Cylabs
  • 😊Welcome to CyLabs
  • 101 Series
    • Cyber Security 101
      • Introduction to Cyber Security and core concepts
      • Getting Started into Cyber Security Career
      • Online Cybersecurity Practice Labs to Sharpen Your Skills
      • Cyber Security Interview Q&A
        • Careers in Cybersecurity
      • Stay Tuned : Cyber Resources
        • Blogs for Cyber Security
          • Blogs
            • Penetration Testing Automation
            • Security
              • Metasploit Framework
              • Jenkins Servers: Identifying Vulnerabilities and Exploiting Unauthenticated Access with Groovy Scrip
              • Securing Your Network: Printer Vulnerabilities, LDAP Exploits, and Defense Strategies
              • SSH for Red Teaming and Security Analysis
              • Operating Systems for Penetration Testing: Enhancing Your Cybersecurity Arsenal
              • Hacking Notes
                • Phineas Fisher
        • Cyber News
        • Leading Cybersecurity Companies to follow
        • Cybersecurity Courses and Certifications: Trends in 2024
        • ISACs: Enhancing Cybersecurity through Collaboration and Information Sharing
        • Global and National Cybersecurity Agencies: Guardians of the Digital Realm
        • Cyber Security News Feed Resources
    • Kubernetes 101
    • Web 101
    • Operating Systems
      • Linux 101
        • Linux Kernel
        • Basic Commands and Usage
          • Shell Commands
        • Linux File System
        • apt
        • su and sudo
        • File Search
        • Linux Services
        • Networking
          • Netcat
        • Corn Jobs
        • Shell Scripting
        • Linux OS API's
      • Windows 101
        • Windows system calls
        • Windows Event Logs and IDs
        • Windows UAC
        • Windows Registry
        • Windows Bit Locker
        • Volume Shadow Copy Service
        • Windows OS API's
    • Building the Security Lab
      • Virtualization with Virtual Box
        • Installing and setting Virtual Box
        • Vritual Box Networking
      • Home Lab Setup
        • PF Sense Installation
        • Ubuntu Installation
        • Metasploit Installation
        • Kali Linux Installation
    • Fundamentals of Programming
      • Python 101
      • Powershell 101
      • SQL 101
    • AI/ML and Data Science for Cyber Security and Analytics
    • IT Infrastructure and Hardware
    • Governance, Risk and Compliance
    • Networking 101
      • Network Packets and Frames
      • Network Switches and Routers: The Backbone of Connectivity
      • Network Security Devices and Strategies
      • Network Design and Architecture: A Foundation for Robust Connectivity
      • Specialized Network Equipment and Functions
      • Network Traffic Management and Analysis
      • Advanced Networking Concepts
      • ARP and RARP
      • How DNS, HTTP and HTTPS works
      • Understanding the Basics of Networking
  • Introduction to Cyber Security Operations
    • Security Architecture and Engineering
      • Security Controls
        • Preventive
        • Deterrent
        • Detective
        • Corrective
        • Compensating
        • Directive
    • GRC
      • Information Security and Risk Management
        • Risk Management
        • Supply Chain Risk Management
        • Governance
        • Asset Management
        • Cyber Security Road Map
        • Cyber Security Controls
        • Cyber Security Strategy and Architecture
        • Cyber Security Architecture
        • Risk Assessment and Security Questionnaire
        • Ransomware Prevention
        • Gap Assessment
        • Principle of Least Privilege
      • Governance
      • Asset Security
      • Communication and Network Security
      • Identity and Access Management
      • Security Assessment and Testing
      • Security Operations
      • Software Development Security
      • Security Baselines
      • Security Reporting
      • Data Loss Prevention
      • Zero Trust
      • MFA
      • Compliance
    • Security Policies and Procedures
    • Offensive Security
      • Stages of Penetration Testing
    • Cyber Defense
      • Security Operations Center (SOC)
        • SOC Architecture Development with ELK Stack:
      • Different Classes of Threat Actor
    • Security Principles, Controls and Strategies
      • Defense in Depth
      • Least Privilege
      • Zero Trust
  • Cyber Security Assessment
    • Planning and Scoping
      • Security Engagement
      • Security Assessment Questionaire
      • Who Targeting you
    • Reconnaissance
      • Active Recon
        • Tools
          • NMAP
          • Maascan
          • Recon-NG
          • Maltego
          • Spider Foot
          • Whois
          • TraceRoute
          • Amass
          • The Harvester
          • Nslookup
          • DNS Dumpster
          • BloodHound
          • Relay Attacks
          • Packet Crafting
          • NMAP+Proxychains+TOR
      • Passive Reconnaissance
        • Network Sniffing
          • Wireshark
          • TCPDump
        • Whois (online services)
        • EMail Account Enumeration
          • Hunter.io
        • Search Engine Analysis
          • Google Hacking Database
          • Shodan
          • Censys.io
        • Information Disclousre
        • Banner Grabbing
        • HTML Scrapping
        • Certificate Transparency Logs
