Noxious
Scenario
Files
└─$ 7z l noxious.zip
Date Time Attr Size Compressed Name
------------------- ----- ------------ ------------ ------------------------
2024-06-24 07:44:14 ....A 137211904 135790375 capture.pcap
------------------- ----- ------------ ------------ ------------------------
2024-06-24 07:44:14 137211904 135790375 1 files
└─$ 7z x noxious.zip -P'hacktheblue'
└─$ ls -lah
Permissions Size User Date Modified Name
.rwxrwx--- 137M root 24 Jun 07:44 capture.pcap
.rwxrwx--- 136M root 27 Aug 08:59 noxious.zipTasks
Task 1. Its suspected by the security team that there was a rogue device in Forela's internal network running responder tool to perform an LLMNR Poisoning attack. Please find the malicious IP Address of the machine.


Task 2. What is the hostname of the rogue machine?
Task 3. Now we need to confirm whether the attacker captured the user's hash and it is crackable!! What is the username whose hash was captured?


Task 4. In NTLM traffic we can see that the victim credentials were relayed multiple times to the attacker's machine. When were the hashes captured the First time?

Task 5. What was the typo made by the victim when navigating to the file share that caused his credentials to be leaked?
Task 6. To get the actual credentials of the victim user we need to stitch together multiple values from the NTLM negotiation packets. What is the NTLM server challenge value?
Task 7. Now doing something similar find the NTProofStr value.
Task 8. To test the password complexity, try recovering the password from the information found from packet capture. This is a crucial step as this way we can find whether the attacker was able to crack this and how quickly.
Task 9. Just to get more context surrounding the incident, what is the actual file share that the victim was trying to navigate to?

Last updated