Reaper
Description
Files
└─$ 7z x Reaper.zip -P'hacktheblue'
└─$ /bin/ls -Alh Reaper
total 1.4M
-rwxrwx--- 1 root vboxsf 308K Jul 31 00:56 ntlmrelay.pcapng
-rwxrwx--- 1 root vboxsf 1.1M Jul 31 01:10 Security.evtxTasks
Task 1. What is the IP Address for Forela-Wkstn001?
➜ tshark -Y "nbns" -T fields -e nbns.addr -e nbns.name -r .\ntlmrelay.pcapng | Sort-Object | Get-Unique | Select-String wkst
172.17.79.129 FORELA-WKSTN001<00>,FORELA-WKSTN001<00> (Workstation/Redirector)
172.17.79.129 FORELA-WKSTN001<20>,FORELA-WKSTN001<20> (Server service)
172.17.79.136 FORELA-WKSTN002<00>,FORELA-WKSTN002<00> (Workstation/Redirector)
172.17.79.136 FORELA-WKSTN002<20>,FORELA-WKSTN002<20> (Server service)Task 2. What is the IP Address for Forela-Wkstn002?
Task 3. Which user account's hash was stolen by attacker?


Task 4. What is the IP Address of Unknown Device used by the attacker to intercept credentials?
Task 5. What was the fileshare navigated by the victim user account?

Task 6. What is the source port used to logon to target workstation using the compromised account?

Task 7. What is the Logon ID for the malicious session?
Task 8. The detection was based on the mismatch of hostname and the assigned IP Address.What is the workstation name and the source IP Address from which the malicious logon occur?
Task 9. When did the malicious logon happened. Please make sure the timestamp is in UTC?
Task 10. What is the share Name accessed as part of the authentication process by the malicious tool used by the attacker?


Last updated