        • Open Source Intelligence (OSINT)
          • Ship OSINT
          • Social Media
          • Code Repositories
          • Darkweb Analysis
          • DNS
          • Cached Pages
          • Password Dumps
          • Anonymity
    • Enumeration
      • OS Finger Printing
      • Service Discovery
      • Protocol Enumeration
      • DNS Enumeration
      • FTP Service
      • HTTP/HTTPS
      • WMI
      • DCOM
      • RPC Remote Procedure Call
      • Directory Enumeration
      • Host Discovery
      • Share Enumeration
        • SMB
      • Local User Enumeration
      • Email Account Enumeration
      • SSH Service
      • Wireless Enumeration
        • Wigle.net
        • InSSIDer
        • Aircrack-ng
      • Permission Enumeration
      • Secrets Enumeration
        • Passwords
        • Session Tokens
        • Cloud Access Keys
      • Attack Path Mapping
      • VNC
      • Web Application Firewall
      • Wordpress Scan
      • Remote Desktop Protocol
      • SNMP
      • SMTP
      • Web Crawling
        • Platform Plugins
        • Sitemap
        • Robots.txt
      • Active Directory Enumeration
    • Vulnerability Assessment and Management
      • Terminology
      • Vulnerability Database
      • Vulnerability Scoring
        • CWE
        • CVSS
        • CVE
        • EPSS
      • Vulnerability Scan
        • Authenticated vs Unauthenticated Scans
        • OS Security Assessment
        • Tenable
        • Nikto
        • Open VAS
      • Exploit Databases
      • Tools
        • Tenable.IO
        • Open VAS
    • Exploitation
      • Attack Surface and Target Prioritization
        • High Valued Assets and Identification
        • Vulnerability Metrics
        • End of Life Softwares
        • Default Configuration
        • Running Services
        • Vulnerable Encryption Methods
        • Defensive Capabilities
        • Attack Path
      • Attack Types
        • Network Attacks
          • Virtual LAN Hopping
          • Packet Crafting
            • Attacks Scenario
          • Default Credentials
          • On-Path / Man in the Middle Attacks
          • Certificate Services Attacks
      • Host Based Attacks
        • Privilege Escalation
        • Credential Dumping
        • Shell Escape
        • UAC Bypass
        • Payload Obfuscation
        • Endpoint Security Bypass
        • Process Hallowing
        • Log Tampering
        • DLL Injection
        • Service Path Injection
      • Authentication Attacks
        • LDAP Injection
        • SAML Attacks
        • Open ID Connect Attacks
        • Dictionary Attacks
        • Credential Stuffing
        • MFA Fatigue
        • Pass the Hash attacks
        • Kerberos Attacks
        • Pass the Ticket Attacks
      • Vulnerable Encryption Methods
      • Tools
        • Metsploit
        • Netcat
        • LOLbins
        • Mimikatz
        • Rubeus
        • Certify
        • AD Search
        • Powerview
        • SeaBelt
        • Evil winRM
        • PSEXEC
        • Powersploit
        • Metasploit
        • Impacket
        • Responder
        • CrackMapExec
        • Msfvenom
        • Responder
        • Searhsploit
        • Powersploit
      • Password Attacks
        • Password Cracking
        • Password Spraying
        • Tools
          • Medusa
          • Burpsuite
          • John the Ripper
          • Hydra
          • Hashcat
        • Password Attacks
    • Lateral Movement
      • Relay Creation
      • String Searches
      • Service Discovery
      • Tunneling
        • SSH Tunneling
      • Pivoting
      • Exfiltration
        • DNS
        • HTTPS
        • EMail
        • Cloud Storage
      • Tools
        • sshuttle
        • Page 1
    • Post Exploitation
      • Persistance
        • Scheduled Taks
        • Bind Shell
        • Registry Keys
        • C2 Frameworks
        • Tampering Security Controls
        • Back Door
          • Trojan
          • Root Kit
          • Web Shell
        • Searching Valid Account Credetials
        • New Account Creation
        • Reverse Shell
        • Service Creation
        • Cron Jobs
      • Command and Control
    • Reporting
  • Cybersecurity Frameworks and Standards
    • CREST
    • CIS
    • NIST Publications
      • NIST SP 800-171
      • NIST CSF
      • NIST SP 800-115
    • MITRE
      • MITRE D3FEND
      • MITRE ATT&CK
    • Penetration Testing Execution Standard (PTES)
    • OWASP Top 10
    • Purdue Model
    • Open Source Security Testing Methodology Manual (OSSTMM)
    • Council of Registered Ethical Security Testers (CREST)
    • Zero Trust
    • CMMC
    • Threat Modeling Frameworks
      • STRIDE
      • OCTAVE
      • DREAD
    • Mitigation Strategies
      • Network Segmentaion
      • Access Control
      • Application Control
      • Isolation Techniques
      • Default Password Changes
      • Host based firewall
      • Protocol blocking
      • Port blocking
      • Host based intrusion prevention
      • Endpoint Management
      • Decommissioning
      • Configuration Management
      • Least Privilege
      • Logging
      • Monitoring
      • Encryption
      • Patching
    • Security Governance
      • Data and System: Roles and Responsiblities
      • Security Policies
        • Access Use Policy
      • Security Standards
        • Access Control
        • Encryption
        • Password
      • Security Procedures
