Analyzing PCAP with Zeek - HTB Sherlocks - KnockKnock

preview_player
Показать описание
00:00 - Going over the Scenario
01:30 - Talking about why I'm using Zeek and running it in a docker
05:20 - Showing a Corelight Zeek Cheat Sheet, which is tremendously helpful
08:00 - Showing Zeek-Cut on the x509 log, then looking at the SSL Log
11:50 - Looking for a single IP that sent multiple SSH Banners
13:20 - Creating an alias for zeek-grek (alias zeek-grep='grep -e "^#" -e'), which lets us easily filter logs
17:00 - Looking at the HTTP Log, discovering a wget downloading ransomware
21:10 - Looking at the FTP Log, and showing the passwords are hidden. Editing the Zeek Config to unmask the password
24:30 - Editing the FTP Logged commands to add PASS so we see failed logins too
34:10 - Using the DNS Log to see that our attacker was likely using Amazon EC2
36:15 - Looking at how many connections each IP made, discovering our attacker doing a port scan using date -d @epoch to convert to human readable time
42:30 - Editing our zeek config to also extract_files, then looking at the ransomware download
53:15 - Looking at the files downloaded over FTP
1:07:00 - Start answering the questions. Doing some Grep Fu to see all the open ports during initial recon
1:18:10 - Finding when the port knock happened
Рекомендации по теме
Комментарии
Автор

amazing stuff.
would have taken me a more than a day to find all the info you found from just a pcap.
+1 for more blue team vids

exec_mayank
Автор

Amazing content, keep up the great work!

eaf
Автор

Zeek is one of my favorite tools. I use it together with Brim to visualize the data.

danielpeccini
Автор

Great video! I'm really enjoying the HTB Sherlocks series

treybaxter
Автор

Great video and a nice Mistborn sweater!

AP-rvkk
Автор

Are the HTB Sherlocks going to be user-generated like the machines? I'd like to see the data from Sherlocks in a SIEM so that it feels close to home. I'd probably have a mental breakdown if I were forced to raw dog PCAP with zeek cli everyday.

dadamnmayne
Автор

really enjoying sherlocks. thanks ippsec :)

Hckr-eixj
Автор

amazing video Ippsec, do you plan to release more of those Sherlocks challenges?

jaylal
Автор

Great Video! Which Text Editor do you use for the notes?

TobiNr
Автор

Not sure if it comes up often but there is a way to format timestamps returned from date in the case of the one at 1:22:52 the following could be used:

zoes
Автор

the 'analy' part got me laughing not gonna lie haha

samuel-ffsl
Автор

I couldn't unzip the file. Is the password to unzip the file still hackthebox?

Fbarrett
Автор

Wait, you have a face?! I swear you were a disembodied voice until half an hour ago...

semitangent
Автор

When you were doing the zeek-grep alias, I think you could have done easier, just by manipulating the syntax somehow else, like: cat ssh.log |zeek-cut id.orig_h client | grep "45.43.62.46"....the output is the same :)

LyOnCr
Автор

hey @ippsec what your thoughts about exegol repo

ChesapeakeMonstro