当前位置: 首页 > news >正文

Splunk练习 Boss of the SOC V1

  1. What is the likely IPv4 address of someone from the Po1s0n1vy group scanning imreallynotbatman.com for web application vulnerabilities?

(1)“imreallynotbatman.com”

(2)漏扫 => 可能被墙拦截,sourcetype选防火墙,action=blocked

index=botsv1  imreallynotbatman.com sourcetype=fgt_utm action=blocked

Answer: 40.80.148.42

2. What company created the web vulnerability scanner used by Po1s0n1vy? Type the company name.

搜索条件不变,查看msg。

Answer: acunetix

3. What content management system is imreallynotbatman.com likely using?

查看URL 字段。

Answer: joomla

4. What is the name of the file that defaced the imreallynotbatman.com website? Please submit only the name of the file with extension?

确定“192.168.250.70”是受害服务器,搜索http记录:

index=botsv1 "192.168.250.70" source="stream:http"

发现一个dest_IP只有两条记录,可能是普通用户的访问,添加搜索,request中找到访问文件:

index=botsv1 "192.168.250.70" source="stream:http" dest_ip="23.22.63.114"

Answer: poisonivy-is-coming-for-you-batman.jpeg

5. This attack used dynamic DNS to resolve the malicious IP. What fully qualified domain name (FQDN) is associated with this attack?

应该是受害服务器请求解析,src_ip=192.168.250.70

index=botsv1 sourcetype=stream:http src_ip=192.168.250.70

Answer: prankglassinebracket.jumpingcrab.com

6. What IPv4 address has Po1s0n1vy tied to domains that are pre-staged to attack Wayne Enterprises?

Answer: 23.22.63.114

8. What IPv4 address is likely attempting a brute force password attack against imreallynotbatman.com

提交密码,一般用post,目的地址是192.168.250.70。再用stats:

index=botsv1 sourcetype=stream:http dest_ip=192.168.250.70 http_method=POST 
| stats count by src_ip, uri

前三个访问量高,可能有密码爆破攻击。分别查看

/joomla/index.php/component/search/    应该是搜索用,没发现输入用户名和密码

/joomla/index.php     邮件相关

第三个/joomla/administrator/index.php ,form_data是注入的数据,stats集中查看下:

index=botsv1 sourcetype=stream:http dest_ip=192.168.250.70 http_method=POST uri="/joomla/administrator/index.php" | stats count by form_data

Answer: 23.22.63.114

9. What is the name of the executable uploaded by Po1s0n1vy?

可能是.exe文件,试一下

index=botsv1 sourcetype=stream:http dest_ip="192.168.250.70" http_method=POST  *.exe

发现shtml.exe(FrontPage服务器扩展的组件之一)和3791.exe。

10. What is the MD5 hash of the executable uploaded?

搜索3791.exe + windows sysmon日志:

index=botsv1 3791.exe  sourcetype="XmlWinEventLog:Microsoft-Windows-Sysmon/Operational"

signature有四种:

  • Image Load → 监控DLL/驱动加载,防注入。

  • Process Create → 追踪新进程,检测恶意执行。

  • Network Connect → 发现恶意外联流量。

  • Process Terminate → 识别攻击者清理痕迹行为。

选择Process Create, 再查看cmdline:

选择3791.exe,查看MD5:

Answer:  aae3f5a29935e6abcc2c2754d12a9af0

11. GCPD reported that common TTPs (Tactics, Techniques, Procedures) for the Po1s0n1vy APT group, if initial compromise fails, is to send a spear phishing email with custom malware attached to their intended target. This malware is usually connected to Po1s0n1vys initial attack infrastructure. Using research techniques, provide the SHA256 hash of this malware.

在VirusTotal网站上检查发现23.22.63.114有关联文件:

答案是25-07-03这个 MirandaTateScreensaver.scr.exe

Answer: 9709473ab351387aab9e816eff3910b9f28a7a70202e250ed46dba8f820f34a8

12. What special hex code is associated with the customized malware discussed in question 11?

VirusTotal  “Community” 页面有答案

Answer: 53 74 65 76 65 20 42 72 61 6e 74 27 73 20 42 65 61 72 64 20 69 73 20 61 20 70 6f 77 65 72 66 75 6c 20 74 68 69 6e 67 2e 20 46 69 6e 64 20 74 68 69 73 20 6d 65 73 73 61 67 65 20 61 6e 64 20 61 73 6b 20 68 69 6d 20 74 6f 20 62 75 79 20 79 6f 75 20 61 20 62 65 65 72 21 21 21 

13. What was the first brute-force password used?

index=botsv1  source="stream:http" dest_ip="192.168.250.70" POST uri="/joomla/administrator/index.php"  | stats count by form_data, timestamp |  sort timestamp asc

Answer: 12345678

14 . One of the passwords in the brute force attack is James Brodsky’s favorite Coldplay song. We are looking for a six-character word on this one. Which is it?