        • Change Management
  • Security Domains
    • Security Designing
    • Application Security
      • Cryptographic Attacks
      • Password Attacks
      • Web Application Security
        • Enumeration
          • Cookie and Header Security Review
        • Bruteforce Attack
        • Directory Traversal
        • Insecure Direct Object Reference (IDOR)
        • Session Hijacking
        • File Inclusion Attacks
          • LFI
          • Webshell
          • RFI
        • Server-Side Request Forgery (SSRF)
        • Deserialization Attacks
        • Command Injection
        • Server Side Template Injection
        • Cross Site Scripting (XSS)
        • SQL Injection
          • Union Based SQL Injection
          • Blind SQL Injection
        • Cross-Site Request Forgery (CSRF)
        • XML External Entity (XXE)
        • File Upload Vulnerabilites
        • Remote Code Execution (RCE)
        • Tools
          • Hetty
      • OWASP TOP 10 API
        • API Abuse
        • JWT Token manipulation
        • Graph QL security
        • API security
      • OWASP Top 10 Mobile
      • OWASP Top 10 IOT
      • Web Application Security
        • Getting Started in BugBounty Hutning
        • Subdomain Enumeration
        • Subdomain Takeover: Understanding the Risks and Prevention
        • Tools and Technologies
      • Microservices
      • WPscan
        • Burpsuite
        • Ffuf
        • Gobuster
        • Postman
        • Dirbuster
        • Wfuzz
        • ZAP
      • Tools
        • BurpSuite
        • SQLmap
    • Cloud Security
      • Metadata Service Attacks
      • IAM misconfigurations
      • Tools
        • Pacu
        • Prowler
        • Scoutsuite
        • Docker Bench
      • Container Escape
      • Workload Runtime Attacks
      • Supply Chain Attacks
      • Misconfigurations
        • Network Segmentation
        • Network Controls
        • IAM Credentials
        • Public Access to Services
        • Exposed Storage Buckets
        • Logging Information Exposure
      • Azure Security : Components and Assessment Guide
        • Azure Security Assessment Tools : Installation and usuage
    • Identity and Access Management
    • Cloud Security
      • Cloud Engineering and Architecture concepts
      • Cloud Data Security
      • Cloud Platform and Infrastructure Security
      • Cloud Application Security
      • Cloud Security Operations
      • Cloud Legal, Risk and Compliance
      • Azure Security
      • Azure Pentest
    • DevSecOps
      • Static Application Security Testing (SAST)
        • Code Quality
        • CheckMarx
        • Sonarqube
          • Sonarqube Installation using Helm Chart on AKS
      • Interactive Application Security Testing (IAST)
      • Dynamic Application Security Testing (DAST)
      • SCA
      • Wazuh SIEM and XDR
        • Wazuh on Azure AKS
        • Azure + Argo
      • DevSecOps
    • Social Engineering
      • Vishing
      • Spearphishing
      • Smishing
      • Eavesdropping
      • Impersonation
      • Watering Hole
      • Shoulder Surfing
      • Whaling
      • Phishing
      • Tools
        • GoPhish
        • Beef
        • Evilginx
        • SET social engineering toolkit
    • DevOps
      • Kubernetes
        • Kubernetes Architecture and Components
        • Mastering kubectl: The Command Line Interface for Kubernetes
        • Overview of Kubernetes Tools and Utilities
        • Container vs Pod vs Deployment
        • Kubernetes and Docker Swarm
        • Deploying a Kubernetes Cluster Using Minikube
        • Deploying a Kubernetes Cluster Using Kind
        • Integrating Kubernetes with Azure Key Vault
        • Containers vs Virtual Machines
        • Comprehensive Guide to Kubernetes Security and Analysis Tools
        • Monitoring Kubernetes with Prometheus and Grafana
        • Introduction to Azure Kubernetes Service (AKS) and Deploying Your First Cluster
        • Kubernetes Persistence with Backend Databases
        • Kubernetes StatefulSet vs. Deployment
        • DevSecOps Architecture for Kubernetes
      • Docker
      • Helm
        • Scenario : Configuring Azure Key Vault and Using Secrets in Helm Deployments
      • Git Ops
        • Argo CD
      • Git and Versioning
      • Terraform
      • Virtualization
    • Mobile Security
      • Android Mobile App Security Assessment
      • Suspicious Malware App Analysis
      • Android App Penetration Testing
      • Permission Abuse
      • Jailbreak/Rooting
      • Tools
        • MobSF
        • Drozer
        • Frida
    • IOT/OT/SCADA
      • Power Supply
        • Juice Jacking
      • RFID
      • Bluetooth
        • BlueJacking
        • Bluetooth Spamming
      • Ports and Services
      • Port Mirroring
      • Modbus Attack
      • CAN Bus Attack
      • Replay Attack
      • Memory Registry Attacks
      • Tools
        • BlueCrack
        • Scapy
        • TCP Replay
    • Network Security
      • Network Attacks
        • DNS Attacks
        • DDOS
      • Network Assessment
      • Wireshark
      • Zeek
      • Snort
      • TCPDump
      • Defensive Network
        • Firewalls
        • Intrusion Detection System
    • Wireless Attacks
      • Service Set Identifier (SSID)
      • Wardriving
      • Evil Twin Attack
      • Deauthentication Attacks
      • Signal Jamming
      • Channel Scanning
      • Signal Strength Scanning
