            • 03.OPNOTES
          • 02.INITIAL ACCESS/FOOTHOLD
            • INFORMATION GATHERING
              • RECONNAISSANCE
              • VULNERABILITY ASSESSMENT
                • WEB SERVERS
                  • SOURCE CODE REVIEW
                  • VULNERABILITY IDENTIFICATION
                    • SEARCHSPLOIT
                    • EXPLOIT DB
                  • VULNERABILITY SCANNING
                    • NIKTO
            • WEAPONIZATION
              • OBFUSCATION
                • JAVASCRIPT
              • SHELLCODES
              • PASSWORDS/PINS
                • PINS
                • DICTIONARY
                • CUSTOM WORDLIST
                  • USERNAMES
                  • PASSWORDS
              • TROJANS
                • TROJAN BACKDOOR
              • MALICIOUS DOCUMENTS
                • MACRO EMBEDDING DOCX
              • SCRIPTS
                • ENUMERATION
                  • PYTHON
                    • PARAM-FUZZER.PY
                  • BASH
                • WSDL
                  • SQLI
                  • CMD INJECTION
            • DELIVERY
              • SOCIAL ENGINEERING
              • WATERING HOLE
              • SUPPLY CHAIN
            • EXPLOITATION
              • TYPE
                • INJECTIONS
                  • CLIENT-SIDE
                    • CROSS-SITE SCRIPTING (XSS)
                      • XSS DISCOVERY
                        • XSS TESTING (MANUAL)
                        • XSS TESTING (HYBRID)
                      • WEBPAGE DEFACEMENT
                      • XSS PHISHING
                      • XSS SESSION HIJACKING (AKA COOKIE STEALING)
                        • BASIC XSS TESTS
                        • OBTAINING SESSION COOKIES (PHP SERVER)
                        • OBTAINING SESSION COOKIES (NETCAT SERVER)
                    • SQL INJECTION (SQLI)
                      • 01.SQLI DISCOVERY
                        • 01.SQLI TESTING (MANUAL)
                          • URL PARAMETER METHOD
                          • LOGIN FORMS
                        • 01.SQLI TESTING (HYBRID)
                          • SQLMAP
                        • 02.SQLI LOCATION IDENTIFICATION
                      • 02.SQLI DB ENUMERATION
                      • AUTHENTICATION BYPASS
                      • CREDENTIAL DUMPING
                      • SQLI READING FILES
                      • SQLI WRITING WEB SHELL FILES
                    • COMMAND INJECTION
                      • 01.DISCOVERY
                      • FILTER EVASION/BYPASS
                        • FRONT-END VALIDATION: CUSTOMIZED HTTP REQUEST
                        • SPACE & NEW LINE CHARACTERS
                        • SLASH & BACKSLASH
                        • BLACKLISTED CHARACTERS
                        • BLACKLISTED CMDS
                        • ADVANCED CMD OBFUSCATION
                      • EVASION TOOLS
                    • HTML INJECTION
                    • XML EXTERNAL EXTITY (XXE)
                      • DISCOVERY
                        • WINDOWS
                      • INFORMATION DISCLOSURE
                      • INFORMATION TAMPERING
                        • RCE
                      • EXFILTRATION
                        • OOB BLIND DATA EXFIL
                          • XXEINJECTOR (AUTOMATED)
                      • IMPACT
                        • DOS
                    • CROSS-SITE REQUEST FORGERY (CSRF/XSRF)
                      • DISCOVERY
                      • CSRF BYPASS
                      • TRIGGERS
                        • W/O ANTI-CSRF TOKEN
                        • WITH ANTI-CSRF TOKEN (GET METHOD)
                        • WITH ANTI-CSRF TOKEN (POST METHOD)
                        • CHAINING (XSS & CSRF)
                          • MAKING PROFILE PUBLIC
                          • ADDING A FUNCTION TO THE PROFILE PAGE
                        • WEAK CSRF TOKENS
                  • SERVER-SIDE
                    • SSRF
                      • 01.DISCOVERY
                        • BLIND SSRF
                      • ENUMERATION
                      • LFI
                    • SSTI
                      • IDENTIFICATION
                      • JINJA (EXPLOITATION)
                      • TWIG (EXPLOITATION)
                      • HANDLEBARS NODEJS (EXPLOITATION)
                        • PAYLOAD
                    • SSI INJECTION
                      • SSI (EXPLOITATION)
                    • XSLT INJECTION
                      • IDENTIFICATION
                      • XSLT INJECTION (EXPLOITATION)
                • FILE UPLOADS
                  • 01.DISCOVERY
                  • FILTER EVASION/BYPASS
                    • CLIENT-SIDE VALIDATION
                      • BACK-END REQUEST MODIFICATION
                      • DISABLING FRONT-END VALIDATION
                    • BACK-END VALIDATION
                      • BLACKLIST EXTENSION FILTERS
                      • WHITELIST EXTENSION FILTERS
                      • CONTENT TYPE FILTER
                  • UPLOAD EXPLOITATION
                    • WEB SHELL
                      • CUSTOM WEB SHELLS
                        • PHP WEB SHELL
                        • .NET WEB SHELL
                        • HTML FORM SHELL
                    • REVERSE SHELLS
                      • CUSTOM REVERSE SHELLS
                    • LIMITED FILE UPLOADS
                      • EMBEDDED JAVASCRIPT (XSS)
                      • XML EXTERNAL ENTITY (XXE)
                    • TFTP
                  • ARBITRARY FILE UPLOAD
                • BRUTE FORCE
                  • WEB
                    • BASIC HTTP AUTHENTICATION
                    • WEB LOGIN FORMS
                      • HYDRA
                      • FFUF
                    • PASSWORD RESET: TOKENS
                    • 2FA
                    • LOW-HANGING FRUIT
                      • EMPTY/DEFAULT PWS
                      • DEFAULT CREDENTIALS
                    • PASSWORD RESET: SECURITY QUESTIONS
                    • PIN CRACKING
                    • SESSION TOKENS
                      • IDENTIFICATION
                      • TAMPERING/FORGING SESSION TOKENS
                  • EXPOSED SERVICES
                    • SSH
                    • FTP
                    • RDP
                    • SMB
                    • SNMP
                  • PASSWORD CRACKING (OFFLINE)
                    • HASH IDENTIFICATION
                    • JOHN THE RIPPER
                    • HASHCAT
                • AUTHENTICATION BYPASS
                  • DIRECT ACCESS
                  • PARAMETER MODIFICATION
                  • HTTP VERB TAMPERING
                    • INSECURE CONFIGURATION
                    • INSECURE CODING
                  • SESSION ATTACKS
                    • SESSION HIJACKING
                    • SESSION FIXATION
                      • DISCOVERY
                • WI-FI
                  • WPA/WPA2 CRACKING
                • IDOR
                  • IDENTIFICATION
                  • INFORMATION DISCLOSURE
                    • PLAINTEXT REFERENCES
                    • PARAMETER MANIPULATION & COOKIE TAMPERING
                    • ENCODED REFERENCES
                  • INFORMATION ALTERATION