酷玩最火的歌,应该是yellow,搜索试一下

index=botsv1  source="stream:http" dest_ip="192.168.250.70" POST uri="/joomla/administrator/index.php" yellow

找到一条记录:

Answer: Yellow

15. What was the correct password for admin access to the content management system running “imreallynotbatman.com”?

Step 1 — A correct password for admin access is status code 200 in which I used to filter it out in which I couldn’t find.

Step 2 — I then erased the stats code of 200 and the table I decided o narrow the search.

Step 3 — I narrowed down the search by having a table court the amount password occurrences that were used to authenticate.

正确做法是找次数:

index=botsv1 sourcetype=stream:http dest_ip="192.168.250.70" http_method=POST uri=/joomla/Administrator/index.php
| rex field=form_data "passwd=(?<password>\w+)"
| stats count by password
| sort -count

Answer: batman

16. What was the average password length used in the password brute forcing attempt?

练习用eval和stats 

index=botsv1  source="stream:http" uri="/joomla/administrator/index.php"  POST | rex field=form_data "passwd=(?<password>\w+)"  | stats count by password | eval x=len(password) | stats avg(x) as result

Answer: 6

17. How many seconds elapsed between the time the brute force password scan identified the correct password and the compromised login?

标准答案:

index=botsv1 imreallynotbatman.com sourcetype="stream:http" dest_ip="192.168.250.70" http_method="POST" username passwd  | rex field=form_data "passwd=(?<passwd>\w+)"  | search passwd=batman 
| transaction passwd 
| eval dur=round(duration, 2)
| table dur

真麻烦,不如两条找出来时间减一下得了
Answer: 92.17

18. How many unique passwords were attempted in the brute force attempt?

index=botsv1 sourcetype=stream:http dest_ip="192.168.250.70" http_method=POST form_data=usernamepasswd*
| rex field=form_data "passwd=(?<creds>\w+)"
| table _time src_ip uri http_user_agent creds
| stats dc(creds) as unique_password_attempts

Answer: 412

http://www.dtcms.com/a/270298.html

相关文章:

  • 短视频矩阵系统的崛起:批量发布功能与多平台矩阵的未来
  • LeetCode 21. 合并两个有序链表
  • C#Halcon从零开发_Day18_OCR识别
  • 4. isaac sim4.2 教程-Core API-Hello robot
  • 【计算机组成原理】-CPU章节学习篇—笔记随笔
  • Linux 第一个系统程序 - 进度条
  • (C++)list列表相关基础用法(C++教程)(STL库基础教程)
  • 跨越NLP的三重曲线:从词法到叙事的进化之路
  • 使用python的 FastApi框架开发图书管理系统-前后端分离项目分享
  • huggingface笔记:文本生成Text generation
  • EXCEL(带图)转html
  • 基于LiteOS与SLE的多任务无线控制器项目实战
  • 深圳凭物联网软件开发构建智慧‘城市大脑‘
  • 什么是 3D 文件?
  • UE material advance 学习笔记
  • 【时时三省】(C语言基础)怎样引用指针变量
  • 免安装图片修改软件,一键批量处理
  • 16018.UE4+Airsim仿真环境搭建
  • 详细页智能解析算法:洞悉海量页面数据的核心技术
  • 软件系统测试的基本流程
  • 【PyTorch项目实战】VisRAG:基于视觉的多模态文档检索增强生成(文本+图像)
  • Android 事件分发机制深度解析
  • Android 中的多线程编程全面解析
  • YOLO融合[ICLR2025]PolaFormer中的极性感知线性注意力
  • docker proxy
  • C 解压文件
  • Day55 序列预测任务介绍
  • Subject vs Flowable vs Observable 对比
  • 【零基础学AI】第31讲:目标检测 - YOLO算法
  • 每日算法刷题Day44 7.8:leetcode前缀和4道题,用时1h40min