InfoSec_Bret
InfoSec_Bret
  • 270
  • 165 462
SA -SOC282-257 - Deceptive Mail Detected
Continuing with the Security Analyst Path, we tackle an alert for an "Deceptive Mail Detected". Was this simply a false positive or possibly something more phishy?
⭐ This alert is prepared for the ‘How to Investigate a SIEM Alert’ course. If you haven’t taken the course yet, please complete it first.
EventID: 257
Event Time: May, 13, 2024, 09:22 AM
Rule: SOC282 - Phishing Alert - Deceptive Mail Detected
Level: Security Analyst
SMTP Address: 103.80.134.63
Source Address: free@coffeeshooop.com
Destination Address: Felix@letsdefend.io
E-mail Subject: Free Coffee Voucher
Device Action: Allowed
Items in question:
www.virustotal.com/gui/file/6f33ae4bf134c49faa14517a275c039ca1818b24fc2304649869e399ab2fb389/detection
www.virustotal.com/gui/file/cd903ad2211cf7d166646d75e57fb866000f4a3b870b5ec759929be2fd81d334/detection
www.virustotal.com/gui/ip-address/103.80.134.63
www.virustotal.com/gui/ip-address/37.120.233.226/detection
NOTES:
Sender IP is a known to LD Threat Intel for PHISHING
มุมมอง: 143