                    • INSECURE FUNCTION CALLS
                • FILE INCLUSION
                  • LFI
                    • DISCOVERY
                      • FUZZING FOR LFI PAYLOADS (AUTOMATED)
                        • EXTRA PAYLOADS
                    • BASIC BYPASSES
                    • SOURCE CODE DISCLOSURE
                    • RCE
                      • FILE UPLOADS
                      • LOG FILE POISONING
                        • PHP SESSION POISONING
                        • SERVER LOG POISONING
                  • RFI
                    • DISCOVERY
                    • RCE
                • OPEN REDIRECT
                  • DISCOVERY
                  • CREDENTIAL THEFT
                • RCE MS SQL
              • CVE
            • DEFENSE EVASION
            • PERSISTENCE
            • COMMAND & CONTROL
              • SHELLS
                • BIND SHELL
                  • BASH
                  • PYTHON
                  • POWERSHELL
                • REVERSE SHELL
                  • BASH
                  • PHP
                  • POWERSHELL
                  • GROOVY (JENKINS)
                • WEB SHELL
                  • PHP
                  • JSP
                  • ASP
                • SSH
              • INTERACTIVE SHELLS
        • 02.THROUGH
          • DISCOVERY
            • 01.HOST
            • 02.SERVICES
            • 02.VULNERABILITY ASSESSMENT
          • ENUMERATION
            • SYSTEM ENUMERATION
              • WINPEAS
          • PRIVILEGE ESCALATION
            • WINDOWS
              • IDENTIFICATION
                • AUTOMATED SCRIPTS
                  • WINPEAS
                  • SEATBELT
                  • JAWS
              • EXECUTION
                • BATCH FILES
                • PSEXEC.PY
                • EXPOSED CREDENTIALS
                  • WEBROOTS
            • LINUX
              • IDENTIFICATION
                • AUTOMATED SCRIPTS
                  • LINENUM
                  • LINUXPRIVCHECKER
                  • LINPEAS
              • EXECUTION
                • EXPOSED CREDENTIALS
                  • WEBROOTS
                • MISCONFIGURATIONS
                  • SETUID
                  • VI
                  • SSH DIRECTORY
                • SCHEDULED TASKS
                  • CRON JOBS
          • EXECUTION
          • CREDENTIAL ACCESS
            • SESSION HIJACKING
            • PASSWORD CRACKING
              • JOHN THE RIPPER
                • CRACKING ENCRYPTED FILES (ZIP)
                • CRACKING ENCRYPTED FILES (PDF)
              • HASHCAT
                • CRACKING MD5 HASHES
          • LATERAL MOVEMENT
            • NETWORK PIVOTING
              • PORT FORWARDING
                • LOCAL PORT FORWARDING
              • TUNNELING
        • 03.OUT
          • COLLECTION
          • EXFILTRATION
            • SCP
          • IMPACT
            • DOS
              • XXE PAYLOAD DOS
              • DECOMPRESSION BOMB
              • PIXEL FLOOD
              • REDOS
                • DISCOVERY
            • TIMING ATTACKS
              • RACE CONDITIONS
            • MITM
              • WEBSOCKETS
          • OBJECTIVES
      • 03.POST-ENGAGEMENT
        • 00.BDA
        • 01.ARTIFACT CLEARING
        • 02.INFRASTRUCTURE RESET
        • 03.DEBRIEF
          • INTERNAL
          • EXTERNAL
        • 04.DOCUMENTATION
          • REPORT
        • 05.LESSONS LEARNED
    • DEV
    • SRE
      • REVERSE ENGINEERING
        • ANALYSIS
          • 01.REBASING: IDENTIFYING BASE ADDRESS (IF REQUIRED)
          • 02.IDENTIFYING MAIN() IN STRIPPED BINARIES
          • 03.IDENTIFYING GLOBAL VARIABLES
          • C CODE CONSTRUCTS IN ASSEMBLY
            • GLOBAL & LOCAL VARIABLES
            • ARITHMETIC OPERATIONS
            • FUNCTION CALLS
            • ARRAYS
            • STRUCTS
            • LINKED-LIST TRAVERSAL
            • FLOW CONTROL
              • IF STATEMENTS
              • SWITCH STATEMENTS
              • LOOPS
        • STRING PATCHING
        • BINARY PATCHING
        • STACK MAPPING
      • ANTI-DEBUGGING
      • SOFTWARE EXPLOITATION
        • STACK REDIRECTION
        • SHELLCODE
        • DISASSEMBLER/GHIDRA SCRIPTING
        • FORMAT STRINGS
        • ENVIRONMENT VARS
        • BUFFER OVERFLOWS
          • DISABLING ASLR (LINUX)
        • VULNERABLE C FUNCTIONS
  • ENGINEERING
    • INSTALLATION PROCEDURES
    • CONFIGURATION PROCEDURES
      • WEB
        • BASIC HTTP AUTHENTICATION
        • CSRF PROTECTED FORM
      • NETWORKING
        • CISCO SWITCH
          • VLAN TRUNKS
          • PORT SECURITY
        • CISCO ROUTER
  • SYSTEM ADMINISTRATION
    • LINUX
      • NETWORKING
        • RESTART NETWORK SERVICES
        • LOCAL DNS RESOLUTION
      • LOCATING
      • FILE SHARING
      • PACKAGES
        • NORDVPN
      • OS
        • KALI
    • WINDOWS
      • DISK PARTITIONING
        • DISKPART
      • ACTIVE DIRECTORY
        • PASSWORD
        • DOMAIN USER
      • OPEN SSH
        • PRIVATE KEY PERMISSIONS
      • LOCAL DNS RESOLUTION
  • TOOLING
    • DCO
      • CYBER THREAT INTELLIGENCE (CTI)
        • OPENCTI
        • MALWARE INFORMATION SHARING PLATFORM (MISP)
      • DETECTION ENGINEERING
        • HOST
          • NETWORK MINER
        • NETWORK
          • SNORT
            • SELF-TEST MODE
            • SNIFFER MODE
            • PACKET LOGGER MODE
            • IDS/IPS MODE
            • PCAP READING MODE
            • RULE WRITING
              • SAMPLE RULES
              • MAGIC NUMBERS
      • THREAT HUNTING
        • NETWORK ANALYSIS
          • IDS/IPS
            • SNORT
            • SURICATA
          • PACKET ANALYZER
            • WIRESHARK
              • MERGING PCAPS
              • FINDING SPECIFIC STRINGS/PACKETS
              • EXPORTING PACKETS
              • EXPORTING OBJECTS
              • CREATING PROFILES
              • BOOKMARKING FILTERS
              • PACKET FILTERING
                • OPERATORS & FUNCTIONS
                • PROTOCOL FILTERS
                  • IP FILTERS
                  • TCP/UDP FILTERS
                  • APPLICATION FILTERS
                • FILTER BUILDER
              • CREATING FW RULES
            • TSHARK
              • SNIFFING TRAFFIC
                • CAPTURE FILTERS
              • READING CAPTURE FILE
                • DISPLAY FILTERS
                • OUTPUT FORMAT SELECTOR
              • FOLLOWING DATA STREAMS
              • EXTRACTING DATA
              • PACKET FILTERING
                • DISPLAYING PACKET STATISTICS
                • ADVANCED FILTERING
            • TCPDUMP
              • EXTRACTING INFORMATION
          • SIEM
            • ELASTIC STACK
            • SECURITY ONION
            • SPLUNK
          • NSM
            • ZEEK
              • MODES
              • LOGS
              • SIGNATURES
                • HTTP CLEARTEXT PASSWORD DETECTION
                • FTP BRUTE FORCE DETECTION
              • SCRIPTING
              • EVENT CORRELATION
              • FRAMEWORK
                • FILE FRAMEWORK | HASHES
                • FILE FRAMEWORK | EXTRACT FILES
                • NOTICE FRAMEWORK | INTELLIGENCE
                • CLEARTEXT SUBMISSION OF PWDS
                • GEO-LOCATION DATA
