Josh Sokol (46:36)
I back. I think I acquired a new ring of satellites. So can you hear me? Yes. All right. I think Ed Bronwyn knows what this is like. Reacquiring. Reacquiring. All right, so I'm going to do a quick walk through. So what we're doing, in case you're curious, whenever we do webcasts, not all of our webcasts, but we're trying to add in a mini CTF challenge for that ctf. And by the way, we have on the Discord channel, we have a number of people from bhis and we have the winners, which will be announced. I emailed them in to the team. So, Zach, could we please hit out the winners? We had the random winner that gets one year of the entire catalog of anti siphon security training on demand, which is really cool. So congratulations to them. And then the other winner is just a random. Is the one that had the best write up that gets a free anti siphon training class of their choosing. So if you want to be part of this, join our technical webcast this week. The next one will be Patterson Cakes. I will have a cyber range challenge on that. So come to that webcast, do the CTF at the end and then I'll do the walkthrough at the end of the news next week, which isn't on Monday. I believe it's on Wednesday next week. All right, so I'm going to share my screen really, really quick. We're going to allow that. And I'm going to share my entire screen. We're going to do that. All right. I am in the cloud range doing cloud range things. So as part of this challenge, you were supposed to download a zip file that had a bunch of artifacts in it that were EVTX files of an actual attack. And the first thing I did whenever I'm doing this is I went through and I wanted to look at what does NetExec look like through the lens of deep blue CL from Eric Conrad. And it actually answers a couple of the questions that were part of the CTF right away, the one, one of the questions was what was the total number of login failures? There were 207 logon failures for multiple different accounts. And that's kind of fun. The next question was what was the administrator level account the attacker got access to? And that account was Dennis. Which actually leads us to our first detect, the first good detect. More than just multiple logon failures. If you have an admin level account that keeps getting logged into and logged out of multiple times and it's not normal, that should probably be some type of risk based alerting, some type of scoring associated with that account. And this is just a standard user account that did multiple login attempts. I also have what it looks like from the back end. My initial compromise in this particular system was I was using the auxiliary scanner SMB login within metasploit. And this is for a lab that I'm doing in a couple of weeks at Cyber Bay. So check that out where we give it a file of a number of users, give it a password, let it run, and you can see it attempt to authenticate to all of these different accounts. You can see it got into Christopher, got into Dennis's account and immediately flagged it as an administrator level account and got into Gregory and a couple of other ones. But the only one that was admin was Dennis. So you can see what that attack actually looks like there. So that was kind of the first question. The other question was around what was the service that keeps getting fired up. Now NetXec, when it runs NetXec is kind of cool in the fact that it queries LDAP to get a lot of the answers from a domain. But the other thing that it does is it fires off again and again and again the remote registry service on a system. So if you're looking at the actual event logs of the computer system, you will see. Let me hide this real quick. You will see a whole bunch of different instantiations of the remote registry service on the computer. Like right here. And this comes from Sysmon, which I'm going to talk about here in a couple of seconds. So you can see it in the system event logs right here. You can see that every time I ran the tool, remote registry started and then stopped and then started and then stopped and then started and then stopped. So that's kind of a cool detect there. But you can also see it in the Sysmon event logs as well. Now this particular configuration of Sysmon just really didn't give us a lot. We were able to see the remote registry service firing off multiple times on this system. So you can see that is once again it's kind of corresponding and kind of corroborating what we were seeing in the system service. So the other question I said is how much value are we getting out of the Sysmon event logs? I honestly don't feel like it was a lot of really useful information, but it was something, right? It kind of corresponded and kind of like corroborated what we were seeing in the system. So we had three separate event logs. We had the security event log, showed all of the different failed login attempts for all of the different users in the password spray that we had with the 207 failed login attempts there as well. So I had a full breakdown and you can get that in my intro class files. You can see the attack view from metasploit and I also shared the attack view from Net Exec where I was going through and querying the shares, querying lsa, trying to query different secrets, doing user information and pulling user information all from the Dennis account. So you can see what it looks like there as well. So does Zach have the Let me stop sharing. Does Zach have the winner on that IT career questions? Did we announce the winners? Oh no. Banjo Crashland also pointed out that we've got a link where you can register for the next webcast. We have a couple of webcasts this week that are pretty fun. The one that I'm doing that I did a CTF challenge and then Patterson actually contributed as well, is dealing with business email compromises. So if you can be on our Discord server, which we recommend that you join our Discord server, you'll be able to do that and you'll be able to join that webcast. The other thing is do we got it? There we go. James O won the class of their choosing. Very nice little write up. And by the way, there was a number of great write ups I just went through. I scientifically weighed all of them and I decided that James was the one that won. And then M42 Eagle got a full year of on demand training. And yeah, we do full catalog training for ridiculously low price for corporations as well. And by the way, if you would like a lab, if we could pop this up on YouTube, let me put it into chat. Tiny URL, tiny free labs, free. If you want to register for a lab environment and you can play around with the things that I did, we have a little survey where you can fill that out and we will get you access to our lab environment. And I think it comes with 16 hours of labs so you can play around with our full lab environment because we have all kinds of free intro labs that we do for my pay, which you can training. So also the Kickstarter is going up for the Future is the next graphic novel. I think we're almost at 50,000. We're almost completely funded for that Kickstarter. We have some really cool things that are out there as well. So like I said, this is a little bit different. We're trying to integrate our webcasts and doing more CTFs and more hands on. And I really want to try to do as much hands on as I can incorporating that into the news. I don't think we need a full 20 minutes, y'. All. I think we're gonna switch it to probably 15. And that might vary on the news from news segment to news segment because we're trying to do as much hands on and give as much as we possibly can to train up you and your teams. So please check it out. So I think that's it, Corey. That's all I have. Unless we have one more news story. Anybody have anything to add? By the way, all of that crap that I did is what everybody should be doing. Going through and running a tool, looking at the stimulus and response. What are the logs that are generated? How do I write signatures for that? Because I'm going to be honest with you, Net Exec, which is the spiritual successor of Crack Map Exec, it doesn't generate really clean event logs of like, you know, running NetExec now. And if you catch event ID 666, you can catch this tool too. There's nothing like that. But learning what the tools look like in your environment allows you to capture the appropriate logs to be able to detect these things. All right, Corey, any final things?