[THM Walkthrough] Cyber Kill Chain
This is a full walkthrough with answers and explanations for the TryHackMe room "Cyber Kill Chain".
Link to the room: https://tryhackme.com/room/cyberkillchainzmt.
[Task 2] Reconnaissance
What is the name of the Intel Gathering Tool that is a web-based interface to the common tools and resources for open-source intelligence?
1
OSINT Framework
Open source intelligence (OSINT) is the act of gathering and analyzing publicly available data for intelligence purposes.
OSINT Framework- OSINT Framework provides the collection of OSINT tools based on various categories
What is the definition for the email gathering process during the stage of reconnaissance?
1
email harvesting
Email harvestingis the process of obtaining email addresses from public, paid, or free services.
[Task 3] Weaponization
This term is referred to as a group of commands that perform a specific task. You can think of them as subroutines or functions that contain the code that most users use to automate routine tasks. But malicious actors tend to use them for malicious purposes and include them in Microsoft Office documents. Can you provide the term for it?
1
Macro
Macrosare really just procedures. They are a group of commands that perform a specific task. You can think of them as functions or subroutines.
[Task 4] Delivery
This term is referred to as a group of commands that perform a specific task. You can think of them as subroutines or functions that contain the code that most users use to automate routine tasks. But malicious actors tend to use them for malicious purposes and include them in Microsoft Office documents. Can you provide the term for it?
1
Watering hole attack
A
watering hole attackis a targeted attack designed to aim at a specific group of people by compromising the website they are usually visiting and then redirecting them to the malicious website of an attacker’s choice.
[Task 5] Exploitation
Can you provide the name for a cyberattack targeting a software vulnerability that is unknown to the antivirus or software vendors?
1
Zero-day
According to FireEye, “the
zero-dayexploit or a zero-day vulnerability is an unknown exploit in the wild that exposes a vulnerability in software or hardware and can create complicated problems well before anyone realizes something is wrong. Azero-dayexploit leaves NO opportunity for detection at the beginning.”
[Task 6] Installation
Can you provide the technique used to modify file time attributes to hide new or changes to existing files?
1
Timestomping
The
Timestompingtechnique lets an attacker modify the file’s timestamps, including the modify, access, create and change times.
Can you name the malicious script planted by an attacker on the webserver to maintain access to the compromised system and enables the webserver to be accessed remotely?
1
Web shell
A
web shellis a malicious script written in web development programming languages such as ASP, PHP, or JSP used by an attacker to maintain access to the compromised system. Because of theweb shellsimplicity and file formatting (.php, .asp, .aspx, .jsp, etc.) can be difficult to detect and might be classified as benign.
[Task 7] Command & Control
What is the C2 communication where the victim makes regular DNS requests to a DNS server and domain which belong to an attacker.
1
DNS Tunneling
The infected machine makes constant DNS requests to the DNS server that belongs to an attacker, this type of C2 communication is also known as
DNS Tunneling.
[Task 8] Actions on Objectives (Exfiltration)
Can you provide a technology included in Microsoft Windows that can create backup copies or snapshots of files or volumes on the computer, even when they are in use?
1
Shadow Copy
Shadow Copyis a Microsoft technology that can create backup copies, snapshots of computer files, or volumes.
[Task 9] Practice Analysis
What is the flag after you complete the static site?
1
THM{7HR347_1N73L_12_4w35om3}
Complete the cyber kill chain.