      • Tools
        • WiFi Pumpkin
        • AirCrack Ng
        • Kismet
    • Purple Teaming
      • Tools
        • Infection Monkey
        • Atomic RedTeam
        • Caldera
    • Kubernetes Security
      • AKS Security
      • Kube-Hunter
      • KubeEscape
    • Hardware Security
    • Container Security
      • Grype
      • Trivy
      • Clair
    • AI
      • LLM (Large Language Models)
      • Prompt Engineering
      • AI Cyber Security Risk Management
        • AI Policies
      • AI Security
      • AI Attacks
        • Prompt Injection
        • Model Manipulation
      • Security Frameworks
        • MITRE ATLAS
        • OWASP Top 10 LLMs
        • NIST AI Risk Management Framework
    • Reverse Engineering
      • Scenarios
        • Browser Plugin
        • PDF document
        • Word Doc
        • Windows Binary File
        • Mobile App
      • Buffer Overflow
  • Operational Security
    • Identity and Access Management
      • Identity
      • Authentication
      • Accountability
      • Access Management
      • Authorization
      • Access Controls
    • Deception Technology
      • Honeypot
      • Honeynet
      • Honeyfile
      • Honey Token
    • Cryptography
      • Data at Rest
      • Data at Transit
      • Hashing
      • BlockChain
      • Digital Signatures
      • Certificates
      • Encryption
        • Public Key Infrastructure (PKI)
          • Public Key
          • Private Key
        • Tools
      • Certification Preparation
        • Penetration Testing
        • GRC and Audit
    • File Integrity Monitoring
    • Data Security
      • DLP
    • Change Management
      • Impact Analysis
    • Malware Analysis
      • Malware Analysis Tool
      • Malware Analysis Books
      • university courses and resources related to malware analysis
      • Binary Analysis
    • Data Loss Prevention
    • Threat Modeling
      • Attack Surface Management
        • Introduction
      • Threats, Technologies, Procedures
        • Threat Actors
      • Threat Hunting
        • Indicators of Compromise
      • Threat Assessment
        • Threat Modeling
          • OCTAVE
          • DREAD
          • STRIDE
        • Threat Hunting
          • Threat Hunting Blogs
          • Ransomware: An Overview
          • Threat Hunting and Incident Response Q&A
          • Network Traffic Analysis: Wireshark
          • Threat Hunting Questionnaire
          • KQL
          • Email Header Analysis
          • TH
          • Windows Process Exploration
        • Threat Intelligence
          • Threat Intelligence Tools and Techniques
            • Yara
      • Malware Attacks
    • Digital Forensics
      • Network Forensics
      • Forensic Tool Analysis
      • Data Recovery
    • Endpoint Management
    • SOC/SOAR
      • Threat hunting scenarios
      • Log Management
        • AWS VPC flow log analysis
        • Linux Logs
        • Windows Logs
    • Ransomware Prevention
      • APT Groups
    • Security Automation
      • C
      • Powershell
      • Python
      • C++
      • GO
      • Rust
    • Incident Response
      • Scenarios
        • Windows : No Event Logs
      • Tools
        • Chainsaw
    • Defensive Security Controls
    • Physical Security
      • Physical Attacks
        • USB (Universal Serial Bus)
        • Tailgating
        • Lock Picking
        • RFID Cloning
          • Badge Cloning
    • Personal Security
    • Security Awareness and Training
    • Firewall
    • Network Access Control
    • Intrusion Detection System
    • Intrusion Prevention System
    • Operating System Security
    • Secure Protocol Usuage
    • Business Continuity
    • Email Security
    • DNS Filtering
    • user behaviour analytics
    • Host Security
    • Mobile Device Security
    • Change Management
    • Vulnerability Management
      • Vulnerability Assessment
        • Vulnerability Analysis
      • Types of Vulnerabilites
    • Penetration Testing/Red Teaming
    • Disaster Recovery
    • Logging and Monitoring
      • Monitoring
        • Systems
        • Infrastructure
        • Applications
      • Logging
        • Log Data
          • Application Logs
          • Network Logs
          • WAF Logs
          • IDS/IPS logs
          • OS logs
          • Endpoint Logs
          • Firewall Logs
        • Alerting
        • Log Aggregation
      • Tools
    • Endpoint
    • Security Metrics
  • Industry Specific Security:Case Studies
    • Aviation Security
      • The Integral Role of Airports in National Security : Operations Perspective
      • Cyber Attacks on Airports
      • Navigating the Complex Web of Airport Operations: Key Components and Leading Industry Providers
    • Aviation Security
  • Computational Science
    • Quantum Computing
      • Quantum Computing: Unleashing the Power of Qubits
    • Probability
  • Data Engineering
  • AI/ML and Data Science
    • Installation
      • Ollama
    • Machine Learning
    • Large Language Models (LLM)
    • Security Analytics
    • Untitled
      • Roles and Responsibilites
      • Azure AI Services
        • AI Services Security
        • Monitoring Azure AI Services
        • AI services on containers
  • Application Development
    • Django
  • Radom Topics :)
    • CSA WAI
  • CISSP
Powered by GitBook
On this page
  1. Operational Security
  2. Threat Modeling
  3. Threat Assessment
  4. Threat Hunting