วีดีโอ

Challenge - RanDev
มุมมอง 9414 วันที่ผ่านมา
Tackling another Lets Defend Challenge, that being the MEDIUM DIFFICULTY "RanDev" challenge. We are given a compressed file containing an memory capture from a Windows system on a Linux VM system to analyze and answer 8 questions. "We hired a full-stack developer but it seems he faked all his experience, he is just a lazy developer and got attacked by weird ransomware. Can you investigate what ...
Challenge - Windows Memory Dump
มุมมอง 8321 วันที่ผ่านมา
Tackling another Lets Defend Challenge, that being the MEDIUM DIFFICULTY "Windows Memory Dump" challenge. We are given a compressed file containing an memory capture from a Windows system on a Linux VM system to analyze and answer 7 questions. "Our friend fell victim to a suspicious crack tool. But it seems it didn't go in the right path so investigate it to find any evidence." NOTES: www.virus...
Challenge - Alternate Data Stream
มุมมอง 119หลายเดือนก่อน
Tackling another Lets Defend Challenge, that being the FREE HARD DIFFICULTY "Alternate Data Stream" challenge. We are given a compressed file containing an memory capture from a Windows system on a Linux VM system to analyze and answer 7 questions. "Our company's CEO assigned an employee to build a website on his GitHub account due to a lack of web developers in the company. While researching h...
Challenge - Brute Force Attacks
มุมมอง 210หลายเดือนก่อน
Tackling another Lets Defend Challenge, that being the MEDIUM DIFFICULTY " Brute Force Attacks" challenge. We are given a compressed file containing an PCAP and Auth.log of a Linux system on a Linux VM system to analyze and answer 8 questions. "Our web server has been compromised, and it's up to you to investigate the breach. Dive into the system, analyze logs, dissect network traffic, and unco...
Challenge - Kernel Exploit
มุมมอง 691หลายเดือนก่อน
Tackling another Lets Defend Challenge, that being the EASY DIFFICULTY "Kernel Exploit" challenge. We are given a compressed file containing an UAC triage image of a Linux system on a Linux VM system to analyze and answer 8 questions. "In the afternoon, network monitoring systems detected anomalous traffic patterns originating from a critical transaction processing server. Initial signs suggest...
Challenge - TeamViewer Forensics
มุมมอง 158หลายเดือนก่อน
Tackling another Lets Defend Challenge, that being the MEDIUM DIFFICULTY "TeamViewer Forensics" challenge. We are given a compressed file containing an triage image of a Windows system on a Windows VM system to analyze and answer 8 questions. "During a workday, an employee noticed strange unauthorized activity on his computer, with applications opening and the mouse moving. Quickly realizing th...
Challenge - Suspicious Python Package
มุมมอง 172หลายเดือนก่อน
Tackling another Lets Defend Challenge, that being the HARD DIFFICULTY "Suspicious Python Package" challenge. We are given a compressed file containing an triage image of a Windows system on a Windows VM system to analyze and answer 9 questions. "One of our employees attempted to install a Python package, and shortly afterward, someone logged into his work account. He doesn't know how it happen...
Challenge - Bash Script
มุมมอง 3892 หลายเดือนก่อน
Tackling another Lets Defend Challenge, that being the EASY DIFFICULTY "Bash Script" challenge. We are given a compressed file containing a bash script file on a Linux VM system to analyze and answer 8 questions. "The SOC team uncovered a suspicious bash script linked to a critical Hadoop YARN cluster that handled large-scale data processing. This script was flagged for further investigation by...
Challenge - Log Analysis With Sysmon
มุมมอง 3602 หลายเดือนก่อน
Tackling another Lets Defend Challenge, that being the EASY DIFFICULTY "Log Analysis With Sysmon" challenge. We are given a compressed file containing a EVTX and JSON log on a Windows VM system to analyze and answer 8 questions. "Our company has experienced a breach on one of its endpoints. Your task is to investigate the breach thoroughly by analyzing the Sysmon logs of the compromised endpoin...
Challenge - Malicious AutoIT
มุมมอง 2472 หลายเดือนก่อน
Tackling another Lets Defend Challenge, that being the BEGINNER DIFFICULTY "Malicious AutoIT" challenge. We are given a compressed file containing a AutoIT Script to EXE on a Windows VM system to analyze and answer 8 questions. "Our organization's Security Operations Center (SOC) has detected suspicious activity related to an AutoIt script. Can you analyze this exe and help us answer the follow...
Challenge - Compromised Chat Server
มุมมอง 3182 หลายเดือนก่อน
Tackling another Lets Defend Challenge, that being the MEDIUM DIFFICULTY "Compromised Chat Server" challenge. We are given a compressed file containing a PCAP on a Linux VM system to analyze and answer 10 questions. "In the company, one of our teams uses Openfire, an XMPP-based chat server for their communications. Recently, the L1 analyst detected suspicious activity on the server, including a...
Challenge - Compromised Network Printer
มุมมอง 1993 หลายเดือนก่อน
Tackling another Lets Defend Challenge, that being the EASY DIFFICULTY "Compromised Network Printer" challenge. We are given a compressed file containing a PCAP on a Linux VM system to analyze and answer 9 questions. "You are a DFIR Analyst for a corporation. A network printer running in the internal network has been compromised as it was alerted by our IDS. You have been provided a packet capt...
Challenge - Revenge RAT
มุมมอง 1943 หลายเดือนก่อน
Tackling another Lets Defend Challenge, that being the MEDIUM DIFFICULTY "Revenge RAT" challenge. We are given a password protected compressed file containing a PCAP on a Linux VM system to analyze and answer 9 questions. "During a cybersecurity investigation, analysts have noticed unusual traffic patterns that may indicate a problem. We need your help finding out what's happening, so give us a...
Challenge - Malicious Web Traffic Analysis
มุมมอง 1363 หลายเดือนก่อน
Tackling another Lets Defend Challenge, that being the MEDIUM DIFFICULTY "Malicious Web Traffic Analysis" challenge. We are given a password protected compressed file containing a PCAP on a Linux VM system to analyze and answer 9 questions. "During a cybersecurity investigation, analysts have noticed unusual traffic patterns that may indicate a problem. We need your help finding out what's happ...
Summer thunderstorm in the western suburbs of Chicago (08/27/2024)
มุมมอง 1633 หลายเดือนก่อน
Summer thunderstorm in the western suburbs of Chicago (08/27/2024)
Challenge - Downloader
มุมมอง 1013 หลายเดือนก่อน
Challenge - Downloader
Challenge - Batch Downloader
มุมมอง 3114 หลายเดือนก่อน
Challenge - Batch Downloader
Challenge - Linux Disk Forensics
มุมมอง 2824 หลายเดือนก่อน
Challenge - Linux Disk Forensics
Challenge - Confluence CVE-2023-22527 - Part 2
มุมมอง 1274 หลายเดือนก่อน
Challenge - Confluence CVE-2023-22527 - Part 2
Challenge - Confluence CVE-2023-22527 - Part 1
มุมมอง 1605 หลายเดือนก่อน
Challenge - Confluence CVE-2023-22527 - Part 1
Challenge - PHP-CGI (CVE-2024-4577)
มุมมอง 1.8K5 หลายเดือนก่อน
Challenge - PHP-CGI (CVE-2024-4577)
Challenge - Compromised ICS Device
มุมมอง 1705 หลายเดือนก่อน
Challenge - Compromised ICS Device
LetsDefend Platform - How To - Upload/Download to/from sandbox VM
มุมมอง 7045 หลายเดือนก่อน
LetsDefend Platform - How To - Upload/Download to/from sandbox VM
LetsDefend Platform - How To - Upload/Download to/from sandbox VM 2
มุมมอง 3535 หลายเดือนก่อน
LetsDefend Platform - How To - Upload/Download to/from sandbox VM 2
Challenge - YARA Rule
มุมมอง 2296 หลายเดือนก่อน
Challenge - YARA Rule
Challenge - Malicious WordPress Plugin
มุมมอง 2056 หลายเดือนก่อน
Challenge - Malicious WordPress Plugin
Challenge - Discord Forensics
มุมมอง 1696 หลายเดือนก่อน
Challenge - Discord Forensics
Challenge - AstasiaLoader
มุมมอง 2556 หลายเดือนก่อน
Challenge - AstasiaLoader
Challenge - Royal Ransom
มุมมอง 1537 หลายเดือนก่อน
Challenge - Royal Ransom