              • PACKAGES
        • HOST ANALYSIS
          • YARA
          • FLOSS
          • BRIM
            • QUERIES
            • QUERY REFERENCE
          • SYSINTERNALS
            • TCPVIEW
            • PROCESS EXPLORER
            • SYSMON
              • EXAMPLE CONFIGURATION FILE
              • IMPORTANT EVENT-IDS
          • POWERSHELL
          • WINDOWS EVENT LOGS
            • EXPORTING LOGS
          • OSQUERY
          • EDR
            • WAZUH
      • DFIR
        • EXIFTOOL
        • NETWORK FORENSICS
          • NETWORK MINER
        • FILE SYSTEM
          • MFTECMD
          • TIMELINE EXPLORER
      • ATOMIC RED TEAM
      • UTILITIES
        • JQ
        • .NET SDK
      • REVERSE ENGINEERING
        • DISASSEMBLERS
          • RADARE2
          • GHIDRA
          • IDA PRO
          • BINARY NINJA
          • CUTTER
          • HOPPER
        • DEBUGGERS
          • GDB/GEF
          • GEF
          • X64DBG
          • WINDBG
    • OCO
      • C2
        • COBALT STRIKE
        • SLIVER
        • MYTHIC C2
          • INSTALLATION
            • ON-PREMISE
            • AWS EC2
            • AZURE
          • C2 PROFILES
            • HTTP
          • AGENTS
            • WINDOWS
          • PAYLOAD CREATION
            • AWS CLOUDFRONT IMPLEMENTATION
            • AZURE FRONT DOOR IMPLEMENTATION
            • NGINX CONDITIONAL REDIRECTION IMPLEMENTATION
        • MITRE CALDERA
          • ON-PREMISE
        • HAVOC C2
        • METASPLOIT
      • VPS
        • REDIRECTORS
          • AWS CLOUDFRONT
            • LOAD BALANCER (AWS EC2)
            • CLOUDFRONT
              • GEO RESTRICTION (OPSEC)
          • AZURE FRONT DOOR
            • FRONT DOOR
          • NGINX (AWS EC2/AZURE)
            • C2 AGENT/USER-AGENT CONDITIONAL REDIRECTION (OPSEC)
              • NGINX FW RULE
              • C2 SERVER FW RULE
            • DIRECTORY REDIRECTION (OPSEC)
          • NGINX (ON-PREMISE)
        • PAYLOAD SERVER
          • NGINX (AWS EC2/AZURE)
            • FW RULES
            • CONFIGURATION
              • FACADE FILES
          • PWNDROP
        • PHISHING SERVER
          • EVILGINX (AWS EC2/AZURE)
            • FW RULES
            • HOMOGRAPHS
            • TRIGGERS
              • CREDENTIAL HARVESTING
              • MFA BYPASS
          • GOPHISH
            • FW RULES
            • CONFIGURATION
            • CAMPAIGNS
            • TRIGGERS
              • MALICIOUS DOWNLOADS
      • WIFI
        • ALFA AWUS1900 WIRELESS ADAPTER
          • DRIVERS
      • OSINT
        • FINAL RECON
        • RECON-NG
        • THE HARVESTER
        • SPIDERFOOT
        • OSINT FRAMEWORK
      • UTILITIES
        • 7ZIP
        • BROWSER DEVTOOLS
        • CADAVER
        • CURL
        • CUSTOM WORDLIST
          • USERNAME ANARCHY
          • CUPP
        • DATABASE
          • MYSQL
          • PSQL
        • DIG
        • DNSENUM
        • FIND
        • FTP
        • HTML2TEXT
        • IMPACKET
          • PSEXEC.PY
          • MSSQLCLIENT.PY
        • MULTI-FUNCTION
        • NETCAT
        • NETSTAT
        • NMAP
        • OPENVPN
        • PASSWORD
          • BRUTE FORCE (ONLINE)
            • HYDRA
            • MEDUSA
            • FFUF
            • CRACKMAPEXEC (SMB, ETC)
          • CRACKING (OFFLINE)
            • HASH-ID.PY
            • HASHID
            • JOHN THE RIPPER
            • HASHCAT
        • PRIVESC
          • WINPEAS
        • PROXIES
          • WRAPPER
            • PROXYCHAINS
          • WEB PROXIES
            • BURP SUITE
              • SETTINGS
              • WEB CRAWLING
            • ZED ATTACK PROXY (ZAP)
          • BROWSER PROXIES
            • FIREFOX
            • EXTENSIONS
              • FOXY PROXY
              • PROXY SWITCHYOMEGA (BRAVE BROWSER)
        • REMOTE ACCESS
          • FREERDP
        • RESPONDER
        • RSYNC
        • SCRIPT
        • SEARCHSPLOIT
        • SMBCLIENT
        • SOCAT
        • SQLMAP
          • GET REQUESTS
          • POST REQUESTS
          • BYPASSING WEBAPP PROTECTIONS
            • TAMPER SCRIPTS
          • OS EXPLOITATION
          • SQLI
            • CMD INJECTION
        • SSH
        • SSTIMAP
        • TAC
        • TECHNOLOGY PROFILER
          • WAPPALYZER
        • TEE
        • TMUX
        • TREE
        • VI/VIM
        • WEB CONTENT DISCOVERY
          • GOBUSTER
          • DIRB
        • WGET
        • WPSCAN
        • SNMPWALK
        • ONESIXTYONE
      • RANGE
        • TARGETS
          • DVWA
          • VULNHUB
          • DVLLMA
    • DEV
      • FUNDAMENTALS
        • NUMBER SYSTEM
          • CONVERSIONS
          • COMPLEMENTS
      • LANGUAGES
        • ASSEMBLY
          • TEMPLATE
        • C
          • TEMPLATE
          • SYNTAX
            • BOOLEANS
            • TYPEDEF
            • ENUM
            • SIZEOF
            • ARRAYS
            • ADDRESS-OF
            • DEREFERENCE
          • OPERATORS
          • KEYWORDS
          • FORMAT SPECIFIERS
          • ENCODING SCHEMES
          • BARR C CODING STANDARD
          • TROUBLESHOOTING
            • SUPPRESSING SECURITY WARNINGS
          • TYPE MODIFIERS
          • FUNCTION PROTOTYPES
            • BUILT-IN
              • STRING.H
                • STRLEN()
        • PYTHON
          • TEMPLATE
        • HTML
          • URL ENCODING
        • C++
      • COMPILERS
        • COMPILER EXPLORER (ONLINE)
        • GCC (LINUX)
        • VISUAL STUDIO CLI (WINDOWS)
      • UTILITIES
        • HEXDUMP
        • CODE BEAUTIFY
        • GIT (CLI)
        • STYLE FORMATTING
          • CLANG-FORMAT
          • CLANG-FORMAT-BARR-C
        • IDE
          • ARDUINO
  • RESOURCES
    • ARMY
      • 350-1
      • CAC PKI CERTIFICATES RECOVERY
      • FORCE MANAGEMENT
      • DEFENSE ACQUISITION TRAININGS
      • CAREER MANAGEMENT
      • COLLECTION
        • MISC
        • COMMANDS
        • TRAINING
      • MILITARY RETIREMENT
        • CHECKLIST
        • RESUME
    • CYBER
      • DCO
        • CYBER THREAT EMULATION
        • SYSTEM HARDENING
        • MALWARE ANALYSIS
          • MALWARE BAZAAR
          • MALWARE TRAFFIC ANALYSIS.NET
          • THE ZOO (AKA MALWARE DB)
        • THREAT HUNTING
          • MITRE ATT&CK
          • MITRE ATTACK FLOW BUILDER
          • MITRE CAR
          • MITRE D3FEND
          • MITRE ENGAGE
          • MITRE ENGENUITY
          • ULTIMATE WINDOWS SECURITY
          • TECHNIQUE INTERFACE ENGINE
      • OCO
        • NETWORK PIVOTING
          • THE CYBER PLUMBER'S LAB GUIDE
        • BUG BOUNTY PROGRAMS
        • LIVING OFF THE LAND
          • LOLBAS (WINDOWS)
          • GTFOBINS (UNIX)
          • LOLDRIVERS (WINDOWS)
          • LOLAPPS
        • RECONNAISSANCE
          • WAYBACK MACHINE
          • SHODAN
          • CENSYS
        • VULNERABILITY/EXPLOIT LISTINGS
          • EXPLOIT DB
          • VULNERABILITY LAB
      • OT
        • ICS/SCADA
      • GENERAL
        • GENERATIVE AI/COPILOT
          • CAMOGPT
          • CHATGPT
          • PENTESTGPT
        • UNIFIED KILLCHAIN (UKC)
        • BLOGS
    • AUDIO
Powered by GitBook
On this page
  1. CND
  2. SELF DEVELOPMENT
  3. WRITEUPS/WALKTHROUGHS
  4. HTB LABS
  5. INTRO TO BLUE TEAM

UNIT42 (SYSMON/EVENT LOGS)

PreviousBFT (MFT)NextTHM

Last updated 1 day ago

How many Event logs are there with Event ID 11?
PS C:\> BROWSER > https://app.hackthebox.com/tracks/Intro-to-Blue-Team
https://labs.hackthebox.com/api/v4/challenges/632/cdn/redirect?auth_user_id=126831&expires=1748777450&signature=1c2bc2bbc7fd64787a190144a16e29a13edddf2dec87b94382d9b3767b7ed3cc

PS C:\> Invoke-WebRequest -Uri https://www.7-zip.org/a/7z2409-x64.exe -OutFile 7zip.exe
 ...
 
 * install 7zip if required

PS C:\> GUI > BFT.zip > 7-zip > extract files
 ...

PS C:\> Get-WinEvent -Path "Microsoft-Windows-Sysmon-Operational.evtx" -MaxEvents 1 | Format-List *

 * display all fields prior to filtering

PS C:\> Get-WinEvent -Path "Microsoft-Windows-Sysmon-Operational.evtx" | Where-Object {$_.Id -eq 11} | Measure-Object | Select-Object -ExpandProperty Count
 56
Whenever a process is created in memory, an event with Event ID 1 is recorded with details such as command line, hashes, process path, parent process path, etc. This information is very useful for an analyst because it allows us to see all programs executed on a system, which means we can spot any malicious processes being executed. What is the malicious process that infected the victim's system?
PS C:\> BROWSER > https://app.hackthebox.com/tracks/Intro-to-Blue-Team
https://labs.hackthebox.com/api/v4/challenges/632/cdn/redirect?auth_user_id=126831&expires=1748777450&signature=1c2bc2bbc7fd64787a190144a16e29a13edddf2dec87b94382d9b3767b7ed3cc

PS C:\> Invoke-WebRequest -Uri https://www.7-zip.org/a/7z2409-x64.exe -OutFile 7zip.exe
 ...
 
 * install 7zip if required

PS C:\> GUI > BFT.zip > 7-zip > extract files
 ...
 
PS C:\> Get-WinEvent -Path "Microsoft-Windows-Sysmon-Operational.evtx" -MaxEvents 1 | Format-List *

 * display all fields prior to filtering
 
PS C:\> Get-WinEvent -Path "Microsoft-Windows-Sysmon-Operational.evtx"  |
Where-Object { $_.Id -eq 1 } |
ForEach-Object {
    $xml = [xml]$_.ToXml()
    $eventData = $xml.Event.EventData.Data

    # Output all Name/Value pairs in the event
    $eventData | ForEach-Object {
        [PSCustomObject]@{
            Name  = $_.Name
            Value = $_.'#text'
        }
    }

    # Optional: separator between events
    Write-Host "`n--- Next Event ---`n"
} | Format-List

 RuleName          technique_id=T1204,technique_name=User Execution
 UtcTime           2024-02-14 03:41:56.538
 ProcessGuid       {817bddf3-3684-65cc-2d02-000000001900}
 ProcessId         10672
 Image             C:\Users\CyberJunkie\Downloads\Preventivo24.02.14.exe.exe
 FileVersion       1.1.2
 Description       Photo and vn Installer
 Product           Photo and vn
 Company           Photo and Fax Vn
 OriginalFileName  Fattura 2 2024.exe
 CommandLine       "C:\Users\CyberJunkie\Downloads\Preventivo24.02.14.exe.exe"
 CurrentDirectory  C:\Users\CyberJunkie\Downloads\
 User              DESKTOP-887GK2L\CyberJunkie
 LogonGuid         {817bddf3-311e-65cc-a7ae-1b0000000000}
 LogonId           0x1baea7
 TerminalSessionId 1
 IntegrityLevel    Medium
 Hashes            SHA1=18A24AA0AC052D31FC5B56F5C0187041174FFC61,MD5=32F35B78A3DC5949CE3C99F2981DEF6B,SHA256=0CB44C4F8273750FA40497FCA81E850F73927E70B13C8F80CDCFEE9D1478E6F3,IMPHASH=36ACA8EDDDB161C588FCF5AFDC1AD9FA
 ParentProcessGuid {817bddf3-311f-65cc-0a01-000000001900}
 ParentProcessId   1116
 ParentImage       C:\Windows\explorer.exe
 ParentCommandLine C:\Windows\Explorer.EXE
 ParentUser        DESKTOP-887GK2L\CyberJunkie  
 ...
 
 * display event id 1 specific fields

PS C:\> Get-WinEvent -Path "Microsoft-Windows-Sysmon-Operational.evtx" | Where-Object {$_.Id -eq 1} | 
ForEach-Object {
  $xml = [xml]$_.ToXml()
  [PSCustomObject]@{
    TimeCreated     = $_.TimeCreated
	Image           = ($xml.Event.EventData.Data | Where-Object { $_.Name -eq "Image" }).'#text'
	ParentImage     = ($xml.Event.EventData.Data | Where-Object { $_.Name -eq "ParentImage" }).'#text'
	CommandLine     = ($xml.Event.EventData.Data | Where-Object { $_.Name -eq "CommandLine" }).'#text'
	Hashes          = ($xml.Event.EventData.Data | Where-Object { $_.Name -eq "Hashes" }).'#text'
	ProcessId       = ($xml.Event.EventData.Data | Where-Object { $_.Name -eq "ProcessId" }).'#text'
	User            = ($xml.Event.EventData.Data | Where-Object { $_.Name -eq "User" }).'#text'
  }
} | Format-List

 TimeCreated : 2/13/2024 10:41:58 PM
 Image       : C:\Windows\SysWOW64\msiexec.exe
 ParentImage : C:\Windows\System32\msiexec.exe
 CommandLine : C:\Windows\syswow64\MsiExec.exe -Embedding 5250A3DB12224F77D2A18B4EB99AC5EB
 Hashes      : SHA1=9AB9B12901E1EA2DF943B45AD20D8732618608CD,MD5=898277AC5894C4E1412A49040053B0D3,SHA256=445A2E800DC68DF89ABF713F3B4B632D40AE6310EF3660B42D974BB582426BC5,IMPHASH=E4E40938E4BF6C66424859ED02171C41
 ProcessId   : 10280
 User        : DESKTOP-887GK2L\CyberJunkie

 TimeCreated : 2/13/2024 10:41:57 PM
 Image       : C:\Windows\SysWOW64\msiexec.exe
 ParentImage : C:\Users\CyberJunkie\Downloads\Preventivo24.02.14.exe.exe
 CommandLine : "C:\Windows\system32\msiexec.exe" /i "C:\Users\CyberJunkie\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\main1.msi" AI_SETUPEXEPATH=C:\Users\CyberJunkie\Downloads\Preventivo24.02.14.exe.exe SETUPEXEDIR=C:\Users\CyberJunkie\Downloads\
 EXE_CMD_LINE="/exenoupdates  /forcecleanup  /wintime 1707880560  "
 Hashes      : SHA1=9AB9B12901E1EA2DF943B45AD20D8732618608CD,MD5=898277AC5894C4E1412A49040053B0D3,SHA256=445A2E800DC68DF89ABF713F3B4B632D40AE6310EF3660B42D974BB582426BC5,IMPHASH=E4E40938E4BF6C66424859ED02171C41
 ProcessId   : 10324
 User        : DESKTOP-887GK2L\CyberJunkie

 TimeCreated : 2/13/2024 10:41:57 PM
 Image       : C:\Windows\SysWOW64\msiexec.exe
 ParentImage : C:\Windows\System32\msiexec.exe
 CommandLine : C:\Windows\syswow64\MsiExec.exe -Embedding 5364C761FA9A55D636271A1CE8A6742D C
 Hashes      : SHA1=9AB9B12901E1EA2DF943B45AD20D8732618608CD,MD5=898277AC5894C4E1412A49040053B0D3,SHA256=445A2E800DC68DF89ABF713F3B4B632D40AE6310EF3660B42D974BB582426BC5,IMPHASH=E4E40938E4BF6C66424859ED02171C41
 ProcessId   : 6996
 User        : DESKTOP-887GK2L\CyberJunkie