TH

PreviousEmail Header AnalysisNextWindows Process Exploration

Last updated 1 year ago

Was this helpful?

CtrlK

Was this helpful?

Threat hunting

  • Organization mission

  • Threat Actors targeting Aviation Industry

  • What are the critical assets and businesses

  • Who targeting DFW Airport

  • Do any third party companies targeted in process of attacking us

  • Which exploits are used for attacks

  • Which APT targets us

  • Hypothesis

    • AISAC and recent TTP's and cyber attacks

    • Blind spots in organization

    • Tools and techniques used by Threat Actors

    • Data infiltration and Exfiltration Techniques

    • IOC's and adversary TTP's

    • Investigate

      • TTPS

      • Analytics

  • Creating threat detection rules

  • Collecting Malware Samples and fetch new patterns and TTP's

  • Getting alerts to Incident Response

  • Security Analytics and

Before starting Threat Hunting

Which Threat Actors targeting

  • Aviation ports

  • Airline, Transport Industry

  • Geo Political

Focus on attack techniques

Focus on critical assets and information

  • Crown Jewels Analysis (CJA)

Threat hunting Models/Framework

  • Diamond Model of Intrusion Analysis

  • MITRE ATTACK

  • BAS Threat Library (picus)

List of threat hunting tools

  • Data sources from MITRE attack

  • Data visibility

  • Historical data for threat hunting

  • Threat Hunting Maturity Model breach attack simulation model

  • Sqrrl

Know thy self

  • Reconnaissance

  • Osint

  • Asset inventory

  • Network segmentation

  • Patching

  • Backup

Pyramid of pain

Threat hunting

  • Start with applications

  • Browser plugins

  • System level event

  • Host perimeter

  • Edge firewalls

Tools

  • Phishing catcher

  • Dnstwist

  • Gnuplot

  • Apiify

  • Query isc api for IP based threat intel

  • Domain_Stats from sans

Cloud attacks

  • Need to implement logging

  • Password spraying

  • One dirve log analysis

  • Cloudtrail logs

Know normal

  • Local users

  • ASEP's entry points

  • Trusted Root certs

  • Entropy in filenames

  • Entropy in dns

  • Freq in dns and filenames

  • Services

  • Open ports

  • In and outbound communication

  • Arp entries

  • Software installed

  • Processes

  • Authorized hosts files

  • Host file

  • DNS and IP

  • Same first name and last name and sender email address changed

  • Email forwarding rules

  • User at risk

  • Sign in infected device

  • Sign in from unknown location

  • Understanding user privileges

  • Singn in anonymous vpn, tor,

  • Dropbox kind of tool communication

  • Use of I2p, Tor, socks

  • Slow in application performance

  • Autstart program and scripts

  • Unique processes

  • Host

    • profiling by segments

    • profiling by zones

  • Tools

    • ELK

    • OS Query

    • Fleet Kolide

  • Seen first time

    • File names

    • Processes

    • Processes had a file

    • Processes running from main memory

    • Most common and most rare

      • Files

      • Processes

      • Applications

    • Signals

      • Account discorvery

      • Account creation

      • Account modification

  • Honey tokens

    • Spn's

    • Credentials

    • Files

    • Folders

    • User-agents

Tools

C:\Windows\system32\cmd.exe /C whoami /groups C:\Windows\system32\cmd.exe /C tasklist /v C:\Windows\system32\cmd.exe /C netstat -na | findstr "EST" C:\Windows\system32\cmd.exe /C systeminfo C:\Windows\system32\cmd.exe /C ipconfig /displaydns C:\Windows\system32\cmd.exe /C wmic /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName,pathtoSignedProductExe wmic /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName,pathtoSignedProductExe netstat -an net user net use net view /all netstat -an net user net use net view /all net view /all /domain cmd.exe /c "reg.exe save hklm\security c:\windows\temp\xqjxxkmbrx" reg.exe save hklm\security c:\windows\temp\xqjxxkmbrx cmd.exe /c "reg.exe save hklm\system c:\windows\temp\kjmohmuk" reg.exe save hklm\system c:\windows\temp\kjmohmuk cmd.exe /c "reg.exe save hklm\sam c:\windows\temp\emmbnafzjtwq" reg.exe save