ความคิดเห็น

  • @eldar_edu
    @eldar_edu 18 ชั่วโมงที่ผ่านมา

    bro, may you record from scratch when you do challenge , i mean when we open video there already are question which had been answered by you , we dont understand how you did find them

  • @awaisec.1038
    @awaisec.1038 3 วันที่ผ่านมา

    hey thanks for this tutorial. i am a bit confused though... as it stands letsdefend offeres their sandbox VM enviorment on the webpage of the malicious doc. Im confusd as to; #1 how to get the hash te be able t analyze the file in virus total? #2 and how do i get the hash from the VM on the page to copy that into my own device? could you please help me out with this

  • @marvelousekpenyong4343
    @marvelousekpenyong4343 7 วันที่ผ่านมา

    Im confused. What exactly were you looking for in sysmon logs. I was expecting you to check powershell logs

  • @samueltimothee4313
    @samueltimothee4313 12 วันที่ผ่านมา

    So even though there was a successful response status saying 200 at 11:30 AM it’s still not considered as a successful SQL injection overall?

  • @ahmedkaram8855
    @ahmedkaram8855 13 วันที่ผ่านมา

    man good job but the video is too long

  • @johnhack67
    @johnhack67 21 วันที่ผ่านมา

    Nice one.

  • @samueltimothee3708
    @samueltimothee3708 22 วันที่ผ่านมา

    4:02 how did you extract the xls file?

  • @jxlazd
    @jxlazd หลายเดือนก่อน

    Why does this dude sound like he's doing ASMR when he talks?

    • @BretWitt
      @BretWitt หลายเดือนก่อน

      As a joke, join my OF for geeky ASMR, again, as a joke, lol. But how do I sound like I'm doing ASMR? I am trying to not be overly loud or too soft...

  • @aniketsaha7273
    @aniketsaha7273 หลายเดือนก่อน

    I can't hear anything make your audio full volume...dislike 👎

  • @nerydiaz6285
    @nerydiaz6285 หลายเดือนก่อน

    67c6784a5296658ac4d633f4e8c0914ecc783b1cf2f6431818c4e2f3cdcce91f T1543 T119E3163DB459E165C8CF04B57E2516BAD671F83C037989F3EBD38C299420EE86626B07

    • @nerydiaz6285
      @nerydiaz6285 หลายเดือนก่อน

      XO1XADpO01

  • @ian230187
    @ian230187 หลายเดือนก่อน

    Hi Bret....Has anyone accessed the URL? Shouldnt it be yes?

  • @ZeeWolfed
    @ZeeWolfed หลายเดือนก่อน

    thanks for the video yeah the first question was just wasting time ...

  • @ian230187
    @ian230187 2 หลายเดือนก่อน

    Man...I still cant understand why the alert is a false positive...Have they responded to you on this?

  • @tanjifoyo3821
    @tanjifoyo3821 2 หลายเดือนก่อน

    Have u done already all the SOC analyst path?

    • @BretWitt
      @BretWitt หลายเดือนก่อน

      No, I am only 20% of the way through that path

  • @EvansAduse-Poku
    @EvansAduse-Poku 2 หลายเดือนก่อน

    i really enjoy your videos.. you are doing an amazing work..... please can you take us through how you read logs at the endpoint security? that is processes, network action,,terminal history and browser history. thank you

  • @tanjifoyo3821
    @tanjifoyo3821 2 หลายเดือนก่อน

    This funny witht he Arthur guy😂

  • @ian230187
    @ian230187 2 หลายเดือนก่อน

    Even I got it incorrect. Not sure why was the malware analysis indicating that it is malicious.

  • @JaydenH-c9c
    @JaydenH-c9c 2 หลายเดือนก่อน

    Hi, would you happen to have a video on dynamic analysis example using anyrun letsdefend. Where it ask for the email the malware used to connect to the server and the password

    • @BretWitt
      @BretWitt 2 หลายเดือนก่อน

      I suppose I could, but I do know that question has been answered in the LetsDefend Discord... I think I even made a GIF for that particular one.

