- 270
- 165 462
InfoSec_Bret
United States
เข้าร่วมเมื่อ 3 ม.ค. 2014
InfoSec Professional that enjoys exercises from the Lets Defend and Cyber Defenders platforms, when not busy with work and family, of course!
SA -SOC282-257 - Deceptive Mail Detected
Continuing with the Security Analyst Path, we tackle an alert for an "Deceptive Mail Detected". Was this simply a false positive or possibly something more phishy?
⭐ This alert is prepared for the ‘How to Investigate a SIEM Alert’ course. If you haven’t taken the course yet, please complete it first.
EventID: 257
Event Time: May, 13, 2024, 09:22 AM
Rule: SOC282 - Phishing Alert - Deceptive Mail Detected
Level: Security Analyst
SMTP Address: 103.80.134.63
Source Address: free@coffeeshooop.com
Destination Address: Felix@letsdefend.io
E-mail Subject: Free Coffee Voucher
Device Action: Allowed
Items in question:
www.virustotal.com/gui/file/6f33ae4bf134c49faa14517a275c039ca1818b24fc2304649869e399ab2fb389/detection
www.virustotal.com/gui/file/cd903ad2211cf7d166646d75e57fb866000f4a3b870b5ec759929be2fd81d334/detection
www.virustotal.com/gui/ip-address/103.80.134.63
www.virustotal.com/gui/ip-address/37.120.233.226/detection
NOTES:
Sender IP is a known to LD Threat Intel for PHISHING
⭐ This alert is prepared for the ‘How to Investigate a SIEM Alert’ course. If you haven’t taken the course yet, please complete it first.
EventID: 257
Event Time: May, 13, 2024, 09:22 AM
Rule: SOC282 - Phishing Alert - Deceptive Mail Detected
Level: Security Analyst
SMTP Address: 103.80.134.63
Source Address: free@coffeeshooop.com
Destination Address: Felix@letsdefend.io
E-mail Subject: Free Coffee Voucher
Device Action: Allowed
Items in question:
www.virustotal.com/gui/file/6f33ae4bf134c49faa14517a275c039ca1818b24fc2304649869e399ab2fb389/detection
www.virustotal.com/gui/file/cd903ad2211cf7d166646d75e57fb866000f4a3b870b5ec759929be2fd81d334/detection
www.virustotal.com/gui/ip-address/103.80.134.63
www.virustotal.com/gui/ip-address/37.120.233.226/detection
NOTES:
Sender IP is a known to LD Threat Intel for PHISHING
มุมมอง: 143
วีดีโอ
Challenge - RanDev
มุมมอง 9414 วันที่ผ่านมา
Tackling another Lets Defend Challenge, that being the MEDIUM DIFFICULTY "RanDev" challenge. We are given a compressed file containing an memory capture from a Windows system on a Linux VM system to analyze and answer 8 questions. "We hired a full-stack developer but it seems he faked all his experience, he is just a lazy developer and got attacked by weird ransomware. Can you investigate what ...
Challenge - Windows Memory Dump
มุมมอง 8321 วันที่ผ่านมา
Tackling another Lets Defend Challenge, that being the MEDIUM DIFFICULTY "Windows Memory Dump" challenge. We are given a compressed file containing an memory capture from a Windows system on a Linux VM system to analyze and answer 7 questions. "Our friend fell victim to a suspicious crack tool. But it seems it didn't go in the right path so investigate it to find any evidence." NOTES: www.virus...
Challenge - Alternate Data Stream
มุมมอง 119หลายเดือนก่อน
Tackling another Lets Defend Challenge, that being the FREE HARD DIFFICULTY "Alternate Data Stream" challenge. We are given a compressed file containing an memory capture from a Windows system on a Linux VM system to analyze and answer 7 questions. "Our company's CEO assigned an employee to build a website on his GitHub account due to a lack of web developers in the company. While researching h...
Challenge - Brute Force Attacks
มุมมอง 210หลายเดือนก่อน
Tackling another Lets Defend Challenge, that being the MEDIUM DIFFICULTY " Brute Force Attacks" challenge. We are given a compressed file containing an PCAP and Auth.log of a Linux system on a Linux VM system to analyze and answer 8 questions. "Our web server has been compromised, and it's up to you to investigate the breach. Dive into the system, analyze logs, dissect network traffic, and unco...