 TimeCreated : 2/13/2024 10:41:57 PM
 Image       : C:\Windows\System32\msiexec.exe
 ParentImage : C:\Windows\System32\services.exe
 CommandLine : C:\Windows\system32\msiexec.exe /V
 Hashes      : SHA1=32B8B2E3B3ECD8E194ACE65A5E5052C326D7CCAA,MD5=3A8464F2CECDF1D89430C64237949F20,SHA256=8CA4B8B7A2F8E6E7D1DF1AE46437FC252CD9C4B78CA3C7ADCAB721BD0F68B358,IMPHASH=0990A9500FF8DF93E0E059EE13E7C796 
 ProcessId   : 10220
 User        : NT AUTHORITY\SYSTEM
 
 TimeCreated : 2/13/2024 10:41:56 PM
 Image       : C:\Users\CyberJunkie\Downloads\Preventivo24.02.14.exe.exe
 ParentImage : C:\Windows\explorer.exe
 CommandLine : "C:\Users\CyberJunkie\Downloads\Preventivo24.02.14.exe.exe"
 Hashes      : SHA1=18A24AA0AC052D31FC5B56F5C0187041174FFC61,MD5=32F35B78A3DC5949CE3C99F2981DEF6B,SHA256=0CB44C4F8273750FA40497FCA81E850F73927E70B13C8F80CDCFEE9D1478E6F3,IMPHASH=36ACA8EDDDB161C588FCF5AFDC1AD9FA
 ProcessId   : 10672
 User        : DESKTOP-887GK2L\CyberJunkie

 TimeCreated : 2/13/2024 10:41:45 PM
 Image       : C:\Program Files\Mozilla Firefox\pingsender.exe
 ParentImage : C:\Program Files\Mozilla Firefox\firefox.exe
 CommandLine : "C:\Program Files\Mozilla Firefox\pingsender.exe"  https://incoming.telemetry.mozilla.org/submit/telemetry/cb88145b-129d-471c-b605-4fdf09fec680/event/Firefox/122.0.1/release/20240205133611?v=4
                C:\Users\CyberJunkie\AppData\Roaming\Mozilla\Firefox\Profiles\avsa4d81.default-release\saved-telemetry-pings\cb88145b-129d-471c-b605-4fdf09fec680 https://incoming.telemetry.mozilla.org/submit/telemetry/6fcd92a2-cc60-4df6-b6fb-66356dd011c1/main/Firefox/122.0.1/release/20240205133611?v=4 
                C:\Users\CyberJunkie\AppData\Roaming\Mozilla\Firefox\Profiles\avsa4d81.default-release\saved-telemetry-pings\6fcd92a2-cc60-4df6-b6fb-66356dd011c1
 Hashes      : SHA1=282F855BEB4FACF0726E13ECCADB7D3411B30B85,MD5=A1F5FF25E3D0F160BC7CE7CA57349D83,SHA256=B412C45DE423534D85F121ABC348FB38020FDA804EA0A972708B7447B0E7325D,IMPHASH=F84029681F81FED23E3E067364DA1699
 ProcessId   : 5584
 User        : DESKTOP-887GK2L\CyberJunkie 

 * Look for any suspicious files being run on weird directory
    - the rich event details such as command line, image path, parent process, 
      etc. are inside the Message property as a big text blob, or inside the 
      event’s XML
       - Must view using xml as sysmon event details such as Image path are 
         not exposed as separate properties in PowerShell’s default event 
         object; they’re embedded inside the event’s XML or Message field.
Which Cloud drive was used to distribute the malware?
PS C:\> BROWSER > https://app.hackthebox.com/tracks/Intro-to-Blue-Team
https://labs.hackthebox.com/api/v4/challenges/632/cdn/redirect?auth_user_id=126831&expires=1748777450&signature=1c2bc2bbc7fd64787a190144a16e29a13edddf2dec87b94382d9b3767b7ed3cc

PS C:\> Invoke-WebRequest -Uri https://www.7-zip.org/a/7z2409-x64.exe -OutFile 7zip.exe
 ...
 
 * install 7zip if required

PS C:\> GUI > BFT.zip > 7-zip > extract files
 ...

PS C:\> Get-WinEvent -Path "Microsoft-Windows-Sysmon-Operational.evtx" -MaxEvents 1 | Format-List *

 * display all fields prior to filtering
 
PS C:\> Get-WinEvent -Path "Microsoft-Windows-Sysmon-Operational.evtx"  |
Where-Object { $_.Id -eq 22 } |
ForEach-Object {
    $xml = [xml]$_.ToXml()
    $eventData = $xml.Event.EventData.Data

    # Output all Name/Value pairs in the event
    $eventData | ForEach-Object {
        [PSCustomObject]@{
            Name  = $_.Name
            Value = $_.'#text'
        }
    }

    # Optional: separator between events
    Write-Host "`n--- Next Event ---`n"
} | Format-List
 
 Name         Value
 ----         ----- 
 RuleName     - 
 UtcTime      2024-02-14 03:41:56.955
 ProcessGuid  {817bddf3-3684-65cc-2d02-000000001900}
 ProcessId    10672 
 QueryName    www.example.com
 QueryStatus  0
 QueryResults ::ffff:93.184.216.34;199.43.135.53;2001:500:8f::53;199.43.133.53;2001:500:8d::53;
 Image        C:\Users\CyberJunkie\Downloads\Preventivo24.02.14.exe.exe 
 User         DESKTOP-887GK2L\CyberJunkie
 
 * display event id 22 specific fields 
 
#display DNS queries
PS C:\> Get-WinEvent -Path "Microsoft-Windows-Sysmon-Operational.evtx" | Where-Object {$_.Id -eq 22} | ForEach-Object {[xml]$xml = $_.ToXml(); $xml.Event.EventData.Data | ForEach-Object {"$($_.Name): $($_.'#text')"}}
 RuleName: -
 UtcTime: 2024-02-14 03:41:56.955
 ProcessGuid: {817bddf3-3684-65cc-2d02-000000001900}
 ProcessId: 10672
 QueryName: www.example.com
 QueryStatus: 0
 QueryResults: ::ffff:93.184.216.34;199.43.135.53;2001:500:8f::53;199.43.133.53;2001:500:8d::53;
 Image: C:\Users\CyberJunkie\Downloads\Preventivo24.02.14.exe.exe
 User: DESKTOP-887GK2L\CyberJunkie
 
