Post

[THM Walkthrough] Cyber Kill Chain

This is a full walkthrough with answers and explanations for the TryHackMe room "Cyber Kill Chain".

[THM Walkthrough] Cyber Kill Chain

Link to the room: https://tryhackme.com/room/cyberkillchainzmt.

[Task 2] Reconnaissance

What is the name of the Intel Gathering Tool that is a web-based interface to the common tools and resources for open-source intelligence?

1
OSINT Framework

Open source intelligence (OSINT) is the act of gathering and analyzing publicly available data for intelligence purposes. OSINT Framework - OSINT Framework provides the collection of OSINT tools based on various categories

What is the definition for the email gathering process during the stage of reconnaissance?

1
email harvesting

Email harvesting is the process of obtaining email addresses from public, paid, or free services.


[Task 3] Weaponization

This term is referred to as a group of commands that perform a specific task. You can think of them as subroutines or functions that contain the code that most users use to automate routine tasks. But malicious actors tend to use them for malicious purposes and include them in Microsoft Office documents. Can you provide the term for it?

1
Macro

Macros are really just procedures. They are a group of commands that perform a specific task. You can think of them as functions or subroutines.


[Task 4] Delivery

This term is referred to as a group of commands that perform a specific task. You can think of them as subroutines or functions that contain the code that most users use to automate routine tasks. But malicious actors tend to use them for malicious purposes and include them in Microsoft Office documents. Can you provide the term for it?

1
Watering hole attack

A watering hole attack is a targeted attack designed to aim at a specific group of people by compromising the website they are usually visiting and then redirecting them to the malicious website of an attacker’s choice.


[Task 5] Exploitation

Can you provide the name for a cyberattack targeting a software vulnerability that is unknown to the antivirus or software vendors?

1
Zero-day

According to FireEye, “the zero-day exploit or a zero-day vulnerability is an unknown exploit in the wild that exposes a vulnerability in software or hardware and can create complicated problems well before anyone realizes something is wrong. A zero-day exploit leaves NO opportunity for detection at the beginning.”


[Task 6] Installation

Can you provide the technique used to modify file time attributes to hide new or changes to existing files?

1
Timestomping

The Timestomping technique lets an attacker modify the file’s timestamps, including the modify, access, create and change times.

Can you name the malicious script planted by an attacker on the webserver to maintain access to the compromised system and enables the webserver to be accessed remotely?

1
Web shell

A web shell is a malicious script written in web development programming languages such as ASP, PHP, or JSP used by an attacker to maintain access to the compromised system. Because of the web shell simplicity and file formatting (.php, .asp, .aspx, .jsp, etc.) can be difficult to detect and might be classified as benign.


[Task 7] Command & Control

What is the C2 communication where the victim makes regular DNS requests to a DNS server and domain which belong to an attacker.

1
DNS Tunneling

The infected machine makes constant DNS requests to the DNS server that belongs to an attacker, this type of C2 communication is also known as DNS Tunneling.


[Task 8] Actions on Objectives (Exfiltration)

Can you provide a technology included in Microsoft Windows that can create backup copies or snapshots of files or volumes on the computer, even when they are in use?

1
Shadow Copy

Shadow Copy is a Microsoft technology that can create backup copies, snapshots of computer files, or volumes.


[Task 9] Practice Analysis

What is the flag after you complete the static site?

1
THM{7HR347_1N73L_12_4w35om3}

Complete the cyber kill chain.

This post is licensed under CC BY 4.0 by the author.