Campfire-1
Description
Files
➜ tree /f | sls -NotMatch .pf
Folder PATH listing
Volume serial number is BC69-C561
C:.
└───Triage
├───Domain Controller
│ SECURITY-DC.evtx
│
└───Workstation
│ Powershell-Operational.evtx
│
└───2024-05-21T033012_triage_asset
└───C
└───Windows
└───prefetchTasks
1. Analyzing Domain Controller Security Logs, can you confirm the date & time when the kerberoasting activity occurred?



2. What is the Service Name that was targeted?

3. It is really important to identify the Workstation from which this activity occurred. What is the IP Address of the workstation?
4. Now that we have identified the workstation, a triage including PowerShell logs and Prefetch files are provided to you for some deeper insights so we can understand how this activity occurred on the endpoint. What is the name of the file used to Enumerate Active directory objects and possibly find Kerberoastable accounts in the network?

5. When was this script executed?

6. What is the full path of the tool used to perform the actual kerberoasting attack?
7. When was the tool executed to dump credentials?
Last updated