CYBER KILL CHAIN 1. Hệ điều hành: service, process, thread, user, group permission, cho phép khởi tạo cùng windows Các loại log, event id quan trọng thường xuyên gặp phải 2. Network security: protocol quan trọng, kĩ thuật tấn công phổ biến, phân tích tấn công trên network 3. Cyber kill chain: khi kẻ tấn công xâm nhập vào máy tính và tiến hành scan thì map đc với giai đoạn nào trong cyber kill chain APT đang ở mức nào, 4. Logging: Sysmon, security, audit log, dhcp, http, system, application, terminal, smb, powershell, dns, bash cmd log (Linux), security (Linux: authen, author, accounting), ssh (Linux): 4624, 4625... Tấn công từ A-> B thì trên B có những loại log gì, lên alert gì 5. Sử dung các sản phẩm của mình: để filter một lệnh thì phải làm như thế nào? ví dụ muốn lấy dll trên một máy tính thì dung tính năng gì? event gì 6. quy trình, nguyên tắc để làm tốt vị trí của tier 1. show cảnh báo thực tế và phân tích để xác định xem có phải tấn công không? tấn công gì? ========================================== Tại sao phải học Cyber Kill Chain, APT? APT vs targeted attacks? - APT là một loại tấn công có chủ đích. (có mục tiêu rõ ràng) - Persistent: dai dẳng, bền để đạt được mục đích, có tiềm lực về tài chính, nguồn lực về con người, thời gian,... - Advanced: sự nâng cao, phức tạp của kĩ thuật tấn công, khó để phát hiện. Cyber Kill Chain: Phải hiểu được cảnh báo đang ở giai đoạn nào? có 3 trường phái thông tin khác nhau: Lockheed martin - Reconnaissance - Weaponization: payload khai thác lỗ hổng, file chứa link độc hại (spraying password). - Delivery: USB cắm vào autorun, email, web: SQLi (có file độc hại rồi đăng lên trên các diễn đàn, mạng xã hội), OTT, SMS, Media message - Exploitation: khai thác sử dung malware có từ trước. - Installation: hiding file - Command and Control: reverse shell, bind shell, DNS tunneling, IMCP tunneling, TCP socket, remote desktop tunneling 127.0.0.1 (port forwarding); login type 10 source 127.0.0.1 remote desktop tunneling https://cloud.google.com/blog/topics/threat-intelligence/bypassing-network-restrictions-through-rdp-tunneling/ - Actions on Objectives: gửi file ra ngoài với hơn 1GB, gửi nhiều file zip ra ngoài với mật khẩu, dump mật khẩu Dùng google search để liệt kê 10 website có một lỗ hổng CVE nào đó? 10 tài khoản email có domain là Viettel.com liệt kê 10 website đang public port 80:443 mà chạy bằng php. Tìm và đọc một số bài phân tích email phát tán macro độc hại: tìm cách làm lab hoặc đọc, tạo một file office chứa macro độc hại Trên Linux có bn cách để khởi chạy cùng Linux? cronjob, sử dung SSH key, local account, shell configuration modification?, file bashrc, webshell https://www.cyberark.com/resources/threat-research-blog/persistence-techniques-that-persist https://hackersploit.org/linux-red-team-persistence-techniques/ https://hadess.io/the-art-of-linux-persistence/ ssh từ A-> B; public key B, private thì mình giữ tập hợp nhiều cron job thì gọi là gì? /etc/profile thì thường hacker sử dung làm gì? preload -> liên quan đến rootkit, file .so phát tán phishing -> leo thang đặc quyền -> extract mật khẩu -> mở rộng phạm vi tấn công -> để lại persistence, backdoor -> kết nối C2 -> đi vào hệ thống để lấy dữ liệu -> ẩn mình Cyber Kill Chain exambeam: https://www.exabeam.com/explainers/information-security/cyber-kill-chain-understanding-and-mitigating-advanced-threats/ Reconnaissance -> intrusion -> exploitation: có một chân rồi, và tìm cách khai thác them, leo thang đặc quyền, exploit tài khoản đặc quyền -> leo thang đặc quyền (thường có thông tin tài khoản) -> lateral movement -> obfuscation (anti-forensics) -> DoS -> Exfiltration MITRE ATT&CK Initial Access = Exploitation Resource Development = Weaponization Các bước thường xuyên tiếp cận cảnh báo: Recons, Persistence, Defense Evasion, Credential Access, Discovery, Lateral Movement, có những kĩ thuật gì điển hình và lên cảnh báo gì? https://www.jpcert.or.jp/english/pub/sr/20170612ac-ir_research_en.pdf https://www.sans.org/posters/hunt-evil/ Tool: impacket-SMB-Server để lateral sang con khác. có mấy yếu tố giúp tấn công thành công từ máy A-> B? - phải mở dịch vụ - nạn nhân phải có lỗ hổng - tấn công smb: thông tin về tài khoản (thường là tài khoản đặc quyền), username & password, hash password, Kerberos ticket. Leo thang đặc quyền: https://info.veracode.com/rs/790-ZKW-291/images/privilege-escalaction-prevention-guide-2022-en.pdf - schedule task cũng có thể là leo thang đặc quyền https://juggernaut-sec.com/scheduled-tasks/ https://www.crowdstrike.com/cybersecurity-101/living-off-the-land-attacks-lotl/ - ingress tool: bitsadmin, powershell, wget, curl LOL: tải file, phát tán file, chạy đc trên memory, sc.exe, APT Tìm 3-5 report liên quan đến APT, nắm keychain: APT32 OceanLotus, Lazarus group, Mustang Panda, fancy bear --- https://blueteamlabs.online/home/challenges?category=ALL https://ahmed-naser.medium.com/hacked-blue-team-challenge-walkthrough-write-up-86f3107b3af2 Q1-What is the system timezone? /var/log/auth.log Q2-Who was the last user to log in to the system? Q3-What was the source port the user ‘mail’ connected from? Q4-How long was the last session for user ‘mail’? (Minutes only) Q10-Which user account was created by the attacker? https://jawscyber.com/?p=38 Q4: Which PHP page is vulnerable to Remote File Inclusion (RFI)? Memory Analysis – Ransomware Using YARA To Verify Ransomware Flavour https://jawscyber.com/?p=446 Create YARA rules with GHIDRA https://www.youtube.com/watch?v=4Qo8aKi9aKw Auto create yara rule https://medium.com/@krzysztof.kuzin/btlo-write-up-eradication-809c5df070fb SSH log https://github.com/rehanoshba/writeups/blob/main/BTLO-%20Secure%20shell.pdf https://sec.vnpt.vn/2024/02/review-wmi-tool/ https://www.crowdstrike.com/blog/how-to-detect-and-prevent-impackets-wmiexec/ # Phising https://medium.com/btlo-investigation-solutions/btlo-countdown-b7092360917f Using key to decode database. What is the filename(including extension) that is received as an attachment via email? What is the GPS location of the blast? The format is the same as found in the evidence ## pdf https://medium.com/@krzysztof.kuzin/btlo-write-up-sharpattack-2b4f7162ff65 # Browser https://medium.com/@krzysztof.kuzin/btlo-write-up-poor-joe-78d1f568ef5f What were downloaded? What is the password of the user Joe? What is the social media domain visited? # Deobfuscation and Static Analysis https://sec.vnpt.vn/2022/10/tong-quan-ve-phat-hien-ma-doc/ https://jawscyber.com/?p=126 https://medium.com/btlo-investigation-solutions/btlo-pretium-db6d8e8b3608 What is the default user agent being used for communications? extract all of the data from these ping packets. https://medium.com/btlo-investigation-solutions/btlo-malicious-powershell-analysis-350bee4606b6 https://medium.com/ce-digital-forensics/analysing-metasploit-framework-shellcode-e66b89411000 ## Deofuscate webshell https://labs.detectify.com/how-to/tutorial-php-webshell-de-obfuscation/ ### Beautify code https://www.tutorialspoint.com/online_php_formatter.htm ### Convert hex ![image](https://hackmd.io/_uploads/SkH9b0Of0.png) ![image](https://hackmd.io/_uploads/SkveGCOG0.png =x200) https://github.com/Chrissy-Morgan/PHP-Webshell-DeObfuscator ## Word https://systemweakness.com/malware-analysis-of-a-emotet-word-document-6ccd1027fb2a ## Cheetsheet https://bohansec.com/2021/04/30/Maclious-Powershell-Analysis-Video-Only/ decode text cyberchef https://medium.com/mii-cybersec/malicious-powershell-deobfuscation-using-cyberchef-dfb9faff29f https://malware.news/t/deobfuscating-powershell-putting-the-toothpaste-back-in-the-tube/23509 https://gist.github.com/Neo23x0/6af876ee72b51676c82a2db8d2cd3639 https://www.tevora.com/threat-blog/5-minute-forensics-decoding-powershell-payloads/ https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/invoke-command?view=powershell-5.1 https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.utility/invoke-expression?view=powershell-5.1 https://learn.microsoft.com/en-us/powershell/module/Microsoft.PowerShell.Utility/Set-Alias?view=powershell-5.1 ``` powershell.exe -NoE -Nop -NonI -ExecutionPolicy Bypass -C "$decodedScript = [System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('JABwAHIAbwBjAGUAcwBzACAAPQAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgAGMAYQBsAGMALgBlAHgAZQA='));Invoke-Expression $decodedScript" ``` * Don’t block the IP just yet. You want to identify all affected systems and determine if multiple C2’s are being used. Attackers like Fin7 have been known to use between 3-5 different C2’s for a single attack. (**many C2**) * Do a **quick investigation** on any other affected hosts, so that you can give them the ban-hammer all at once. Otherwise you could end up playing whack-a-mole for a while. * Review logs for all devices that connect back to the attacker’s identified IP * Review all internal connections to and from the affected host (especially SMB traffic) * Review all external connections to and from the affected host (including DNS traffic) * Multiple threat actors use DNS traffic for C2 and to avoid detection. * Review the affected hosts for artifacts and persistence mechanisms (reg keys, scheduled tasks, emails, word docs, etc.) * Review anomalous or suspicious activity from these hosts, such as connecting to dropbox, google docs, etc., to determine if data was exfiltrated. * **Don’t start recovery until it’s certain the threat has been removed**. The last thing you want to do spend a ton of hours recovering (resetting passwords, reimaging, etc.) and then have to do it all over again for the same incident! # IDA Analyst https://medium.com/ce-malware-analysis/lab-5-ida-pro-bb7c7772dd99 https://medium.com/ce-malware-analysis/lab-6-c-code-constructs-in-assembly-e8f22078600c # ELK https://medium.com/@0x4C1D/try-hack-me-hunt-me-i-payment-collectors-walkthrough-5a26c86cd515 https://medium.com/@0x4C1D/try-hack-me-threat-hunting-foothold-walkthrough-845c3ec6723d https://medium.com/@0x4C1D/try-hack-me-threat-hunting-pivoting-walkthrough-ebf1ab8b6a47 https://medium.com/@0x4C1D/try-hack-me-threat-hunting-endgame-walkthrough-18edf8565e9c Commonly used techniques are listed below: * Man-in-the-middle * ARP / LLMNR Poisoning * SMB Relay * DHCP Spoofing * Hijacking * Traffic dump * Keylogging * Input capture * Data collection from local/cloud/repositories Some search example https://medium.com/@krzysztof.kuzin/btlo-write-up-soc-alpha-1-cacbdbaa617a https://medium.com/@krzysztof.kuzin/btlo-write-up-soc-alpha-2-f60743a968f8 What is the full command used for bypassing the defender scan on the malicious file? https://learn.microsoft.com/en-us/powershell/module/defender/add-mppreference?view=windowsserver2022-ps What is the full path of the exe used for dumping password? ``` Make windows defender don't check and file or folder. Event_EventData_Image : (*mimi* OR *mimikatz* OR *procdump* OR *lsremora.dll* OR *lsremora64.dll* OR *dumpext.dll* OR *wceaux.dll* OR “mimidrv.sys”) ``` # Wireshark https://www.linkedin.com/pulse/ph%C3%A2n-t%C3%ADch-h%C3%A0nh-vi-t%E1%BA%A5n-c%C3%B4ng-m%E1%BA%A1ng-th%C3%B4ng-qua-file-pcap-nguy%E1%BB%85n-%C4%91%E1%BB%A9c-t%E1%BA%A5n-yv0xc/ scdbg ![image](https://hackmd.io/_uploads/S1DO56FMA.png) http://sandsprite.com/blogs/index.php?uid=7&pid=152 https://medium.com/@bmaretyatp/malware-traffic-analysis-emotet-malware-e7abe00d7dc8 email activity https://medium.com/@y0tz/malware-traffic-analysis-examining-emotet-infection-traffic-1357002076d2 # volatility https://medium.com/@krzysztof.kuzin/btlo-write-up-poor-joe-78d1f568ef5f What were downloaded? Photorec to recover any file What is the password of the user Joe? What is the social media domain visited? What is the decryption id Joe has to use in order to decrypt the files find which file was packed with UPX find the malicious process with malfind Compiled Date of the Malicious Executable. https://medium.com/@krzysztof.kuzin/btlo-write-up-total-recall-c02b0885a734 mans file The user tried to download an .exe file to the system but cancelled it. What