Section 1.5: Hunting Across the Enterprise Flashcards

1
Q

Name the three types of scripting Incident Responders have used.

A

Batching (not recommended), WMI, and Powershell.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the name of the script Powershell can run benefit from by running a collection of WMI commands for Incident Response?

A

PoSh-R2 project on Github.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Powershell’s transfer protocol when working remotely and why is it effective?

A

Powershell uses WS-Management (WSMAN) protocol which uses SOAP, XML, and HTTP listeners to pass through packet inspection devices. Even though it is HTTP, the data transferred is encrypted and credentials are authenticated via Kerberos.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Are credentials cached on the remote system when using Enter-PSSession command?

A

No.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name some security features Powershell has that are set as default when remoting.

A

Tokens are non-delegated by default and it is non-interactive to the remote system which means it does not cache credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name a method analysts should never use with Powershell.

A

Dual-hop authentication (jumping from one remote system to another), as it can store credentials via CredSSP. Do not enable CredSSP on Powershell.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens if I don’t supply a list of remote systems (targets) to Kansa?

A

It will query Domain Controllers and build the list automatically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is inside the Kansa modules.config file?

A

Configuration of the modules I want to run and in what order. Consider volatility as priority when doing so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Kansa’s analysis folder has scripts for conducting basic analysis of the collected data and stacking. What is needed to fully function the scripts?

A

The binary logparser.exe is needed so place it in this folder. Use -analysis when running Kansa to get analysis output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What issue do rootkits cause when retrieving live response collections?

A

It can subvert API functions of the system to return incomplete data. A lot of live tools depend on API functions. To handle combat this, memory and disk forensics is necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Where can I store third party tools inside Kansa?

A

Place them inside .\Modules\bin
Use- pushbin to use it and -rmbin to remove it. Make sure to add a special comment on the second line of the collector script (#BINDEP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name the Kansa modules that depend on third party tools.

A

Autorunsc, CertStore, FlsBodyfile, Handle, ProcDump, and RekalPslist scripts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do the Kansa “Meta” scripts look for?

A

“Meta” searches for file size indicators or output size deviations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly