One of our fellow admins noticed a weird connection from Bob's host IP = 172.16.10.90 when analyzing the baseline captures we have been gathering. He asked us to check it out and see what we think is happening.
Attempt to utilize the concepts from the Analysis Process sections to complete an analysis of the guided-analysis.zip provided in the optional resources and live traffic from the academy network. Once done, a guided answer key is included with the PCAP in the zip to check your work.
Connect to the live host for capture.
Connection Instructions: Access to the lab environment to complete the following tasks will require the use of XfreeRDP to provide GUI access to the virtual machine so we can utilize Wireshark from within the environment.
We will be connecting to the Academy lab like normal utilizing your own VM with a HTB Academy VPN key or the Pwnbox built into the module section. You can start the FreeRDP client on the Pwnbox by typing the following into your shell once the target spawns:
xfreerdp /v:"target IP" /u:htb-student /p:HTB_@cademy_stdnt!
You can find the target IP, Username, and Password needed below:
Once connected, open Wireshark and begin capturing on interface ENS224.
Follow this workflow template and examine the suspicious traffic. The goal is to determine what is happening with the host in question.
what is the issue?
define our scope and the goal (what are we looking for? which time period?)
define our target(s) (net / host(s) / protocol)
capture network traffic / read from previously captured PCAP.
identification of required network traffic components (filtering)
An understanding of captured network traffic
note taking / mind mapping of the found results.
Finally, summarize what has been found, explaining the relevant details so that superiors can decide to quarantine the affected hosts or perform a more critical incident response mission. Our analysis will affect decisions made, so it is essential to be as clear and concise as possible.
Complete an attempt on your own first to examine and follow the workflow, then look below for a guided walkthrough of the lab.
This task was best completed using the PCAP file provided for the lesson. Following the steps in the workflow, we filled in the information and performed our analysis.
what is the issue?
define our scope and the goal (what are we looking for? which time period?)
define our target(s) (net / host(s) / protocol)
capture network traffic
identification of required network traffic components (filtering)
After checking out the conversations plugin pictured, we can see there are only three conversations captured in this pcap file, and they all pertain to our suspicious host. Next, we will look at the protocol hierarchy plugin to see what our traffic is.
We can see here that this PCAP is mostly TCP traffic, with a bit of UDP traffic. Since there is less UDP than TCP traffic, let us look into that first.
Once we have filtered out the noise, it's time to dig for anything unusual. We are going to filter out everything but `UDP traffic first.
When filtering on just UDP traffic, we only see nine packets. Four arp packets, four Network Address Translation NAT, and one Simple Sevice Discovery Protocol SSDP packet. We can determine based on their packet types and information they contain that this traffic is normal network traffic and nothing to be concerned about.
Now, let's move on to looking at TCP traffic. We should have quite a bit more here to sift through. We are going to utilize the display filter !udp && !arp. This filter will clear out anything we have already analyzed.
Now that we have cleared our view a bit, we can see the remaining packets are all TCP, and all appear to be the same conversation between hosts 10.129.43.4 and 10.129.43.29. We can determine this since we can see the session establishment via a three-way handshake at packet 3, and the same ports are used through the rest of the packets in the output below.
What does appear interesting is that we do not see a TCP session teardown in this PCAP file. This could mean the session was still active and not terminated. We believe this to be true since we do not see any Reset packets either. We can also examine the conversation by following the TCP stream from packet 3 to determine what it encompasses.
Now that we followed the TCP stream, we should have alarm bells ringing for us. We can see this entire conversation between the two hosts in plain text, and it appears that someone was performing several different actions on the host.
Looking at the image above, it appears that someone is performing basic recon of the host. They are issuing commands like whoami, ipconfig, dir. It would appear they are trying to get a lay of the land and figure out what user they landed as on the host. highlighted in orange in the image above.
What is truly alarming is that we can now see someone made the account hacker and assigned it to the administrators group on this host. Either this is a joke by a poor administrator. Or someone has infiltrated the corporate infrastructure.
note taking / mind mapping of the found results.
summary of the analysis (what did we find?)
After analyzing the actions taken, the IR team determined that The actor got lazy and decided to utilize a Netcat shell and directly interact with Bob's host while gathering more information. While doing so, he used RDP from Bob's host to another windows desktop in the environment to try and establish another foothold. Luckily, the IR team was able to capture some PCAP of the RDP traffic. Bob's host was quarantined, and incident response was initiated to determine what was taken and what other potential hosts were compromised. Great job spotting the intrusion.
RDP to with user "htb-student" and password "HTB_@cademy_stdnt!"
What was the name of the new user created on mrb3n's host?
How many total packets were there in the Guided-analysis PCAP?
What was the suspicious port that was being used?