lab 36 Flashcards

1
Q

List any external IP addresses you find?

Filter used:
!(ip.src == 10.0.0.0/8 || ip.src == 172.16.0.0/12 || ip.src == 192.168.0.0/16)

Explanation:
This filter excludes internal (private) IP addresses:

10.0.0.0/8
172.16.0.0/12
192.168.0.0/16
It displays only external (public) IP addresses in the traffic.

External IP found:
75.30.5.55

A

75.30.5.55

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Display and Document the IPv4 Address
Filter/Command used:
ipconfig

Explanation:
This command retrieves the network configuration details of the system, including the IPv4 address, subnet mask, and default gateway.

Findings:

IPv4 Address: 10.10.1.5
Subnet Mask: 255.255.255.0
Default Gateway: 10.10.1.1

Action: Record these values for reference.

A

10.10.1.5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Display Active Connections
Filter/Command used:
netstat -ano

Explanation:
This command lists all active network connections and listening ports.

Foreign Address (unusual): 75.30.5.55:1337
associated port #: 1337
State: ESTABLISHED
PID: 6668

A

1337

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Check for Unauthorized Accounts
Filter/Command used:
net user

Explanation:
This command lists all user accounts on the system, allowing identification of unauthorized or anomalous accounts.

Look for:
Accounts not following the organization’s naming convention.
Unexpected admin accounts.
Accounts created at unusual times.

Findings:

Accounts Found:
Adm1nistrator (admin)
Administrator (admin)
DefaultAccount (guest)
WDAGUtilityAccount (guest)

A

Adm1nistrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List Running Processes and Investigate Services
Filter/Command used:

To list running processes: tasklist
To list services: net start
Explanation:

List Running Processes:
The tasklist command displays all active processes with their names, PIDs, and memory usage.
Analyze the list for:

Unknown or suspicious process names (e.g., random strings, unfamiliar applications).
Processes consuming unusually high resources.
Processes tied to the external IP address from #2 (75.30.5.55:1337, PID 6668).
Odd characteristics in process names (e.g., obfuscation like “0” instead of “o”).

Suspicious Process: WinT0Ols.exe
Session Type: Console session.
Memory Usage: 24,168 K.
Unusual Name Format: Uses “0” instead of “o.”

A

WinT0Ols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

On which packet number does the attack start?

28
62
75
103

A

28

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What protocol is being used in the attack?

HTTP x
SSHv2
ICMP
TCP

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Retrieve the Security Onion VM’s IP Address
Filter/Command used:
To retrieve the primary IP address of the

ens32 interface:
bash
Copy code
ip a | grep ens32

Explanation:
The ip a command lists all network interfaces and their IP addresses.
The grep ens32 filter extracts only the lines related to the ens32 interface.

Steps:
Run ip a | grep ens32 in the terminal.

Findings:
Primary IP Address of ens32: 10.10.1.55
Subnet Mask: /24 (255.255.255.0)

A

10.10.1.55

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of encryption is being used on the compromised data?

RSA x
AES
None
SFTP

A

None

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following, based on the exploit, is the malware type? Select the correct answer.

Worm
Rootkit
Trojan
Spyware

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Locate the Process Using Task Manager (GUI Method)

Steps:
Log in to the Windows machine (10.10.1.5).
Open Task Manager:
taskbar and select Task Manager
Navigate to the Details tab.
Find the suspicious process WinT0Ols.exe
Right-click the process and select Open File Location.

Findings:
C:\Users\admin\Downloads\dist

A

C:\Users\admin\Downloads\dist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following were compromised? (Check all that apply)

Credit card numbers
Customer names
Social security numbers
Customer addresses

A

Customer names
Social security numbers
Customer addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is the data classification that is being exfiltrated? Select the correct answer.

PII, PHI, PCI
PII
PCI
PHI

A

PII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Disable / end the malicious application running on the Windows Server.

Open Command Prompt
Disable the account using the command:
bash
net user Adm1nistrator /active:no
net user Adm1nistrator
look for active:no

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Open Task Manager:
Right-click the taskbar and select Task
Navigate to the Details tab.
Find the malicious process WinT0Ols.exe
Right-click the process and select End Task.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is the Windows application that can be used to determine if the exploit resurfaces? Select the correct answer.

Microsoft Antivirus Toolkit
Task Scheduler
Task Manager
Explorer

A

Task Manager