<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Sherlocks on Mike.Horn</title>
    <link>https://mikehorn-git.github.io/writeups/htb/sherlocks/</link>
    <description>Recent content in Sherlocks on Mike.Horn</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Fri, 18 Oct 2024 00:00:00 +0200</lastBuildDate>
    <atom:link href="https://mikehorn-git.github.io/writeups/htb/sherlocks/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>nuts</title>
      <link>https://mikehorn-git.github.io/writeups/htb/sherlocks/nuts/</link>
      <pubDate>Fri, 18 Oct 2024 00:00:00 +0200</pubDate>
      <guid>https://mikehorn-git.github.io/writeups/htb/sherlocks/nuts/</guid>
      <description>&lt;h1 id=&#34;q1-what-action-did-alex-take-to-integrate-the-purported-time-saving-package-into-the-deployment-process-provide-the-full-command&#34;&gt;Q1: What action did Alex take to integrate the purported time-saving package into the deployment process? (provide the full command)&lt;/h1&gt;
&lt;p&gt;Review the PowerShell history file:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;ConsoleHost_history.txt&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Look for commands related to NuGet package installation.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;History&#34; loading=&#34;lazy&#34; src=&#34;../../../writeups/htb/sherlocks/nuts/2024-09-22T22:56:27,889083437+02:00.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Identify the full command used to install the package.&lt;/p&gt;
&lt;hr&gt;
&lt;h1 id=&#34;q2-identify-the-url-from-which-the-package-was-downloaded-&#34;&gt;Q2: Identify the URL from which the package was downloaded ?&lt;/h1&gt;
&lt;p&gt;Examine the &lt;strong&gt;web browsing history&lt;/strong&gt; on the system.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;Url&#34; loading=&#34;lazy&#34; src=&#34;../../../writeups/htb/sherlocks/nuts/2024-10-13T18_19_20,030404275+02_00.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Locate the URL used to download the NuGet package.&lt;/p&gt;</description>
    </item>
    <item>
      <title>heartbreaker-continuum</title>
      <link>https://mikehorn-git.github.io/writeups/htb/sherlocks/heartbreaker-continuum/</link>
      <pubDate>Mon, 23 Sep 2024 00:00:00 +0200</pubDate>
      <guid>https://mikehorn-git.github.io/writeups/htb/sherlocks/heartbreaker-continuum/</guid>
      <description>&lt;h1 id=&#34;q1-to-accurately-reference-and-identify-the-suspicious-binary-please-provide-its-sha256-hash&#34;&gt;Q1: To accurately reference and identify the suspicious binary, please provide its SHA256 hash.&lt;/h1&gt;
&lt;p&gt;Identify the SHA256 hash of the suspicious binary file.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;File Name:&lt;/strong&gt; &lt;code&gt;Superstar_MemberCard.tiff.exe&lt;/code&gt;
&lt;strong&gt;SHA256:&lt;/strong&gt; &lt;code&gt;12daa34111bb54b3dcbad42305663e44e7e6c3842f015cccbbe6564d9dfd3ea3&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h1 id=&#34;q2-when-was-the-binary-file-originally-created-according-to-its-metadata-utc&#34;&gt;Q2: When was the binary file originally created, according to its metadata (UTC)?&lt;/h1&gt;
&lt;p&gt;Upload the file hash to &lt;strong&gt;VirusTotal&lt;/strong&gt; to retrieve metadata information.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;VT&#34; loading=&#34;lazy&#34; src=&#34;../../../writeups/htb/sherlocks/heartbreaker-continuum/2024-09-22T11:34:24,713072253+02:00.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Locate the &lt;strong&gt;first seen / creation timestamp&lt;/strong&gt; and convert it to &lt;strong&gt;UTC&lt;/strong&gt;.&lt;/p&gt;
&lt;hr&gt;
&lt;h1 id=&#34;q3-examining-the-code-size-in-a-binary-file-can-give-indications-about-its-functionality-could-you-specify-the-byte-size-of-the-code-in-this-binary&#34;&gt;Q3: Examining the code size in a binary file can give indications about its functionality. Could you specify the byte size of the code in this binary?&lt;/h1&gt;
&lt;p&gt;Use a tool such as &lt;strong&gt;readpe&lt;/strong&gt; to inspect the binary structure.&lt;/p&gt;</description>
    </item>
    <item>
      <title>campfire-1</title>
      <link>https://mikehorn-git.github.io/writeups/htb/sherlocks/campfire-1/</link>