hklm\sam c:\windows\temp\emmbnafzjtwq net share C:\Windows\system32\net1 share net config workstation C:\Windows\system32\net1 config workstation net group "Domain Admins" C:\Windows\system32\net1 group "Domain Admins" route print net localgroup C:\Windows\system32\net1 localgroup ipconfig /all tasklist /V net share C:\Windows\system32\net1 share net config workstation C:\Windows\system32\net1 config workstation net group "Domain Admins" C:\Windows\system32\net1 group "Domain Admins" route print net localgroup C:\Windows\system32\net1 localgroup ipconfig /all tasklist /V net config workstation C:\Windows\system32\net1 config workstation nslookup -type=any %%userdnsdomain%% net config workstation C:\Windows\system32\net1 config workstation nslookup -type=any %%userdnsdomain%%

C:\\Windows\\system32\\whoami.exe" /user

C:\\Windows\\system32\\whoami.exe" /groups

"C:\\Windows\\system32\\net.exe" group "domain admins" /domain

netstat • net view • net use • net session

nltest /domain_trusts /all_trusts

whoami /upn

Adfind http://www.joeware.net/freetools/tools/adfind/

netsh firewall set opmode disable net stop security center net stop WinDefend

\"C:\\Windows\\System32\\cmd.exe\" /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete &; bcdedit /set {default} bootstatuspolicy ignoreallfailures &; bcdedit /set {default} recoveryenabled no &; wbadmin delete catalog -quiet vssadmin delete shadows /all /quiet wmic shadowcopy delete bcdedit /set {default} bootstatuspolicy ignoreallfailures bcdedit /set {default} recoveryenabled no wbadmin delete catalog -quiet

adfind -f objectcategory=computer -csv name cn OperatingSystem dNSHostName > some.csv"

adfind -gcb -sc trustdmp > trustdmp.txt

  • Unauthorized RDP connections

  • Failed RDP attempts

  • Persistent connections

  • Longest connections

  • Beacon connections detection, may connection repeatatively

  • What is the operational and business needs for the connections

  • Protocol usage

  • Abnormal protocol usage

  • IP reputation check

  • C2 beacon detection

  • C2 long connections , 5 hours

  • C2 behind the CDN

  • Zeek+ja3

  • Self signed cerificates

  • Teamviewer connection

  • Certificate analysis

  • Detection of tunneling

  • Rare useragents

  • Destination IP lookup

    • IP reputation

    • ASN

    • Whois

  • Abuseipdb

  • Alienvault

  • Censys.io

  • Dns.google/query?name

  • Onyphe.io

  • Security trails

  • Shodan

  • virustotal

  • Executions of cobaltstrike payload

  • Data exfiltration

    • 7zip

    • Mega

  • Using PsExec

  • Most common protocol usage

  • suspicious IP/Domains lookup with Alexa/Cisco million domains list (need to use automation script)

  • Investigate suspicious domain certificates to find similar malicious or impersonating domains

  • Disabling the endpoint security events, script execution activity (ex: PS, JS, DLL followed by download activity)

  • .rdp files in environment

  • .hta files in environment

  • .iso files in environment

  • .ink files in environment

  • Passwords.txt in environment

  • Network Recon Activity

    • Using windows utilities

  • Password Dumping activity tools

    • Mimikatz

    • Lass.exe dumping

  • Additional tools

    • Lazangne

    • RDPV

    • NirSoft Tools

  • Network port scan activity

  • windows utilities such as WMI, wmic, taskkill, WEVTUTIL, sc, net.exe to kill processes and remove logs from the system

  • Utilman.exe to manipulate/disable cmd.exe

  • writing a rule to detect findstr.exe

  • Hunting for password protected zip files ( need to check possibilities)

  • WScript to downloading files

  • DLL dropping in %appdata% with different file format

  • Regsrv32 loads DLL

  • Ping beaconing/ICMP

  • VNC protocol usage

  • RDP protocol usage connections to and from public IP range

  • FTP protocol usage

  • Detecting Cobalt Strike activity

  • Powershell download (invoke-webrequest)

  • Persistence using schedule task

  • wermgr.exe process injection

  • Svchost.exe process injection

  • ARP for enumeration

  • Word document with macro

Kenny addition(Feel Free to Delete):

