Advent of Cyber 2024: Week 1's Challenges Unwrapped
Week 1 of TryHackMe’s Advent of Cyber 2024 dives into OPSEC failures, vulnerabilities, and malware mischief. Explore SOC-mas tales of glitches, breaches, and cybersecurity triumphs!
💡
In this year’s Advent of Cyber, can you help McSkidy and the Glitch defend SOC-mas against the evil Mayor Malware’s plans?
SOC-mas is here, and TryHackMe’s Advent of Cyber 2024 has kicked off with a week full of exhilarating challenges! From malicious websites to CloudTrail mishaps, Week 1 puts us on a whirlwind adventure through OPSEC failures, XXE vulnerabilities, and malware mischief. In this write-up, we’ll break down each challenge, uncovering the lessons learned and the joy of mastering the puzzles. Are you ready to dive into the SOC-mas chaos?
Day 1
Maybe SOC-mas music, he thought, doesn't come from a store?
🤖
Glitch and McSkidy stumble across a suspicious website, uncovering poor OPSEC practices that hint at malicious intent. Join them as they investigate, piecing together clues from a poorly secured operation.
Navigate to the ip provided and use the link to convert to mp3
2 Files were extracted from the zip archive, somg.mp3 was a MS Windows shortcutinteresting..
Looks like the song.mp3 file is not what we expected! Run "exiftool song.mp3" in your terminal to find out the author of the song. Who is the author?
Tyler Ramsbey
❓
The malicious PowerShell script sends stolen info to a C2 server. What is the URL of this C2 server?
http://papash3ll.thm/data
❓
Who is M.M? Maybe his Github profile page would provide clues?
Mayor Malware
❓
What is the number of commits on the GitHub repo where the issue was raised?
One man's false positive is another man's potpourri.
📉
When unusual login attempts spark concerns, McSkidy and the SOC team dive deep into the logs. What seemed like noise at first might just hold the key to uncovering a hidden threat.
❓
What is the name of the account causing all the failed login attempts?
We first filter for the authentication event category and the failure outcome
service_admin
❓
How many failed logon attempts were observed?
Using the same filter as the previous question, we then filter the correct timeframe given in the context
6,791
❓
What is the IP address of Glitch?
Knowing that Glitch was able to access ADM-01, we can filter and search for the successful authentication event
10.0.255.1
❓
When did Glitch successfully logon to ADM-01? Format: MMM D, YYYY HH:MM:SS.SSS
Dec 1, 2024 08:54:39.000
❓
What is the decoded command executed by Glitch to fix the systems of Wareville?
Filter for event.category: process:
Install-WindowsUpdate -AcceptAll -AutoReboot
Day 3
Even if I wanted to go, their vulnerabilities wouldn't allow it.
💡
At a security conference, Glitch’s excitement turns to dismay as vulnerabilities in their web application are exposed. The SOC team steps in, racing to secure the flaws before they can be exploited.
❓
BLUE: Where was the web shell uploaded to? Answer format: /directory/directory/directory/filename.php
We can perform a search for shell.php
/media/images/rooms/shell.php
❓
BLUE: What IP address accessed the web shell?
We can toggle the source IP to be displayed in the columns and search for the use of shel.php
❓
RED: What is the contents of the flag.txt?
Access frostypines.thm after modifying the hosts file
echo "10.10.110.7 frostypines.thm" >> /etc/hosts
Access the login page with admin@frostypines.thm:admin , followed by accessing the admin page. Find the add_room functionality and attempt to upload a reverse shell
Now we can get flag.txt !
THM{Gl1tch_Was_H3r3}
Technically flag.txt could also be retrieved via direct object reference
Day 4
I’m all atomic inside!
💡
Retracing Glitch’s steps, the SOC team investigates traces left during hasty security fixes. By analyzing breadcrumbs, they uncover critical insights into what went wrong and how to improve security.
❓
What was the flag found in the .txt file that is found in the same directory as the PhishingAttachment.xslm artefact?
Navigate to C:\Users\Administrator\AppData\Local\temp and open the txt file:
THM{GlitchTestingForSpearphishing}
❓
What ATT&CK technique ID would be our point of interest?
💡
External research: Look up the MITRE ATT&CK technique ID for Command and Scripting Interpreter.
❓
What ATT&CK subtechnique ID focuses on the Windows Command Shell?
❓
What is the name of the Atomic Test to be simulated?
💡
Replace the subtechnique placeholder in the command Invoke-AtomicTest subtechnique -ShowDetails with the one found in question 3. Look for Atomic Test Names in regards to malware.
Invoke-AtomicTest T1059.003 -ShowDetails
Simulate BlackByte Ransomware Print Bombing
❓
What is the name of the file used in the test?
Execute Command to get Test Number 4's prerequisites
When a critical web application reveals an XXE vulnerability, the SOC team jumps into action. Who introduced the flaw, and how can it be mitigated before it leads to something more catastrophic?
❓
What is the flag discovered after navigating through the wishes?
THM{Brut3f0rc1n6_mY_w4y}
❓
What is the flag seen on the possible proof of sabotage?
THM{m4y0r_m4lw4r3_b4ckd00rs}
Day 6
If I can't find a nice malware to use, I'm not going.
🦠
Mayor Malware is on the loose, testing the evasion capabilities of his latest creation. The SOC team counters by analyzing the malware in a sandbox environment, uncovering its secrets.
❓
What is the flag displayed in the popup window after the EDR detects the malware?
THM{GlitchWasHere}
❓
What is the flag found in the malstrings.txt document after running floss.exe, and opening the file in a text editor?
THM{HiddenClue}
Day 7
Oh, no. I'M SPEAKING IN CLOUDTRAIL!
🏆
The chaos continues as the SOC team grapples with anomalies in AWS CloudTrail logs. What’s causing these irregularities, and can the team trace the source before it escalates further?
❓
What is the other activity made by the user glitch aside from the ListObject action?
PutObject
❓
What is the source IP related to the S3 bucket activities of the user glitch?
53.94.201.69
❓
Based on the eventSource field, what AWS service generates the ConsoleLogin event?
signin.amazonaws.com
❓
When did the anomalous user trigger the ConsoleLogin event?
2024-11-28T15:21:54
❓
What was the name of the user that was created by the mcskidy user?
glitch
❓
What type of access was assigned to the anomalous user?
AdministratorAccess
❓
Which IP does Mayor Malware typically use to log into AWS?
53.94.201.69
❓
What is McSkidy's actual IP address?
31.210.15.79
❓
What is the bank account number owned by Mayor Malware?
2394 6912 7723 1294
Week 1 of TryHackMe’s Advent of Cyber 2024 set the stage for an exciting journey through the twists and turns of SOC-mas investigations. From unraveling OPSEC failures and tracking suspicious logins to analyzing vulnerabilities and malware, the challenges highlighted key skills in cybersecurity—vigilance, analysis, and creativity. As the SOC team tackled each scenario, they reminded us of the importance of staying sharp in a constantly evolving threat landscape.
The first week was just a taste of what’s to come. With more challenges on the horizon, the lessons learned here will no doubt build a strong foundation for the weeks ahead. Stay tuned as we continue to uncover the secrets of SOC-mas and dive deeper into the world of cybersecurity sleuthing. Until then, happy hacking!
Comments ()