Challenge - Kernel Exploit
มุมมอง 691หลายเดือนก่อน
Tackling another Lets Defend Challenge, that being the EASY DIFFICULTY "Kernel Exploit" challenge. We are given a compressed file containing an UAC triage image of a Linux system on a Linux VM system to analyze and answer 8 questions. "In the afternoon, network monitoring systems detected anomalous traffic patterns originating from a critical transaction processing server. Initial signs suggest...
Challenge - TeamViewer Forensics
มุมมอง 158หลายเดือนก่อน
Tackling another Lets Defend Challenge, that being the MEDIUM DIFFICULTY "TeamViewer Forensics" challenge. We are given a compressed file containing an triage image of a Windows system on a Windows VM system to analyze and answer 8 questions. "During a workday, an employee noticed strange unauthorized activity on his computer, with applications opening and the mouse moving. Quickly realizing th...
Challenge - Suspicious Python Package
มุมมอง 172หลายเดือนก่อน
Tackling another Lets Defend Challenge, that being the HARD DIFFICULTY "Suspicious Python Package" challenge. We are given a compressed file containing an triage image of a Windows system on a Windows VM system to analyze and answer 9 questions. "One of our employees attempted to install a Python package, and shortly afterward, someone logged into his work account. He doesn't know how it happen...
Challenge - Bash Script
มุมมอง 3892 หลายเดือนก่อน
Tackling another Lets Defend Challenge, that being the EASY DIFFICULTY "Bash Script" challenge. We are given a compressed file containing a bash script file on a Linux VM system to analyze and answer 8 questions. "The SOC team uncovered a suspicious bash script linked to a critical Hadoop YARN cluster that handled large-scale data processing. This script was flagged for further investigation by...
Challenge - Log Analysis With Sysmon
มุมมอง 3602 หลายเดือนก่อน
Tackling another Lets Defend Challenge, that being the EASY DIFFICULTY "Log Analysis With Sysmon" challenge. We are given a compressed file containing a EVTX and JSON log on a Windows VM system to analyze and answer 8 questions. "Our company has experienced a breach on one of its endpoints. Your task is to investigate the breach thoroughly by analyzing the Sysmon logs of the compromised endpoin...
Challenge - Malicious AutoIT
มุมมอง 2472 หลายเดือนก่อน
Tackling another Lets Defend Challenge, that being the BEGINNER DIFFICULTY "Malicious AutoIT" challenge. We are given a compressed file containing a AutoIT Script to EXE on a Windows VM system to analyze and answer 8 questions. "Our organization's Security Operations Center (SOC) has detected suspicious activity related to an AutoIt script. Can you analyze this exe and help us answer the follow...
Challenge - Compromised Chat Server
มุมมอง 3182 หลายเดือนก่อน
Tackling another Lets Defend Challenge, that being the MEDIUM DIFFICULTY "Compromised Chat Server" challenge. We are given a compressed file containing a PCAP on a Linux VM system to analyze and answer 10 questions. "In the company, one of our teams uses Openfire, an XMPP-based chat server for their communications. Recently, the L1 analyst detected suspicious activity on the server, including a...
Challenge - Compromised Network Printer
มุมมอง 1993 หลายเดือนก่อน
Tackling another Lets Defend Challenge, that being the EASY DIFFICULTY "Compromised Network Printer" challenge. We are given a compressed file containing a PCAP on a Linux VM system to analyze and answer 9 questions. "You are a DFIR Analyst for a corporation. A network printer running in the internal network has been compromised as it was alerted by our IDS. You have been provided a packet capt...
Challenge - Revenge RAT
มุมมอง 1943 หลายเดือนก่อน
Tackling another Lets Defend Challenge, that being the MEDIUM DIFFICULTY "Revenge RAT" challenge. We are given a password protected compressed file containing a PCAP on a Linux VM system to analyze and answer 9 questions. "During a cybersecurity investigation, analysts have noticed unusual traffic patterns that may indicate a problem. We need your help finding out what's happening, so give us a...
Challenge - Malicious Web Traffic Analysis
มุมมอง 1363 หลายเดือนก่อน
Tackling another Lets Defend Challenge, that being the MEDIUM DIFFICULTY "Malicious Web Traffic Analysis" challenge. We are given a password protected compressed file containing a PCAP on a Linux VM system to analyze and answer 9 questions. "During a cybersecurity investigation, analysts have noticed unusual traffic patterns that may indicate a problem. We need your help finding out what's happ...