  • Check LastPass Use

  • Check robots.txt

  • Check Cookies storage

VPN's

  • Compromising VPN services

  • Brute forcing VPN services

  • User Sign In activity Bruteforce/impersonation attacks

  • Zero-Day and vulnerability attacks on VPN services

Threat Hunting for Log4J exploitation:

  • https://www.microsoft.com/security/blog/2021/12/11/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j-2-exploitation/

  • https://awakesecurity.com/blog/threat-hunting-for-log4j-exploits-on-the-network/

  • https://unit42.paloaltonetworks.com/apache-log4j-vulnerability-cve-2021-44228/

  • https://www.paloaltonetworks.com/blog/security-operations/hunting-for-log4j-cve-2021-44228-log4shell-exploit-activity/

Tools:

Arctic Wolf Tool

  • https://github.com/rtkwlf/wolf-tools/blob/main/log4shell/README.md

  • https://www.msspalert.com/cybersecurity-news/log4j-vulnerability-scanners-and-detection-tools-list-for-mssps-and-threat-hunters/

ToDo :

PaloAlto Useragent search

  • https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/objects/objects-security-profiles-url-filtering/url-filtering-settings.html

Verify the attack simulation :

Packet capture capabilities from Paloalto firewall

  • https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTJCA0

Initial Access :

  • SocGholish (delivered via injected JavaScript on compromised websites.)

Execution :

  • Upon downloading malicious windows executable file executed by following -k and -pass

  • Use of PsExec to push out ransomware

  • Wipes the recycle bin folder of every drive

  • Deleting shadow copies (local backups) by first listing them using WMI query SELECT * FROM Win32_ShadowCop

  • Encrypts network shares and Exchange Mailbox if set in its configuration flag

  • Uses pointed files when encrypting .lnk files

Persistence :

  • LockBit 3.0 is capable of injecting a DLL into memory via reflective loading

  • drops an .ico file in the %PROGRAMDATA% folder

  • Disabling of Windows Defender and additional security controls (third party antivirus/endpoint solutions)

  • Establishing persistence to run Cobalt Strike beacon.

Information Gathering :

  • specific PowerShell scripts containing two layers of obfuscated code

  • Use of information gathering tools such as Bloodhound and Seatbelt.

Privilege escalation :

  • UAC (user account control) bypass

Lateral Movement :

  • Lateral movement leveraging RDP and Cobalt Strike.

  • lateral movement through a group policy update, as long as there is a -gspd parameter provided

Exfiltration:

  • Use of 7zip to collect data for exfiltration.

  • Exfiltration of data to Mega[.]nz

Clearing Tracks :

  • drops and executes a .tmp file decrypted from the binary, instead of using cmd.exe

Remediation :

Best practices for mitigating the risk of a ransomware attack include[1]:

  • Following the 3-2-1 rule, which involves backing up files in three copies in two different formats, with one copy stored off-site. This is a precautionary measure to avoid data loss in case of a ransomware attack.

  • Remaining vigilant against socially engineered emails to reduce the risk of a ransomware infection, as ransomware is commonly spread through malicious spam email attachments.

  • Keeping applications and programs up to date. Regular patching ensures that software vulnerabilities that ransomware actors could exploit as entry points can be addressed in a timely fashion.

  • Organizations can benefit from a multilayered approach that can help guard possible entry points into a system (endpoint, email, web, and network).

Comments :

  1. There are similarities between black matter ransomware and lockbit3.0

References for TTP’s :

  1. https://www.virustotal.com/gui/file/c597c75c6b6b283e3b5c8caeee095d60902e7396536444b59513677a94667ff8/detection

  2. https://app.any.run/tasks/837578ac-093b-4df2-85fc-aa08738d3dce/

Security Vendors Analysis Report:

  1. https://www.trendmicro.com/en_us/research/22/g/lockbit-ransomware-group-augments-its-latest-variant--lockbit-3-.html

  2. https://www.nozominetworks.com/blog/blackmatter-ransomware-technical-analysis-and-tools-from-nozomi-networks-labs/

  3. https://research.nccgroup.com/2022/08/19/back-in-black-unlocking-a-lockbit-3-0-ransomware-attack/

  4. https://blogs.vmware.com/security/2022/10/lockbit-3-0-also-known-as-lockbit-black.html

References:

https://alparslanakyildiz.medium.com/malicious-file-document-analysis-285654e5a59e

https://medium.com/walmartglobaltech/reverse-engineering-an-obfuscated-malicious-macro-3fd4d4f9c439

https://www.picussecurity.com/resource/blog/emotet-technical-analysis-part-1-reveal-the-evil-code

https://tech-zealots.com/threat-lab/deobfuscating-emotet-vba-macro-like-a-pro/

Malware Families

  • Beacon

  • SystemBC

  • Metasploit

  • HiveLocker

  • Qakbot

  • ALPHV

  • LOCKBIT

  • BASTA

Phishing

  • Qbot

  • Emotet

  • Iced ID

  • Bumblebee

  • Phosphorus

  • ursnif

Drive by Download

  • Gootloader

  • Zloader

Other Attack Scenarios:

