Quiz Evasive and Post-Exploitation Attacks Flashcards
Why would an attacker digitally sign malware to evade endpoint security
Endpoint security may allow malware execution if the digital signature is trusted.
why:
An Attacker can try digitally signing their malware. A number of istances where trusted digital signatures were used by attackers have been a big art of modern malware, from stuxnet to flame to Duqu.
Which of the following Metasploit modules can be used for pivoting (lateral movement) through a compromised host?
Auxilliary/server/socks4a
why:
Attackers reuse their Command and Control (c2) access to pivot and gain access to new hosts in the network. A Powerful example of this is the Meterpreter C2 Framework, either deployed as part of the initial exploit or through an independent payload generated using MsfVenom. An Attacker can start a proxy server on their system with auxiliary/server/socks4a and relay traffic through the pivot (compromised host) by reusing the Meterpreter session with a new route to the internal target.
page 21 book 5
which of the following built-in commands allows port forwarding on Windows?
On Windows sytems, the netsh command has built in feature to start listening on an arbitrary port number and forwarding any activity to a remote IP address and TCP port. Unlike meterpreter portfwd or SSH tunneling, the listening port in this example is on the victim system itself, NOT the attacker system. An attacker can still use this for pivoting and to obscure the source of the attack on the network, but it requires that they can connect to the victim system on the listening port. wmic and route are built in commands, but they cannot be used for port forwarding;plink can be used for port forwarding but is not a built in Windows command
page 25, book 5
Which of the following defenses can help characterize data transfer totals and apps used after an attacker has exfiltrated data from a Windows victim host?
SRUM
why?
Following a compromise, incident responders can use System Resource Usage Monitor (SRUM) data to characterize data transfer tools by app name, which can be valuable for characterizing the amount of possible sources of data that are extracted from a compromised system. The other options are usefull defenses against data exfiltration, but none of them will characterize the data transfer totals in case of successful data exfiltration.
page 112 book 5
In Unix, which accounting file contains data about past user logins?
wtmp
why?
The wtmp file stores information about all users who have ever logged into the machine. The utmp file stores information about all users currently logged into the system. The btmp file stores information about bad login attempts (i.e; failures to properly authenticate). The lastlog file shows information associated with the most recent login time and date for each user.
page 66 book 5
A securit analyst is making a recommendation to help identify suspicious activity that attempts to alter log files on an organizations network. Which of the following will allow you to look at how a system or user typically functions?
Installing a tool that uses user and entity behavior analytics (UEBA)
why?
The approach here is to stop looking for specific events to be generated, and rather, look at the behvaior of a user on an IT asset as a whole. This is called user and entity behavior analytics (UEBA). This is an effective way to look for activities like a user account logging on to multiple systems at the same time or an account accessing thousands of files on a server.
page 78 book 5
Which of the following commands enables the forwarding of local port 8000 to host 10.10.10.100 on remote TCP port 80 through SSH?
One option for pivoting is to reuse existing capabilities on the compromised target systems. For Linux or UNIX systems, an SSH server offers many features for pivoting, allowing an attacker to leverage access to the SSH server to access other internal systems. One option is to setup a simple port forward through the pivot host to a specific target host and TCP port number. By running the command ssh -L 8000:10.10.10.100:80 victorimko@10.10.10.100, the attacker connects to the victim at 10.10.10.11 over SSH. logging in as the user victorimko. By specifying the -L argument, the attacker established a new listening port (8000) on his or her attacking system. When the attacker connects to local port 8000, the connection is forwarded through the SSH sesssion established with 10.10.10.11 to the 10.10.10.10.100 host on TCP port 80.
page 24 book 5
What is the name of the log-wiping utility in Metasploit that purges all log data from the event logs?
For many years, Meterpreter has included the built-in clearev command to purge data from the Windows event logs, but it does so while leaving an audit event behind that indicates that the event log had been cleared.
page 74 book 5.
Which of the following tools uses a Hi-Lo strategy, splitting a file into pieces and scanning it repeaditly until the smallest data chunk is found that triggers a threat alert?
Defender Check
why?
DefenderCheck is a tool that helps attackers evade the endpoint security tools of victims. DefenderCheck takes a file and scans it on a local Windows 10 system using Windows Defender. If Windows Defender raises an alert for thr target file as malicious, DefnderCheck will split the file in two and scan each piece independently, discarding the chunk of the file that does not trigger the alert. In this way, DefenderCheck plays a strange version of Hi-Lo, repeadifly splitting the file and scanning over and over until it achieves the smallest possible chunk that still raises an alert.
page 11 book 5
Which of the following locations in Linux contains the configuration for the system logger?
/etc
why?
On a UNIX system, the syslog procecss stores the logs for the system. The configuration for the system logger is found in the /etc/syslog.conf file. When a careful attacker takes over a system, he will look at this file to see where the system is configured to store its logs. These careful attacker will then modify the log files byh hand.
page 63 book 5
Which of the following tools is generally used by threat actors to extract victim passwords from memory dump files?
Mimikatz
why?
Mimikatz can extract passwords from the LSASS process on a victim by supplying the Procdump memory dump file as an argument to sekulsa::minidump command.
This is a common technique used by adversaries to collect data that achieves the same attack goal while evading detection. It has the disadvantage of requiring a larger data trasnfer (the Procdump memory capture for LSASS is approx 50MB) but has found recent widespread use as an efffective alternative to running Mimikatz on the victim system locally.
page 105 book 5
Ptunnel consists of which of the following two components
Client and proxy
why?
Ptunnel consists of two components. The Ptunnel client and the Ptunnel proxy. The Attacker configures the Ptunnel client to listen on a given TCP port on the localhost interface of the client machine. In adddition, the attacker must configure the Ptunnel proxy, which runs on an external machine, accessible via ping packets from the Ptunnel client. Finally, the attacker configures the Ptunnel client with a given ultimate destination address.
page 84 book 5.
What can the Ptunnel proxy use to authenticate the client
An MD5- based challenge response Authentication algorithm
why?
The Ptunnel proxy can be configured to authenticate the Ptunnel client using an MD5-based challenge/response authentication algorithm. Ptunnel does not currently support encryption;However, if the application using TCP-based connection encrypts the data (HTTPS or SSH) the attacker would have some degree of protection of the data.
page 84 book 5
What Utility can be used to display the ARP cache on UNIX machines and Windows Systems?
arp on both UNIX and Windows
why?
Misconfigured ARP entries may indicate sniffing on a switched network. To check from your local machine on Win32; type arp -a. to check on Unix type arp-a or arp -e depending on the UNIX vendor
page 56 book 5
Which of the following formats is more convenient for applying the ghostwriting evasion technique.
asm
why?
The first step for ghostwriting is to generate the binary the attacker wishes to manipulate, then convert the binary into raw format into asm source. While it may be possible to change a binary file in raw (binary) format, it is much easier to change it in asm source.
page 8 book 5