Summer thunderstorm in the western suburbs of Chicago (08/27/2024)
มุมมอง 1633 หลายเดือนก่อน
Summer thunderstorm in the western suburbs of Chicago (08/27/2024)
Challenge - Confluence CVE-2023-22527 - Part 2
มุมมอง 1274 หลายเดือนก่อน
Challenge - Confluence CVE-2023-22527 - Part 2
Challenge - Confluence CVE-2023-22527 - Part 1
มุมมอง 1605 หลายเดือนก่อน
Challenge - Confluence CVE-2023-22527 - Part 1
LetsDefend Platform - How To - Upload/Download to/from sandbox VM
มุมมอง 7045 หลายเดือนก่อน
LetsDefend Platform - How To - Upload/Download to/from sandbox VM
LetsDefend Platform - How To - Upload/Download to/from sandbox VM 2
มุมมอง 3535 หลายเดือนก่อน
LetsDefend Platform - How To - Upload/Download to/from sandbox VM 2
Challenge - Malicious WordPress Plugin
มุมมอง 2056 หลายเดือนก่อน
Challenge - Malicious WordPress Plugin
bro, may you record from scratch when you do challenge , i mean when we open video there already are question which had been answered by you , we dont understand how you did find them
hey thanks for this tutorial. i am a bit confused though... as it stands letsdefend offeres their sandbox VM enviorment on the webpage of the malicious doc. Im confusd as to; #1 how to get the hash te be able t analyze the file in virus total? #2 and how do i get the hash from the VM on the page to copy that into my own device? could you please help me out with this
Im confused. What exactly were you looking for in sysmon logs. I was expecting you to check powershell logs
So even though there was a successful response status saying 200 at 11:30 AM it’s still not considered as a successful SQL injection overall?
man good job but the video is too long
Nice one.
4:02 how did you extract the xls file?
Why does this dude sound like he's doing ASMR when he talks?
As a joke, join my OF for geeky ASMR, again, as a joke, lol. But how do I sound like I'm doing ASMR? I am trying to not be overly loud or too soft...
I can't hear anything make your audio full volume...dislike 👎
67c6784a5296658ac4d633f4e8c0914ecc783b1cf2f6431818c4e2f3cdcce91f T1543 T119E3163DB459E165C8CF04B57E2516BAD671F83C037989F3EBD38C299420EE86626B07
XO1XADpO01
Hi Bret....Has anyone accessed the URL? Shouldnt it be yes?
thanks for the video yeah the first question was just wasting time ...
Man...I still cant understand why the alert is a false positive...Have they responded to you on this?
Have u done already all the SOC analyst path?
No, I am only 20% of the way through that path
i really enjoy your videos.. you are doing an amazing work..... please can you take us through how you read logs at the endpoint security? that is processes, network action,,terminal history and browser history. thank you
This funny witht he Arthur guy😂
Even I got it incorrect. Not sure why was the malware analysis indicating that it is malicious.
Hi, would you happen to have a video on dynamic analysis example using anyrun letsdefend. Where it ask for the email the malware used to connect to the server and the password
I suppose I could, but I do know that question has been answered in the LetsDefend Discord... I think I even made a GIF for that particular one.
Your a super life saver. I work on these while watching you
I appreciate your contribution to infosec, i will give you some friendly advice that please increase your audio volume in your videos and you can make it bit shorter it would also boost your views you know that infosec peps love watching precise stuffs. Thanks for your knowledge sharing!
Tried responding to this alert today. Went to the endpoint and could not find logs from July 2021. The oldest logs were from September.
Do you think it encrypted some data?
I’ve been studying IT and Cybersecurity all day for the past couple of days. It’s nice to relax and take in such a beautiful natural phenomenon
Hi, i was doing this alert and the part i got wrong was that i thought user did not access this file. Since log shown are all empty and just curious does it mean that the attacker remove all traces in the log that's why it is empty ??? Thank you
As an analyst, you might not always have your normal set of logs, agents are not flawless and internet connections are not always stable. So you will find you have to work with what you have!
