Skip to content

Latest commit

 

History

History
115 lines (81 loc) · 5.97 KB

OBJECTIVE 06 - Splunk Challenge.md

File metadata and controls

115 lines (81 loc) · 5.97 KB

Objective 6 – Splunk Challenge

OBJECTIVE:

Access the Splunk terminal in the Great Room. What is the name of the adversary group that Santa feared would attack KringleCon?

HINTS

Hints provided for Objective 6
  • MINTY CANDYCANE: Defenders often need to manipulate data to decRypt, deCode, and reform it into something that is useful. Cyber Chef is extremely useful here!
  • MINTY CANDYCANE: There was a great Splunk talk at KringleCon 2 that's still available!
  • MINTY CANDYCANE: Dave Herrald talks about emulating advanced adversaries and hunting them with Splunk.

PROCEDURE:

This challenge was quite frustrating for me, as I had no idea of what Splunk is and no experience using it at all, and I couldn’t really understand why some of the filters I was using weren’t giving me any results at all. Nevertheless it was a massive learning experience and the sense of satisfaction having completed it successfully was immense 😄

Question 1

How many distinct MITRE ATT&CK techniques did Alice emulate?

¦ tstats count where index=* by index

Count the unique index numbers only Ans: 26

Question 2

What are the names of the two indexes that contain the results of emulating Enterprise ATT&CK technique 1059.003? (Put them in alphabetical order and separate them with a space)

| tstats count where index=* by index 
| search index=T1059.003*

Ans: t1059.003-main t1059.003-win

Question 3

One technique that Santa had us simulate deals with 'system information discovery'. What is the full name of the registry key that is queried to determine the MachineGuid?

Ans: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography

Question 4

According to events recorded by the Splunk Attack Range, when was the first OSTAP related atomic test executed? (Please provide the alphanumeric UTC timestamp.)

| index = attack
| search OSTAP

Ans: 2020-11-30T17:44:15Z

Question 5

One Atomic Red Team test executed by the Attack Range makes use of an open source package authored by frgnca on GitHub. According to Sysmon (Event Code 1) events in Splunk, what was the ProcessId associated with the first use of this component?

  • I looked up frgnca on github and found he has 8 repositories of which only two seemed like they may be used for malicious attacks: AudioDeviceCmdlets and fcpi
  • Running the search query:
index=attack | search *audio* EventCode=1

image image

Ans: 3648

Question 6

Alice ran a simulation of an attacker abusing Windows registry run keys. This technique leveraged a multi-line batch file that was also used by a few other techniques. What is the final command of this multi-line batch file used as part of this simulation?

  • I searched for index=* | search bat
  • This returns a number of batch files and the associated technique number
  • I looked up the individual technique numbers one by one in the atomic-red-team github repo until I found one that had multiple lines (T1074.001) and copied the last line for the answer.

image image

Ans: quser

Question 7

According to x509 certificate events captured by Zeek (formerly Bro), what is the serial number of the TLS certificate assigned to the Windows domain controller in the attack range?

  • Search for index=* sourcetype=”bro:x509:json”
  • Look at the entries for certificate.serial – there are 12 in total but the most frequently used certificate serial no. is clear:

image

Ans: 55FCEEBB21270D9249E86F4B9DC7AA60

Challenge Question

Access the Splunk terminal in the Great Room. What is the name of the adversary group that Santa feared would attack KringleCon?

All the hints required for this challenge are in the challenge question itself. Looking through the Splunk talk on Youtube, I quickly found Santa’s favourite phrase at the end of it.

Alice also tells me that the ciphertext is base64 encoded and that it is encrypted with an old algorithm that uses a key – a quick Google search tells me that this is probably RC4.

image

Step 1 – Encode the key phrase to base64 – i.e. Stay Frosty becomes U3RheSBGcm9zdHk=

Step 2 – Create a recipe on http://icyberchef.com/ which;

  1. Takes the ciphertext as a text input
  2. Converts it from Base64
  3. Takes the text created in the previous step and decrypts it using RC4 with the Base64 Passphrase created in Step 1

Step 3 – This recipe gives us a cleartext legible output image

Answer: The Lollipop Guild