      <pubDate>Sun, 22 Sep 2024 00:00:00 +0200</pubDate>
      <guid>https://mikehorn-git.github.io/writeups/htb/sherlocks/campfire-1/</guid>
      <description>&lt;h1 id=&#34;q1-analyzing-domain-controller-security-logs&#34;&gt;Q1: Analyzing Domain Controller Security Logs&lt;/h1&gt;
&lt;p&gt;Can you confirm the &lt;strong&gt;date and time&lt;/strong&gt; when the &lt;em&gt;Kerberoasting&lt;/em&gt; activity occurred?&lt;/p&gt;
&lt;p&gt;Open &lt;strong&gt;Event Viewer&lt;/strong&gt; on the Windows VM and search for &lt;strong&gt;Event ID &lt;a href=&#34;https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4769&#34;&gt;4769&lt;/a&gt;&lt;/strong&gt;.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;🕒 Remember to convert your local time to &lt;strong&gt;UTC&lt;/strong&gt;.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;img alt=&#34;Kerberoasting Event&#34; loading=&#34;lazy&#34; src=&#34;../../../writeups/htb/sherlocks/campfire-1/2024-09-21T16_52_20,152679715+02_00.png&#34;&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;h1 id=&#34;q2-targeted-service-name&#34;&gt;Q2: Targeted Service Name&lt;/h1&gt;
&lt;p&gt;What is the &lt;strong&gt;Service Name&lt;/strong&gt; that was targeted?&lt;/p&gt;
&lt;p&gt;Check the &amp;ldquo;Service Information&amp;rdquo; section of the same event:&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;Service Name&#34; loading=&#34;lazy&#34; src=&#34;../../../writeups/htb/sherlocks/campfire-1/2024-09-21T16_58_06,480108177+02_00.png&#34;&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;h1 id=&#34;q3-workstation-identification&#34;&gt;Q3: Workstation Identification&lt;/h1&gt;
&lt;p&gt;Identify the &lt;strong&gt;Workstation IP Address&lt;/strong&gt; from which the activity originated.&lt;/p&gt;</description>
    </item>
    <item>
      <title>campfire-2</title>
      <link>https://mikehorn-git.github.io/writeups/htb/sherlocks/campfire-2/</link>
      <pubDate>Sun, 22 Sep 2024 00:00:00 +0200</pubDate>
      <guid>https://mikehorn-git.github.io/writeups/htb/sherlocks/campfire-2/</guid>
      <description>&lt;h1 id=&#34;q1-when-did-the-as-rep-roasting-attack-occur-and-when-did-the-attacker-request-the-kerberos-ticket-for-the-vulnerable-user&#34;&gt;Q1: When did the &lt;em&gt;AS-REP Roasting&lt;/em&gt; attack occur, and when did the attacker request the Kerberos ticket for the vulnerable user?&lt;/h1&gt;
&lt;p&gt;Open &lt;strong&gt;Event Viewer&lt;/strong&gt; on the Windows VM and search for &lt;strong&gt;Event ID &lt;a href=&#34;https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4768&#34;&gt;4768&lt;/a&gt;&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Look for anomalies in the logs — specifically events where:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Pre-Authentication Type:&lt;/strong&gt; &lt;code&gt;0&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;This indicates that the account does not require Kerberos pre-authentication, making it vulnerable to &lt;em&gt;AS-REP Roasting&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;ASREP Event&#34; loading=&#34;lazy&#34; src=&#34;../../../writeups/htb/sherlocks/campfire-2/2024-09-21T18:18:55,910252335+02:00.png&#34;&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;🕒 Remember to convert the timestamp to &lt;strong&gt;UTC&lt;/strong&gt; when documenting your findings.&lt;/p&gt;</description>
    </item>
    <item>
      <title>crownjewel-1</title>
      <link>https://mikehorn-git.github.io/writeups/htb/sherlocks/crownjewel-1/</link>
      <pubDate>Sun, 22 Sep 2024 00:00:00 +0200</pubDate>
      <guid>https://mikehorn-git.github.io/writeups/htb/sherlocks/crownjewel-1/</guid>
      <description>&lt;h1 id=&#34;q1-attackers-can-abuse-the-vssadmin-utility-to-create-volume-shadow-snapshots-and-then-extract-sensitive-files-like-ntdsdit-to-bypass-security-mechanisms-identify-the-time-when-the-volume-shadow-copy-service-entered-a-running-state&#34;&gt;Q1: Attackers can abuse the vssadmin utility to create volume shadow snapshots and then extract sensitive files like NTDS.dit to bypass security mechanisms. Identify the time when the Volume Shadow Copy service entered a running state.&lt;/h1&gt;
