Campfire-1

Description

Alonzo Spotted Weird files on his computer and informed the newly assembled SOC Team. Assessing the situation it is believed a Kerberoasting attack may have occurred in the network. It is your job to confirm the findings by analyzing the provided evidence. You are provided with: 1- Security Logs from the Domain Controller 2- PowerShell-Operational Logs from the affected workstation 3- Prefetch Files from the affected workstation

circle-info

Zip Password: hacktheblue

Files

We are given evtx (Windows Logs) and prefetch files (*.pf)

➜ tree /f | sls -NotMatch .pf

Folder PATH listing
Volume serial number is BC69-C561
C:.
└───Triage
    ├───Domain Controller
    │       SECURITY-DC.evtx

    └───Workstation
        │   Powershell-Operational.evtx

        └───2024-05-21T033012_triage_asset
            └───C
                └───Windows
                    └───prefetch

Tasks

1. Analyzing Domain Controller Security Logs, can you confirm the date & time when the kerberoasting activity occurred?

Detecting Kerberoasting Activityarrow-up-right

Event we should try to look for:

Writeup.png

Here we filter for event with ID: 4769 and look for Ticket Operation Type 0x17:

Writeup-1.png

Double click the event to get detailed information, the Details tab and then we find TimeCreated field which specifies when the event was generated.

Writeup-2.png
circle-check
circle-info

Hint: In Security Logs, Filter for Event ID 4769. Now Look for any event where the service name is NOT( krbtgt or ends with $ (For e.g DC01$ ) ). The ticket type should be 0x17 which is for RC4 type encryption. The failure code should be 0x0. The event that matches all the above conditions is the event detailing information about the kerberoasting attack activity.

2. What is the Service Name that was targeted?

The ServiceName can be found in event details:

Writeup-3.png
circle-check

3. It is really important to identify the Workstation from which this activity occurred. What is the IP Address of the workstation?

IP can be found in Event Details

circle-check

4. Now that we have identified the workstation, a triage including PowerShell logs and Prefetch files are provided to you for some deeper insights so we can understand how this activity occurred on the endpoint. What is the name of the file used to Enumerate Active directory objects and possibly find Kerberoastable accounts in the network?

The second log Powershell-Operational.evtx contains powershell logs and in the events we can wee powerview.ps1 being executed.

PowerViewarrow-up-right is series of functions that performs network and Windows domain enumeration and exploitation.

Writeup-4.png
circle-check
circle-info

Hint: Use PowerShell logs and filter for event ID 4104. We can see all the contents of the script executed and its name as well.

5. When was this script executed?

The start of powershell script execution starts Creating Scriptblock event:

Writeup-5.png
circle-check

6. What is the full path of the tool used to perform the actual kerberoasting attack?

PECmd: Prefetch Explorer Command Linearrow-up-right can be used to parsed prefetch files into easily readable format:

After some filtering I first extracted all Executable Names from parsed.csv

After going over the list we notice RUBEUS.EXEarrow-up-right: Rubeus is a C# toolset for raw Kerberos interaction and abuses

In FilesLoaded column we can see the location the file was saved to:

circle-check

7. When was the tool executed to dump credentials?

LastRun column contains the data 21.05.2024 03:18

circle-check

Last updated