was the filename? What user accounts were created by the insider? What service was enabled by the attacker https://kcsc.edu.vn/tetctf-2024-write-up?fbclid=IwAR1yM0QvWucCUD-dgpkk6YM2vQZTyc8OYLhaq0wzjYuUXcBVrlbqHfx6bk4#heading-preface .ad file https://hackmd.io/@Automic-Kaiii/HkWmhmzH2#Linux-is-hurt #build profile https://github.com/volatilityfoundation/volatility/wiki/Command-Reference https://andreafortuna.org/2017/07/31/volatility-my-own-cheatsheet-part-6-windows-registry/ https://sbasu7241.medium.com/otterctf-2018-memory-forensics-write-up-part-2-14bf86e3ab94 clipboard(pluggin) #copy-paste https://odintheprotector.github.io/2023/09/20/hackthebox-truesecret.html ``` python vol.py -f <filename> imageinfo python vol.py -f <filename> --profile=<profile_name> pslist cmdline python vol.py -f <filename> --profile=<profile_name> filescan | grep <sth> ``` MEMORY.DMP ## vol 3 python vol.py -f MEMORY.DMP windows.pslist vol -f MEMORY.DMP windows.filescan > a.txt vol.exe -f "MEMORY.DMP" windows.handles.Handles --pid 1736 vol -f MEMORY.DMP windows.dumpfiles --physaddr 0x7e3e2070 vol.exe -f "MEMORY.DMP" dumpfiles --pid 1736 ## Autospy https://medium.com/btlo-investigation-solutions/btlo-countdown-b7092360917f ## compare 2 snapshot file regshot #tool use for .hivu file vmem file ## dump creadentials by hash https://odintheprotector.github.io/2024/02/17/bitsctf2024-dfir.html python3 volatility3-2.5.0/vol.py -f memdump-001.mem windows.hashdump https://github.com/KMANVK/CTF_Wu/blob/main/MGCI-WLMAC%20Joint%20CTF%20Contest%20'21/Forgetful/solved.md Recycle.Bin https://www.4rth4s.xyz/2020/10/learning-memory-forensics-with.html ``` volatility -f <file_dump.raw> --profile=PROFILE hivelist volatility -f <file_dump.raw> --profile=<profile> hashdump -y <SYSTEM offset> -s <SAM offset> > hashes.txt volatility -f <file_dump.raw> --profile=Win7SP1x86_23418 ``` cmdscan vmem file userassist (pluggin) (Print userassist registry keys and information) https://blog.bi0s.in/2020/08/04/Forensics/Investigation-InCTFi2020/ (another way get info from registry ntuser.dat) ``` volatility -f windows.vmem --profile=Win7SP1x64 dumpregistry -o 0xfffff8a00256d010 -D . python vol.py -f exemplar17_1.vmem iehistory ``` https://odintheprotector.github.io/2023/09/20/hackthebox-truesecret.html https://gist.github.com/1259iknowthat/8cb818f0a37566b1fc25151ef074d9af tc file https://www.varonis.com/blog/how-to-use-volatility network https://0xdf.gitlab.io/2019/09/07/htb-bastion.html vhd file ``` guestmount --add 9b9cfbc4-369e-11e9-a17c-806e6f6e6963.vhd --inspector --ro /mnt/test ``` or use autopsy https://hackmd.io/@Automic-Kaiii/By6L3Qil2 vhdx file https://github.com/Malandrone/PowerDecode? python3 vol.py -f forensics.mem linux.bash volatility_gpg #test xem thử file mem có chứa pass ko python3 vol.py -f forensics.mem -p volatility-gpg gpg_full gpg --batch --yes -r "RansomKey" -o qgffrqdGlfhrdoE -e RxgXlDqP0h3baha https://github.com/KMANVK/CTF_Trainee/blob/main/Task%201.md #find hostname https://github.com/moaistory/WinSearchDBAnalyzer recover deleted records in Windows.edb ## browser history https://medium.com/@huseyin.eksi/quick-forensics-on-google-chrome-c9fb3ffdc9ad https://kcsc.edu.vn/tetctf-2024-write-up?fbclid=IwAR1yM0QvWucCUD-dgpkk6YM2vQZTyc8OYLhaq0wzjYuUXcBVrlbqHfx6bk4#heading-preface https://systemweakness.com/extracting-saved-passwords-from-web-browser-1444dbfb6551 \Users\DuyTan-KMA\AppData\Local\Google\Chrome\User Data\Default\History https://github.com/bquanman/CTF-Writeup/blob/main/ISITDTU%20CTF%20Final%202022/L34K%20-%20Misc(Forensics)%20-%20ISITDTUCTF%20Final%202022.md https://github.com/KMANVK/CTF_Trainee/blob/main/Task%201.md https://www.inversecos.com/2022/10/recovering-cleared-browser-history.html https://odintheprotector.github.io/2024/01/28/tetctf2024-writeup.html ## dump the screen from memorydump https://www.rootusers.com/google-ctf-2016-forensic-for1-write-up/ # Incident response https://www.acunetix.com/blog/articles/how-to-recover-from-a-hacked-website/