  • @MidnightCherryBoy
    @MidnightCherryBoy 3 หลายเดือนก่อน

    Your a super life saver. I work on these while watching you

  • @thet0wsif
    @thet0wsif 3 หลายเดือนก่อน

    I appreciate your contribution to infosec, i will give you some friendly advice that please increase your audio volume in your videos and you can make it bit shorter it would also boost your views you know that infosec peps love watching precise stuffs. Thanks for your knowledge sharing!

  • @Gabri-3l
    @Gabri-3l 3 หลายเดือนก่อน

    Tried responding to this alert today. Went to the endpoint and could not find logs from July 2021. The oldest logs were from September.

  • @محمدالفاتح-م4و
    @محمدالفاتح-م4و 3 หลายเดือนก่อน

    Do you think it encrypted some data?

  • @shadowwoodsman3624
    @shadowwoodsman3624 3 หลายเดือนก่อน

    I’ve been studying IT and Cybersecurity all day for the past couple of days. It’s nice to relax and take in such a beautiful natural phenomenon

  • @chaymax68
    @chaymax68 3 หลายเดือนก่อน

    Hi, i was doing this alert and the part i got wrong was that i thought user did not access this file. Since log shown are all empty and just curious does it mean that the attacker remove all traces in the log that's why it is empty ??? Thank you

    • @BretWitt
      @BretWitt 3 หลายเดือนก่อน

      As an analyst, you might not always have your normal set of logs, agents are not flawless and internet connections are not always stable. So you will find you have to work with what you have!

  • @DanielArm94
    @DanielArm94 3 หลายเดือนก่อน

    Hi Bert, I made this official challenge write-up. I would like to hear your thoughts on my write-up and if you have any tips for improvement. I was inspired by you, and LetsDefend published two of my write-ups (GoLang challenge too). Keep up the good work, I love your channel.

    • @BretWitt
      @BretWitt 3 หลายเดือนก่อน

      A very good write-up! You found the IP and the payload name in IDA first, rather then mine VT, awesome job @DanielArm94

  • @vilpario
    @vilpario 4 หลายเดือนก่อน

    thanks, you help me with the first question

  • @chapin2513
    @chapin2513 4 หลายเดือนก่อน

    you didn't show hot to fire up the Remote Desktop client which Is what im stuck on haha. thanks for the video non the less!

    • @BretWitt
      @BretWitt 3 หลายเดือนก่อน

      RDP for Windows?

  • @dzZy_1
    @dzZy_1 5 หลายเดือนก่อน

    no cursor is so annoying :/

    • @BretWitt
      @BretWitt 3 หลายเดือนก่อน

      This is mostly corrected in current videos... I think...

  • @Italya3343
    @Italya3343 5 หลายเดือนก่อน

    Could you plz share the pdf file? Thanks in advance

  • @jonahelliot3178
    @jonahelliot3178 5 หลายเดือนก่อน

    how did you manage to exact the doc from the letsdefend virtual lab. l am having a hard time with it. If possible kindly include the exact from the vm into your videos next time

    • @BretWitt
      @BretWitt 5 หลายเดือนก่อน

      I did a two part series as a how to for pulling FROM Windows/Linux to Windows/Linux. th-cam.com/video/vHlulHqHzyY/w-d-xo.html th-cam.com/video/XSU9QjHxcM8/w-d-xo.html

  • @jonahelliot3178
    @jonahelliot3178 6 หลายเดือนก่อน

    please how did you download the log file from the letsdefend virtual platform to your pc. l am having difficulty with that

    • @kamphonaongnadcharoen-ms1dz
      @kamphonaongnadcharoen-ms1dz 6 หลายเดือนก่อน

      i am also difficult with that plz

    • @BretWitt
      @BretWitt 5 หลายเดือนก่อน

      I did a two part series as a how to for pulling FROM Windows/Linux to Windows/Linux. th-cam.com/video/vHlulHqHzyY/w-d-xo.html th-cam.com/video/XSU9QjHxcM8/w-d-xo.html

    • @jonahelliot3178
      @jonahelliot3178 5 หลายเดือนก่อน

      @@BretWitt Thanks

  • @ampedLG
    @ampedLG 6 หลายเดือนก่อน

    Thanks for the walkthrough, but I have a question for you. During my investigation I noticed that there was an email sent to RichardPRD on the same day as the JuicyPotato.exe alert. The email contained a malicious .xlsx file that was opened and there are various IOCs on his endpoint that show this, including contact with a C2. One of the questions asks if someone had requested the C2 and I put "yes", which was the wrong answer. I guess my question is, was I mistaken thinking that the JuicyPotato.exe and the .xlsx file from the email were somehow linked? In a real life scenario, would you only focus on the JuicyPotato alert even though you came across something else while searching, such as an email attachment?