&lt;p&gt;Open the &lt;strong&gt;SYSTEM.evtx&lt;/strong&gt; log and search for &lt;strong&gt;Event ID 7036&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Look for events indicating the &lt;strong&gt;Volume Shadow Copy&lt;/strong&gt; service entering a running state:&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;7036&#34; loading=&#34;lazy&#34; src=&#34;../../../writeups/htb/sherlocks/crownjewel-1/2024-09-21T11_58_52,679703907+02_00.png&#34;&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;🕒 Convert the timestamp to &lt;strong&gt;UTC&lt;/strong&gt;.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h1 id=&#34;q2-when-a-volume-shadow-snapshot-is-created-the-volume-shadow-copy-service-validates-the-privileges-using-the-machine-account-and-enumerates-user-groups-find-the-user-groups-it-enumerates-the-subject-account-name-and-also-identify-the-process-idin-decimal-of-the-volume-shadow-copy-service-process&#34;&gt;Q2: When a volume shadow snapshot is created, the Volume shadow copy service validates the privileges using the Machine account and enumerates User groups. Find the User groups it enumerates, the Subject Account name, and also identify the Process ID(in decimal) of the Volume shadow copy service process&lt;/h1&gt;
&lt;p&gt;Search for &lt;strong&gt;Event ID &lt;a href=&#34;https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4799&#34;&gt;4799&lt;/a&gt;&lt;/strong&gt; and filter for:&lt;/p&gt;</description>
    </item>
    <item>
      <title>crownjewel-2</title>
      <link>https://mikehorn-git.github.io/writeups/htb/sherlocks/crownjewel-2/</link>
      <pubDate>Sun, 22 Sep 2024 00:00:00 +0200</pubDate>
      <guid>https://mikehorn-git.github.io/writeups/htb/sherlocks/crownjewel-2/</guid>
      <description>&lt;h1 id=&#34;q1-when-utilizing-ntdsutilexe-to-dump-ntds-on-disk-it-simultaneously-employs-the-microsoft-shadow-copy-service-what-is-the-most-recent-timestamp-at-which-this-service-entered-the-running-state-signifying-the-possible-initiation-of-the-ntds-dumping-process&#34;&gt;Q1: When utilizing ntdsutil.exe to dump NTDS on disk, it simultaneously employs the Microsoft Shadow Copy Service. What is the most recent timestamp at which this service entered the running state, signifying the possible initiation of the NTDS dumping process?&lt;/h1&gt;
&lt;p&gt;Open the &lt;strong&gt;SYSTEM.evtx&lt;/strong&gt; log and search for &lt;strong&gt;Event ID 7036&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Use a search (Ctrl+F) for &lt;strong&gt;Volume Shadow Copy&lt;/strong&gt; service events.&lt;/p&gt;
&lt;p&gt;Identify the most recent entry where the service entered the running state and note the timestamp from the:&lt;/p&gt;</description>
    </item>
    <item>
      <title>reaper</title>
      <link>https://mikehorn-git.github.io/writeups/htb/sherlocks/reaper/</link>
      <pubDate>Sat, 21 Sep 2024 00:00:00 +0200</pubDate>
      <guid>https://mikehorn-git.github.io/writeups/htb/sherlocks/reaper/</guid>
      <description>&lt;h1 id=&#34;q1-ip-address-of-forela-wkstn001&#34;&gt;Q1: IP Address of Forela-Wkstn001&lt;/h1&gt;
&lt;p&gt;What is the IP address of &lt;strong&gt;Forela-Wkstn001&lt;/strong&gt;?&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;🔎 See Q2 for the analysis steps.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h1 id=&#34;q2-ip-address-of-forela-wkstn002&#34;&gt;Q2: IP Address of Forela-Wkstn002&lt;/h1&gt;
&lt;p&gt;What is the IP address of &lt;strong&gt;Forela-Wkstn002&lt;/strong&gt;?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; NetworkMiner requires &lt;code&gt;.pcap&lt;/code&gt; format. Convert the file if needed:&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;tshark -F pcap -r ntlmrelay.pcapng -w ntlmrelay.pcap
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Open the capture in &lt;strong&gt;NetworkMiner&lt;/strong&gt; to get an overview of network activity.
Both workstation IP addresses can be identified here:&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;NetworkMiner Overview&#34; loading=&#34;lazy&#34; src=&#34;../../../writeups/htb/sherlocks/reaper/2024-09-21T15_32_55,042790459+02_00.png&#34;&gt;&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