 RuleName: -
 UtcTime: 2024-02-14 03:41:43.924
 ProcessGuid: {817bddf3-3514-65cc-0802-000000001900}
 ProcessId: 4292
 QueryName: d.dropbox.com
 QueryStatus: 0
 QueryResults: type:  5 d.v.dropbox.com;type:  5 d-edge.v.dropbox.com;162.125.8.20;205.251.192.57;2600:9000:5300:3900::1;
 Image: C:\Program Files\Mozilla Firefox\firefox.exe
 User: DESKTOP-887GK2L\CyberJunkie
 
 RuleName: -
 UtcTime: 2024-02-14 03:41:25.269
 ProcessGuid: {817bddf3-3514-65cc-0802-000000001900}
 ProcessId: 4292
 QueryName: uc2f030016253ec53f4953980a4e.dl.dropboxusercontent.com
 QueryStatus: 0
 QueryResults: type:  5 edge-block-www-env.dropbox-dns.com;::ffff:162.125.81.15;198.51.44.6;2620:4d:4000:6259:7:6:0:1;198.51.45.6;2a00:edc0:6259:7:6::2;198.51.44.70;2620:4d:4000:6259:7:6:0:3;198.51.45.70;2a00:edc0:6259:7:6::4;
 Image: C:\Program Files\Mozilla Firefox\firefox.exe
 User: DESKTOP-887GK2L\CyberJunkie
 
#correlate w/ event ID 11 - file creation
PS C:\> Get-WinEvent -Path "Microsoft-Windows-Sysmon-Operational.evtx" | Where-Object {$_.Id -eq 11} | ForEach-Object {[xml]$xml = $_.ToXml(); $xml.Event.EventData.Data | ForEach-Object {"$($_.Name): $($_.'#text')"}}
 RuleName: - 
 UtcTime: 2024-02-14 03:41:30.472 
 ProcessGuid: {817bddf3-3514-65cc-0802-000000001900}
 ProcessId: 4292
 Image: C:\Program Files\Mozilla Firefox\firefox.exe
 TargetFilename: C:\Users\CyberJunkie\Downloads\Preventivo24.02.14.exe.exe:Zone.Identifier 
 CreationUtcTime: 2024-02-14 03:41:26.459
 User: DESKTOP-887GK2L\CyberJunkie

 RuleName: -
 UtcTime: 2024-02-14 03:41:26.459 
 ProcessGuid: {817bddf3-3514-65cc-0802-000000001900}
 ProcessId: 4292 
 Image: C:\Program Files\Mozilla Firefox\firefox.exe
 TargetFilename: C:\Users\CyberJunkie\Downloads\Preventivo24.02.14.exe.exe
 CreationUtcTime: 2024-02-14 03:41:26.459
 User: DESKTOP-887GK2L\CyberJunkie  

 RuleName: -  
 UtcTime: 2024-02-14 03:41:26.459 
 ProcessGuid: {817bddf3-3514-65cc-0802-000000001900}
 ProcessId: 4292 
 Image: C:\Program Files\Mozilla Firefox\firefox.exe
 TargetFilename: C:\Users\CyberJunkie\Downloads\skZdsnwf.exe.part
 CreationUtcTime: 2024-02-14 03:41:26.459
 User: DESKTOP-887GK2L\CyberJunkie

 RuleName: -
 UtcTime: 2024-02-14 03:41:26.459
 ProcessGuid: {817bddf3-3514-65cc-0802-000000001900}
 ProcessId: 4292
 Image: C:\Program Files\Mozilla Firefox\firefox.exe
 TargetFilename: C:\Users\CyberJunkie\Downloads\skZdsnwf.exe.part
 CreationUtcTime: 2024-02-14 03:41:26.459
 User: DESKTOP-887GK2L\CyberJunkie

 RuleName: -
 UtcTime: 2024-02-14 03:41:26.459
 ProcessGuid: {817bddf3-3514-65cc-0802-000000001900}
 ProcessId: 4292
 Image: C:\Program Files\Mozilla Firefox\firefox.exe
 TargetFilename: C:\Users\CYBERJ~1\AppData\Local\Temp\skZdsnwf.exe
 CreationUtcTime: 2024-02-14 03:41:26.459
 User: DESKTOP-887GK2L\CyberJunkie 
 
 
For many of the files it wrote to disk, the initial malicious file used a defense evasion technique called Time Stomping, where the file creation date is changed to make it appear older and blend in with other files. What was the timestamp changed to for the PDF file?
PS C:\> BROWSER > https://app.hackthebox.com/tracks/Intro-to-Blue-Team
https://labs.hackthebox.com/api/v4/challenges/632/cdn/redirect?auth_user_id=126831&expires=1748777450&signature=1c2bc2bbc7fd64787a190144a16e29a13edddf2dec87b94382d9b3767b7ed3cc

PS C:\> Invoke-WebRequest -Uri https://www.7-zip.org/a/7z2409-x64.exe -OutFile 7zip.exe
 ...
 
 * install 7zip if required

PS C:\> GUI > BFT.zip > 7-zip > extract files
 ...
 
PS C:\> Get-WinEvent -Path "Microsoft-Windows-Sysmon-Operational.evtx" -MaxEvents 1 | Format-List *

 * display all fields prior to filtering

PS C:\> Get-WinEvent -Path "Microsoft-Windows-Sysmon-Operational.evtx"  |
Where-Object { $_.Id -eq 2 } |
ForEach-Object {
    $xml = [xml]$_.ToXml()
    $eventData = $xml.Event.EventData.Data

    # Output all Name/Value pairs in the event
    $eventData | ForEach-Object {
        [PSCustomObject]@{
            Name  = $_.Name
            Value = $_.'#text'
        }
    }

    # Optional: separator between events
    Write-Host "`n--- Next Event ---`n"
} | Format-List

 RuleName                technique_id=T1070.006,technique_name=Timestomp
 UtcTime                 2024-02-14 03:41:58.389
 ProcessGuid             {817bddf3-3684-65cc-2d02-000000001900}
 ProcessId               10672
 Image                   C:\Users\CyberJunkie\Downloads\Preventivo24.02.14.exe.exe
 TargetFilename          C:\Users\CyberJunkie\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Gam...
 CreationUtcTime         2024-01-10 18:12:27.357
 PreviousCreationUtcTime 2024-02-14 03:41:58.389
 User                    DESKTOP-887GK2L\CyberJunkie
 