  • SEO Poisoning

Bruteforce

  • RDP

  • SQL server

Ransomware :

  • BlackByte ransomware

  • Royal Road Weaponize

  • LockBit 3.0 ransomware group

  • BianLian ransomware

  • Medusa

  • Conti

  • Sodinokibi

Recon Tool

  • Dragon Juice

  • TankTrap powershell utility

Info stealer:

  • Form Book

Darkweb:

  • Breach forums

Vulnerabilities

  • Exchange : Proxy shell

  • Manage engine support center plus

  • CVE-2020-1472 (Zerologon) and CVE-2021-44077 (referring to ManageEngine SupportCenter Plus)

Suspicious execution:

  • PowerShell execution

  • WMI

  • Windows commands

  • Service execution

  • Scheduled Task

  • Malicious link from documents

  • COM execution

Remote Access

  • AnyDesk

  • Tactical RMM

  • Atera

Using run keys for persistence

App data folder with DLL files

Run Key to execute a PowerShell script via a LNK file

Scheduled Tasks to execute their payloads

IIS webshell

Process injection scenario

DLL Injection

Valid accounts misuse

IOC's

https://otx.alienvault.com/

https://virustotal.com

Abush.ch

IP assigned to ORG

https://bgp.he.net/

IP Lookup

https://ipinfo.io/

https://whatismyipaddress.com/

https://www.showmyip.com/

Publicly exposed assets

https://dnsdumpster.com/

https://crt.sh

https://censys.io

Url Scan

https://Urlscan.io

https://www.spamhaus.org/

Sandbox

Forensicdots.de/dotspotter

Malapi.io

Urlscan.io

Publicwww.com

Osinttechniques.com

Malpedia

Objective-see.org

Hijacklibs.net

Lolbas-project.github.io

Gtfobins.github.io

Lots-project.com

Mxtoolbox super tool

Malshare.com

Abuse.ch

Virustotal.com

OSINTCurio.us

CCSS Forum (https://www.ccssforum.org/), and URLHaus (https://urlhaus.abuse.ch/)

https://www.virusbulletin.com/

Windows servers

  • Linux servers

  • Developers

  • Testing team

  • Database team

  • HR ateam

  • Procurement team

  • Legacy systesm

  • PCI environment

  • Extranet

  • Network team

  • Production

  • Dev

  • Tst

  • PCN/SCADA/IOT/OT

  • High value/business critical

  • Process injection attempts

  • DLL sideloading

  • File deletes

  • Hunting Powershell Obfuscation with Linear Regression

  • Network

    • Site to site vpns

    • Long connections

    • Vpn acitivity

    • Beaconing activity

  • Jpcertcc.github.io

  • Dnsespinoge

  • DNSSEC

  • Security trails dns change

  • Domain fronting

  • National cyber security centere TLS interception

  • RITA TLS interception

  • Recursive dns name servers

  • Authorative dns name server

  • Powershell Kansa

    registries

  • Ip's

  • Dns

  • Domain

  • Email sender

  • Wmi commands

  • Powershell

  • Users

  • Groups

  • Ports

  • Services

  • Clearing logs

  • Process from ZIP file

  • Link file execution

  • Iso file execution

  • Modification of autorun key

  • Modification of registry key

  • Autoruns directory

    • Parent location of autoruns

    • Enabled autoruns

    • Disabled autoruns

    • Autoruns by catetory

    • Unknown signer autoruns

    • Autoruns from

      • Exe

      • Dll

      • Vbs

  • Execution from temp directory

  • File name /process name with random letter

  • Webshells

    • W3wp.exe

    • Php-cgi.exe

    • China chopper

  • Shimcache hunting

  • Top executions by endpoint

  • Lowest execution by endpoint

  • Single character binaries

  • Execution form temp

  • Suspicious binaries

  • Total unique applications

  • Hunting with yara

    • Loki ioc scanner

  • Threathunter playbook

    • Cyberdog

    • OTRF

  • Geo location

  • Ptr records

  • https://www.crowdstrike.com/blog/how-to-baseline-and-hunt-log4shell-with-the-crowdstrike-falcon-platform/
    https://blogs.opentext.com/log4j-vulnerability-explained-and-how-to-respond/
    https://wazuh.com/blog/detecting-lockbit-3-0-ransomware-with-wazuh/
    https://www.sentinelone.com/labs/lockbit-3-0-update-unpicking-the-ransomwares-latest-anti-analysis-and-evasion-techniques/
    Ps1
  • Sys

  • Drv

  • Ax

  • cpl

  • Browserling – Online cross-browser testing
    Logo