PrintNightmare

PrintNightmare

Tags
forensic
ID matched
Created
May 1, 2023 09:25 PM
Last Updated
Last updated July 15, 2023
ย 
ย 
ย 

์‚ฌ์ „ ์ค€๋น„

ย 

ํ’€์ด

Q1. Looking through the alerts in Brim, what is the vulnerability name and its corresponding CVE?
  • suricata.rules ํŒŒ์ผ์—์„œ ๋‚ด์šฉ ํ™•์ธ
    • notion image
์ •๋‹ต
PrintNightmare, CVE-2021-34527
ย 
Q2. What is Attacker's IP?
  • Ports ํƒญ ๋ชฉ๋ก์—์„œ IP ํ™•์ธ
    • notion image
์ •๋‹ต
10.10.10.4
ย 
Q3. What is Attacker's share path?
  • challenge-v1.pcapng ํŒŒ์ผ์—์„œ ๋‚ด์šฉ ํ™•์ธ
    • notion image
์ •๋‹ต
\\10.10.10.2\share
ย 
Q4. What is the name of the malicious DLL file hosted by the attacker?
  • challenge-v1.pcapng ํŒŒ์ผ์—์„œ ๋‚ด์šฉ ํ™•์ธ
    • notion image
์ •๋‹ต
notsostealthy.dll
ย 
Q5. What is the sha256 hash of the DLL file?
  • notsostealthy.dll ํŒŒ์ผ์„ ๊ฒ€์ƒ‰ํ•œ ํ›„, MD5 ํ•ด์‰ฌ๊ฐ’ ํ™•์ธ
    • notion image
  • VirusTotal์—์„œ sha256 ํ™•๋ณด
    • notion image
์ •๋‹ต
fa1ee835869ea97559359568043aea3a52508b360cfc5195a3d7fbb60cef55a5
ย 
Q6. What is the email address used for the self-signed SSL Certificate in the traffic?
  • challenge-v1.pcapng ํŒŒ์ผ์—์„œ ๋‚ด์šฉ ํ™•์ธ
    • notion image
      notion image
์ •๋‹ต
override@shields.mertz.net
ย 
Q7. What is the domain user used by the attacker to exploit the vulnerability?
  • Users ํƒญ์—์„œ ํ™•์ธ
    • notion image
์ •๋‹ต
BELLYBEAR\Jesse.Harmon
ย 
Q8. What is the exploit server's hostname?
  • Users ํƒญ์—์„œ ํ™•์ธ
    • notion image
์ •๋‹ต
WIN-FLO4EU2VMSM
ย 
Q9. What is the username created by the attacker for persistence?
  • Users ํƒญ์—์„œ ํ™•์ธ
    • notion image
์ •๋‹ต
hacker
ย 
Q10. What is the event ID for user creation in Windows, and when was the user being created?
  • ์‚ฌ์šฉ์ž ์ƒ์„ฑ Event ID๋กœ ๊ฒ€์ƒ‰
    • notion image
์ •๋‹ต
4720, 2021-08-16 19:31:46Z
ย 
Q11. What process name is used to establish the shell connection between the attacker's machine and the Windows server? and what is the listening port on the attacker's machine?
  • ๋„คํŠธ์›Œํฌ ์ ‘์†์„ ํ•˜๋Š” ํ”„๋กœ์„ธ์Šค ๋ฐœ๊ฒฌ
    • notion image
์ •๋‹ต
rundll32.exe, 443
ย 
Q12. The attacker used a famous post-exploitation framework to create the DLL file and establish the shell connection to the Windows server, what is the payload the attacker used?
์ •๋‹ต
windows/meterpreter/reverse_https
ย 
Q13. The attacker left a text file for the user Administrator, can you find what the filename is?
  • FileSystem์—์„œ ํŒŒ์ผ ํ™•์ธ
    • notion image
์ •๋‹ต
This-Is-Really-A-Nightmare.txt
ย 
ย 

์ฐธ๊ณ 

ย