Hi Bert, I made this official challenge write-up. I would like to hear your thoughts on my write-up and if you have any tips for improvement. I was inspired by you, and LetsDefend published two of my write-ups (GoLang challenge too). Keep up the good work, I love your channel.
A very good write-up! You found the IP and the payload name in IDA first, rather then mine VT, awesome job @DanielArm94
thanks, you help me with the first question
you didn't show hot to fire up the Remote Desktop client which Is what im stuck on haha. thanks for the video non the less!
RDP for Windows?
no cursor is so annoying :/
This is mostly corrected in current videos... I think...
Could you plz share the pdf file? Thanks in advance
how did you manage to exact the doc from the letsdefend virtual lab. l am having a hard time with it. If possible kindly include the exact from the vm into your videos next time
I did a two part series as a how to for pulling FROM Windows/Linux to Windows/Linux. th-cam.com/video/vHlulHqHzyY/w-d-xo.html th-cam.com/video/XSU9QjHxcM8/w-d-xo.html
please how did you download the log file from the letsdefend virtual platform to your pc. l am having difficulty with that
i am also difficult with that plz
I did a two part series as a how to for pulling FROM Windows/Linux to Windows/Linux. th-cam.com/video/vHlulHqHzyY/w-d-xo.html th-cam.com/video/XSU9QjHxcM8/w-d-xo.html
@@BretWitt Thanks
Thanks for the walkthrough, but I have a question for you. During my investigation I noticed that there was an email sent to RichardPRD on the same day as the JuicyPotato.exe alert. The email contained a malicious .xlsx file that was opened and there are various IOCs on his endpoint that show this, including contact with a C2. One of the questions asks if someone had requested the C2 and I put "yes", which was the wrong answer. I guess my question is, was I mistaken thinking that the JuicyPotato.exe and the .xlsx file from the email were somehow linked? In a real life scenario, would you only focus on the JuicyPotato alert even though you came across something else while searching, such as an email attachment?
I would pay money to see what that webpage looked like before it got the 404.
Doing the lords work mate. Thank you.
Hi Bret nice video, I love your channel you are awesome! I have a question regarding the challenge, how did you download the file? I didn't find the option to download this sample and the Let's Defend machine is not equipped with the tools I need like IDA or ghidra so I wanted to get the sample to my flare VM. how can I get this sample? I don't have VT pro account or Joe sandbox account for downloading the file. Thanks and keep it up love your channel 😁
NVM I found my answer through RDP copy-paste. stay awsome :)
Thanks, as for downloading the files, RDP has copy an paste for Windows and for Linux, I move/copy the files to the analyst folder and then connect the VM via WinSCP (as my system is WINDOWS). You have to hit the yellow button above the VM once it starts to get the VMs IP, username, and password.
hello laughing man
This is not bad at all, however, hopefully you can make a slightly more advanced version to this that talks more about the response. For example extract out logs, and review them. Even if with a test tenant/instance.
if possible please do with frida stalker for themida protected malware
Frida stalker?
its easy to do with virus total, but reverse engineering with Python its a lot. I only have Sec+ and Google CC, Letsdefend SOC is my 1st course. Malware analysis as hard as i thought, log analysis is easier.
how do you output multiple the content of speicifc files with strings in linux as demonstrated @14:32
how do u determine what profile to use in volatility this is something i dont quite understand yet.
In VOL 3, it's auto magically done, as for VOL 2, you use imageinfo and kdbgscan to find what fits best. book.hacktricks.xyz/generic-methodologies-and-resources/basic-forensic-methodology/memory-dump-analysis/volatility-cheatsheet Look at the OS Profiles section
Nice job. Thanks for the interesting video.
This is great.🔥🔥
Jesus this lab is extremely intense ahaha not able to complete it
after follow udp stream, where did you go to find p13 frame message?
Thank you for these Videos, Bret. They really help to learn safely with hands-on experience that transfers well to on-the-job experience!
this is beginner? I'm screwed
Beginner challenge... don't count yourself out!
Hey Bret! This is the other Bret(CyberGladius). lol. I enjoyed watching someone work through my challenge. Thank you for the video! The event logs are from an actual breach I worked on. Fun fact: the hard part was altering the event logs to remove sensitive information and re-signing the headers.
It was very helpful. thank you.
InfoSec_Bret, I loved this video so much, I had to hit the like button!