Splunk BOTSv3 Web & OneDrive
Credit to Splunk

Splunk BOTSv3 Web & OneDrive

The past week I’ve been spending most of my time trying to complete a Splunk learning path to gain an understanding of different detection and incident handling approaches when it comes to various attack vectors. Today I will be completing two quick CTFs that I need to complete to finish the learning path.?These were both extremely easy and I didn't know that when I began to document them to post later.

Webserver Challenge?

I’m working for a brewing company that has had some trouble with malicious activity on their server. My first task is to gather information about the system's hardware, specifically the CPU.??

Search string:? sourcetype=”hardware” cpu?

No alt text provided for this image

Now they would like me to search for the number of packages and dependencies that are installed by the EC2 instance cloud script when executed.??

Search string:? sourcetype="cloud-init-output" packages?

No alt text provided for this image

The organization has been having some trouble with brute force attacks against its webserver.? They want me to find the source IP and the country of origin using the iplocations function. (This function was not working, so I had to use outside OSINT sources)?

Search string: sourcetype=linux_secure "Failed password" OR "Invalid user"?

No alt text provided for this image

Compromised OneDrive Challenge?

In this challenge, a group of North Korean hackers have compromised the brewing company's Microsoft OneDrive and it is my duty to thwart their nefarious activities. My first task is to locate a malicious file that was uploaded to the organization's OneDrive account.??

Search string:? sourcetype="*o365*" .lnk?

No alt text provided for this image

We’ve located the .lnk file, but we need to know how many unique user IP addresses had access to the file??

Search string:? sourcetype="*o365*" *.lnk? Operation=AnonymousLinkUsed ClientIP="*"?

The file was quarantined by the AV, but not before multiple hosts were compromised. Find the hosts that were affected.?

Search string: sourcetype="WinEventLog:Application" *.lnk?

No alt text provided for this image

That’s a wrap for now. These were very easy, but practice makes perfect, and I was able to breeze through them in a few minutes. I have 3 more Splunk CTFs to finish that will wrap up the Splunk learning path that I've been working on. Until next time!?

要查看或添加评论,请登录

Daniel McNally的更多文章

  • Project 1 - DVWA

    Project 1 - DVWA

    During the latest FXBG Hackers meeting, a newcomer attended for the second time. He expressed an interest in…

  • Security Analyst Notes: Things to Remember

    Security Analyst Notes: Things to Remember

    Over the last two years during my training, I've been taking notes along the way on all different topics that have been…

    7 条评论
  • PyScript Domains > 72 Char.

    PyScript Domains > 72 Char.

    Last night I was reading one of the go-to blue team compendiums, Blue Team Handbook, by Don Murdoch and it was going…

    1 条评论
  • Malware Analysis Notes: Putty.exe

    Malware Analysis Notes: Putty.exe

    I finally was able to get back around to working on the PMAT course by, HuskyHacks and TCM Security. These are my notes…

    1 条评论
  • Snort 3 vs MiTM Attacks

    Snort 3 vs MiTM Attacks

    Executive Summary: There are pros and cons when using Snort's Intrusion Prevention and Intrusion Detection System…

  • Manual Log Parsing with Cut, AWK and Python

    Manual Log Parsing with Cut, AWK and Python

    This will be a quick tutorial aimed at people who are infosec newbies or are new to Linux in general that are…

    1 条评论
  • Blue Team CTF: Warzone 1

    Blue Team CTF: Warzone 1

    To continue to work on my ability to parse logs and sniff out possible IOC's, I will be tackling another blue team CTF…

  • Splunk BOTSv3 AWS & WINEvent

    Splunk BOTSv3 AWS & WINEvent

    AWS S3 Bucket Challenge Today I will be finishing up my Splunk course with 2 more blue team CTFs. The first challenge…

    1 条评论
  • CTF: SNORT Basics Pt. 1

    CTF: SNORT Basics Pt. 1

    Today I will be running through a blue team CTF focused on using the IDS/IPS Snort. Snort can be used both passively…

    5 条评论
  • Malware Stager Deobfuscation

    Malware Stager Deobfuscation

    During a recent challenge, I received an obfuscated malware stager that was a PowerShell script that needed…

社区洞察

其他会员也浏览了