Bruteforce
Scenario
One of our system administrators identified a large number of Audit Failure events in the Windows Security Event log.
There are a number of different ways to approach the analysis of these logs! Consider the suggested tools, but there are many others out there
Solution
-
How many Audit Failure events are there? (Format: Count of Events) (3 points)
Command:
cat BTLO_Bruteforce_Challenge.txt | grep "Audit Failure" | wc
Answer:
3103
-
What is the username of the local account that is being targeted? (Format: Username) (2 points)
Opening the file immediately shows "Account For Which Logon Failed", and the associated username is
administrator
.Answer:
administrator
-
What is the failure reason related to the Audit Failure logs? (Format: String) (3 points)
Answer:
Unknown user name or bad password
-
What is the Windows Event ID associated with these logon failures? (Format: ID) (3 points)
Answer:
4625
-
What is the source IP conducting this attack? (Format: X.X.X.X) (3 points)
Given by the "Source Network Address" field.
Answer:
113.161.192.227
-
What country is this IP address associated with? (Format: Country) (3 points)
Look up the location IP: https://whatismyipaddress.com/ip/113.161.192.227
Answer:
Vietnam
-
What is the range of source ports that were used by the attacker to make these login requests? (LowestPort-HighestPort - Ex: 100-541) (3 points)
Command:
cat BTLO_Bruteforce_Challenge.txt | grep "Source Port" | grep -o '[[:digit:]]*' | sort -g
Answer:
49162-65534