Splunk BOTSv3 AWS & WINEvent

Splunk BOTSv3 AWS & WINEvent

AWS S3 Bucket Challenge

Today I will be finishing up my Splunk course with 2 more blue team CTFs. The first challenge is a compromised S3 bucket due to a security misconfiguration. My first task is to find out who enabled public access to the bucket as well as the bucket name.?

Search string: sourcetype="aws:cloudtrail" eventName="PutBucketAcl"?

No alt text provided for this image

Next, I must find the event ID of the API call involved in the enabling of the S3 bucket. For this one I just looked at the log entry before the previous where I found the user and bucket name.?

Search string: sourcetype="aws:cloudtrail" user_arn="arn:aws:iam::622676721278:user/bstoll" app=AwsApiCall eventName="PutBucketAcl"?

No alt text provided for this image

There is a possibility that someone from outside of the organization may have uploaded files before the IAM team could revoke the privileges. It is my task to investigate.?

Search string: sourcetype="aws:s3:accesslogs" http_method=PUT bucket_name=frothlywebcode?

No alt text provided for this image

There was also a compressed file that was uploaded to the bucket while it had open permissions, I need to inspect the files size.?

Search string: sourcetype="aws:s3:accesslogs" frothly_html_memcached.tar.gz bytes=*?

Finally, they would like me to search for the source IP of the entity that uploaded the compressed file.?

Search string: sourcetype="aws:s3:accesslogs" http_method=PUT bucket_name=frothlywebcode src_ip="*"?

No alt text provided for this image

WINEvent Logs?Challenge

This brewing company is a mess. They are now dealing with some malicious activity on their WINDOWS endpoints, and I am tasked with getting to the bottom of it. I must seek out the endpoint that was compromised and inspect a new user creation. The WINEvent code for new account creation is 4720, so we’ll start with that. ?

Search string: sourcetype="wineventlog" EventCode = 4720?

No alt text provided for this image

I now must find the new user’s password. This took me quite some time, because there is no way to search outright for passwords in the clear. So, I went ahead and searched the host machine that the new account was created on, then the time and date from the prior account creation as well as the process command line.?

Search string: sourcetype="wineventlog" host="FYODOR-L" 08/19/2018 22:08:17 PM Process_Command_Line="*"?

No alt text provided for this image

To wrap this up they’d like to know one of the group names that the new malicious account was added to. Here we can search for the WINEvent code 4732, which is, “A member was added to a security enabled group.”?

Search string: sourcetype="wineventlog" EventCode=4732 user_name=svcvnc?

No alt text provided for this image
Dustin G.

Triage Security Engineer | PJPT (TCM Security) | TryHackMe Top 1% | Immersive Top 1%

1 年

AWS and Splunk! Nice!!

要查看或添加评论,请登录

Daniel McNally的更多文章

  • Project 1 - DVWA

    Project 1 - DVWA

    During the latest FXBG Hackers meeting, a newcomer attended for the second time. He expressed an interest in…

  • Security Analyst Notes: Things to Remember

    Security Analyst Notes: Things to Remember

    Over the last two years during my training, I've been taking notes along the way on all different topics that have been…

    7 条评论
  • PyScript Domains > 72 Char.

    PyScript Domains > 72 Char.

    Last night I was reading one of the go-to blue team compendiums, Blue Team Handbook, by Don Murdoch and it was going…

    1 条评论
  • Malware Analysis Notes: Putty.exe

    Malware Analysis Notes: Putty.exe

    I finally was able to get back around to working on the PMAT course by, HuskyHacks and TCM Security. These are my notes…

    1 条评论
  • Snort 3 vs MiTM Attacks

    Snort 3 vs MiTM Attacks

    Executive Summary: There are pros and cons when using Snort's Intrusion Prevention and Intrusion Detection System…

  • Manual Log Parsing with Cut, AWK and Python

    Manual Log Parsing with Cut, AWK and Python

    This will be a quick tutorial aimed at people who are infosec newbies or are new to Linux in general that are…

    1 条评论
  • Blue Team CTF: Warzone 1

    Blue Team CTF: Warzone 1

    To continue to work on my ability to parse logs and sniff out possible IOC's, I will be tackling another blue team CTF…

  • Splunk BOTSv3 Web & OneDrive

    Splunk BOTSv3 Web & OneDrive

    The past week I’ve been spending most of my time trying to complete a Splunk learning path to gain an understanding of…

  • CTF: SNORT Basics Pt. 1

    CTF: SNORT Basics Pt. 1

    Today I will be running through a blue team CTF focused on using the IDS/IPS Snort. Snort can be used both passively…

    5 条评论
  • Malware Stager Deobfuscation

    Malware Stager Deobfuscation

    During a recent challenge, I received an obfuscated malware stager that was a PowerShell script that needed…

社区洞察

其他会员也浏览了