Day 2
One man’s false positive is another man’s potpourri.
This Challenge revolves around investigating logs within a SIEM interface to answer questions related to a cyber incident.

Concept Overview
False Positive vs. True Positive:
A False Positive refers to an alert flagged incorrectly as malicious.
A True Positive is a valid detection of malicious activity.
Start the machine and access the Elastic dashboard
Use elastic:elastic
as username and password
To Identify the account with the most failed login attempts, Set the timeframe: November 29, 2024, 00:00:00.000 to December 1, 2024, 23:30:00.000.
Apply the filter: event.outcome: failure
.
Examine the logs for the username linked to the failed logins.

Use the same filter and count the total failed attempts.
Glitch's successfull logon's to ADM-01:
For this, we can set the filters to host.hostname: ADM-01
, event.category: authentication
and event.outcome: success
:

To find the decoded command executed by Glitch: set the filter to event.category: process

We get: SQBuAHMAdABhAGwAbAAtAFcAaQBuAGQAbwB3AHMAVQBwAGQAYQB0AGUAIAAtAEEAYwBjAGUAcAB0AEEAbABsACAALQBBAHUAdABvAFIAZQBiAG8AbwB0AA==

On decoding this to base64
and then setting the encoding format to UTF-16LE (1200)
for PowerShell commands.
Decoded Output: Install-WindowsUpdate -AcceptAll -AutoReboot
Questions
1.What is the name of the account causing all the failed login attempts?
A: service_admin
2.How many failed logon attempts were observed?
A: 6791
3.What is the IP address of Glitch?
A: 10.0.255.1
4.When did Glitch successfully logon to ADM-01? Format: MMM D, YYYY HH:MM:SS.SSS
A: Dec 1, 2024 08:54:39.000
5.What is the decoded command executed by Glitch to fix the systems of Wareville?
A: Install-WindowsUpdate -AcceptAll -AutoReboot
Thank you!
Last updated
Was this helpful?