  • @takomaki
    @takomaki 6 หลายเดือนก่อน

    I would pay money to see what that webpage looked like before it got the 404.

  • @cobraflunkie
    @cobraflunkie 6 หลายเดือนก่อน

    Doing the lords work mate. Thank you.

  • @DanielArm94
    @DanielArm94 6 หลายเดือนก่อน

    Hi Bret nice video, I love your channel you are awesome! I have a question regarding the challenge, how did you download the file? I didn't find the option to download this sample and the Let's Defend machine is not equipped with the tools I need like IDA or ghidra so I wanted to get the sample to my flare VM. how can I get this sample? I don't have VT pro account or Joe sandbox account for downloading the file. Thanks and keep it up love your channel 😁

    • @DanielArm94
      @DanielArm94 6 หลายเดือนก่อน

      NVM I found my answer through RDP copy-paste. stay awsome :)

    • @BretWitt
      @BretWitt 6 หลายเดือนก่อน

      Thanks, as for downloading the files, RDP has copy an paste for Windows and for Linux, I move/copy the files to the analyst folder and then connect the VM via WinSCP (as my system is WINDOWS). You have to hit the yellow button above the VM once it starts to get the VMs IP, username, and password.

  • @HEADSPACEnTIMING
    @HEADSPACEnTIMING 6 หลายเดือนก่อน

    hello laughing man

  • @noirth-security
    @noirth-security 6 หลายเดือนก่อน

    This is not bad at all, however, hopefully you can make a slightly more advanced version to this that talks more about the response. For example extract out logs, and review them. Even if with a test tenant/instance.

  • @_____666______
    @_____666______ 6 หลายเดือนก่อน

    if possible please do with frida stalker for themida protected malware

    • @BretWitt
      @BretWitt 5 หลายเดือนก่อน

      Frida stalker?

  • @bulba888
    @bulba888 7 หลายเดือนก่อน

    its easy to do with virus total, but reverse engineering with Python its a lot. I only have Sec+ and Google CC, Letsdefend SOC is my 1st course. Malware analysis as hard as i thought, log analysis is easier.

  • @recon0x7f16
    @recon0x7f16 7 หลายเดือนก่อน

    how do you output multiple the content of speicifc files with strings in linux as demonstrated @14:32

  • @recon0x7f16
    @recon0x7f16 7 หลายเดือนก่อน

    how do u determine what profile to use in volatility this is something i dont quite understand yet.

    • @BretWitt
      @BretWitt 6 หลายเดือนก่อน

      In VOL 3, it's auto magically done, as for VOL 2, you use imageinfo and kdbgscan to find what fits best. book.hacktricks.xyz/generic-methodologies-and-resources/basic-forensic-methodology/memory-dump-analysis/volatility-cheatsheet Look at the OS Profiles section

  • @Zobrombee
    @Zobrombee 7 หลายเดือนก่อน

    Nice job. Thanks for the interesting video.

  • @hydra-69-69
    @hydra-69-69 7 หลายเดือนก่อน

    This is great.🔥🔥

  • @nelsonnelson31
    @nelsonnelson31 7 หลายเดือนก่อน

    Jesus this lab is extremely intense ahaha not able to complete it

  • @swapnabachu3720
    @swapnabachu3720 7 หลายเดือนก่อน

    after follow udp stream, where did you go to find p13 frame message?

  • @Knavex7e
    @Knavex7e 7 หลายเดือนก่อน

    Thank you for these Videos, Bret. They really help to learn safely with hands-on experience that transfers well to on-the-job experience!

  • @2kslimey
    @2kslimey 7 หลายเดือนก่อน

    this is beginner? I'm screwed

    • @BretWitt
      @BretWitt 7 หลายเดือนก่อน

      Beginner challenge... don't count yourself out!

  • @CyberGladius
    @CyberGladius 7 หลายเดือนก่อน

    Hey Bret! This is the other Bret(CyberGladius). lol. I enjoyed watching someone work through my challenge. Thank you for the video! The event logs are from an actual breach I worked on. Fun fact: the hard part was altering the event logs to remove sensitive information and re-signing the headers.

  • @analysm
    @analysm 7 หลายเดือนก่อน

    It was very helpful. thank you.

  • @IOSALive
    @IOSALive 7 หลายเดือนก่อน

    InfoSec_Bret, I loved this video so much, I had to hit the like button!