Premise

In this video, we covered FTP investigation using splunk search queries. We used data from TryHackMe Splunk 2 Boss of the SOC v2 400 series questions as part of cyber defense pathway.

 

Get Splunk Field Notes

 

Room Questions and Answers

A Federal law enforcement agency reports that Taedonggang often spear phishes its victims with zip files that have to be opened with a password. What is the name of the attachment sent to Frothly by a malicious Taedonggang actor?

What is the password to open the zip file?

The Taedonggang APT group encrypts most of their traffic with SSL. What is the “SSL Issuer” that they use for the majority of their traffic? Answer guidance: Copy the field exactly, including spaces.

What unusual file (for an American company) does winsys32.dll cause to be downloaded into the Frothly environment?

What is the first and last name of the poor innocent sap who was implicated in the metadata of the file that executed PowerShell Empire on the first victim’s workstation? Answer example: John Smith

Within the document, what kind of points is mentioned if you found the text?

To maintain persistence in the Frothly network, Taedonggang APT configured several Scheduled Tasks to beacon back to their C2 server. What single webpage is most contacted by these Scheduled Tasks? Answer example: index.php or images.html

Room Link: Splunk 2
Video Walk-through

 

About the Author

Cybersecurity Instructor & Swimmer

View Articles