 * display event id 2 specific fields

PS C:\> Get-WinEvent -Path "T:\00.HTB\SHERLOCK\INTRO TO BLUE TEAM\Microsoft-Windows-Sysmon-Operational.evtx" | Where-Object { $_.Id -eq 2 } | 
  ForEach-Object { 
    $xml = [xml]$_.ToXml() 
    [PSCustomObject]@{ 
      TimeCreated = $_.TimeCreated
      Image                  = ($xml.Event.EventData.Data | Where-Object { $_.Name -eq "Image" }).'#text'
      PreviousCreationUtcTime = ($xml.Event.EventData.Data | Where-Object { $_.Name -eq "PreviousCreationUtcTime" }).'#text'
      CreationUtcTime      = ($xml.Event.EventData.Data | Where-Object { $_.Name -eq "CreationUtcTime" }).'#text'
	  RuleName             = ($xml.Event.EventData.Data | Where-Object {$_.Name -eq "RuleName"}).'#text'
      User                 = ($xml.Event.EventData.Data | Where-Object { $_.Name -eq "User"}).'#text'
  }
} | Format-List

 TimeCreated             : 2/13/2024 10:41:57 PM
 Image                   : C:\Users\CyberJunkie\Downloads\Preventivo24.02.14.exe.exe 
 PreviousCreationUtcTime : 2024-02-14 03:41:57.545
 CreationUtcTime         : 2024-01-14 08:10:06.029
 RuleName                : technique_id=T1070.006,technique_name=Timestomp
 User                    : DESKTOP-887GK2L\CyberJunkie 
 ...
 
 * the PreviousCreationUtcTime is the real time the file was written or created.
 * the CreationUtcTime is the suspicious backdated timestamp (e.g., from the 1990s, or aligning with legitimate system files).
The malicious file dropped a few files on disk. Where was "once.cmd" created on disk? Please answer with the full path along with the filename.
PS C:\> BROWSER > https://app.hackthebox.com/tracks/Intro-to-Blue-Team
https://labs.hackthebox.com/api/v4/challenges/632/cdn/redirect?auth_user_id=126831&expires=1748777450&signature=1c2bc2bbc7fd64787a190144a16e29a13edddf2dec87b94382d9b3767b7ed3cc

PS C:\> Invoke-WebRequest -Uri https://www.7-zip.org/a/7z2409-x64.exe -OutFile 7zip.exe
 ...
 
 * install 7zip if required

PS C:\> GUI > BFT.zip > 7-zip > extract files
 ...
 
PS C:\> Get-WinEvent -Path "Microsoft-Windows-Sysmon-Operational.evtx" -MaxEvents 1 | Format-List *

 * display all fields prior to filtering

PS C:\> Get-WinEvent -Path "T:\00.HTB\SHERLOCK\INTRO TO BLUE TEAM\Microsoft-Windows-Sysmon-Operational.evtx" |
Where-Object { $_.Id -eq 11 } |
ForEach-Object {
    $xml = [xml]$_.ToXml()
    $eventData = $xml.Event.EventData.Data

    # Output all Name/Value pairs in the event
    $eventData | ForEach-Object {
        [PSCustomObject]@{
            Name  = $_.Name
            Value = $_.'#text'
        }
    }

    # Optional: separator between events
    Write-Host "`n--- Next Event ---`n"
} | Format-List

 Name  : RuleName
 Value : -
 Name  : UtcTime
 Value : 2024-02-14 03:41:58.404
 Name  : ProcessGuid
 Value : {817bddf3-3684-65cc-2d02-000000001900}
 Name  : ProcessId
 Value : 10672
 Name  : Image
 Value : C:\Users\CyberJunkie\Downloads\Preventivo24.02.14.exe.exe
 Name  : TargetFilename
 Value : C:\Users\CyberJunkie\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\once.cmd
 Name  : CreationUtcTime
 Value : 2024-02-14 03:41:58.404
 Name  : User
 Value : DESKTOP-887GK2L\CyberJunkie 
 
 * display event id 11 specific fields

The malicious file attempted to reach a dummy domain, most likely to check the internet connection status. What domain name did it try to connect to?
PS C:\> BROWSER > https://app.hackthebox.com/tracks/Intro-to-Blue-Team
https://labs.hackthebox.com/api/v4/challenges/632/cdn/redirect?auth_user_id=126831&expires=1748777450&signature=1c2bc2bbc7fd64787a190144a16e29a13edddf2dec87b94382d9b3767b7ed3cc

PS C:\> Invoke-WebRequest -Uri https://www.7-zip.org/a/7z2409-x64.exe -OutFile 7zip.exe
 ...
 
 * install 7zip if required

PS C:\> GUI > BFT.zip > 7-zip > extract files
 ...
 
PS C:\> Get-WinEvent -Path "Microsoft-Windows-Sysmon-Operational.evtx" -MaxEvents 1 | Format-List *

 * display all fields prior to filtering

PS C:\> Get-WinEvent -Path "T:\00.HTB\SHERLOCK\INTRO TO BLUE TEAM\Microsoft-Windows-Sysmon-Operational.evtx" |
Where-Object { $_.Id -eq 22 } |
ForEach-Object {
    $xml = [xml]$_.ToXml()
    $eventData = $xml.Event.EventData.Data

    # Output all Name/Value pairs in the event
    $eventData | ForEach-Object {
        [PSCustomObject]@{
            Name  = $_.Name
            Value = $_.'#text'
        }
    }

    # Optional: separator between events
    Write-Host "`n--- Next Event ---`n"
} | Format-List

 Name  : RuleName
 Value : -
 Name  : UtcTime
 Value : 2024-02-14 03:41:56.955
 Name  : ProcessGuid
 Value : {817bddf3-3684-65cc-2d02-000000001900}
 Name  : ProcessId
 Value : 10672
 Name  : QueryName
 Value : www.example.com
 Name  : QueryStatus
 Value : 0
 Name  : QueryResults
 Value : ::ffff:93.184.216.34;199.43.135.53;2001:500:8f::53;199.43.133.53;2001:500:8d::53;
 Name  : Image
 Value : C:\Users\CyberJunkie\Downloads\Preventivo24.02.14.exe.exe
 Name  : User
 Value : DESKTOP-887GK2L\CyberJunkie 
 
 * display event id 22 specific fields

Which IP address did the malicious process try to reach out to?