Day 2: One man's false positive is another man's potpourri.
Welcome to Day 2 of the Advent of Cyber 2024 challenge by TryHackMe! Today’s challenge is all about analyzing logs to uncover suspicious activity and decode important details. Let's dive into the step-by-step walkthrough to solve the puzzle: “One man's false positive is another man's potpourri.”
Challenge Context
We are tasked with investigating suspicious login activities and commands related to Glitch, a key character in the Wareville storyline. By analyzing the logs, we aim to answer the given questions and understand how Glitch played a role in fixing the systems.
Step-by-Step Solution
Question 1: What is the name of the account causing all the failed login attempts?
- Analysis: By scanning the provided logs, we observed repeated login failures.
- Clue: The account responsible for the failed login attempts is consistently mentioned.
- Answer:
service_admin
Question 2: How many failed logon attempts were observed?
- Analysis: The log entries included multiple failed attempts. By filtering the logs for failed login events, we counted all occurrences.
- Answer:
6791
Question 3: What is the IP address of Glitch?
- Analysis: Logs indicate the unique IP address associated with Glitch’s activities. Filtering the logs based on Glitch's successful login events revealed the IP address.
- Answer:
10.0.255.1
Question 4: When did Glitch successfully log on to ADM-01?
- Analysis: By reviewing the successful logon entries for Glitch on the ADM-01 system, the timestamp was revealed.
- Answer:
Dec 1, 2024 08:54:39.000
Question 5: What is the decoded command executed by Glitch to fix the systems of Wareville?
- Analysis: Logs showed a command executed by Glitch. Decoding the command revealed its purpose in system repair.
- Command:
Install-WindowsUpdate -AcceptAll -AutoReboot
Explanation: This PowerShell command is used to install all pending Windows updates and automatically reboot the system once updates are applied.
Tools Used
- Log Filtering Tools: For analyzing and extracting relevant log entries.
- Regex and Grep: To filter and search specific keywords, IPs, and timestamps efficiently.
- Decoding Commands: Used scripting knowledge to understand encoded commands.
Key Takeaways
- Log analysis is a vital skill in cybersecurity.
- Tools like
grep
,awk
, andregex
are your best friends for filtering and analyzing logs efficiently. - PowerShell commands play a crucial role in system administration and attack remediation.
Conclusion
Day 2 of Advent of Cyber 2024 emphasized the importance of analyzing logs to uncover and mitigate suspicious activities. This walkthrough showcases the step-by-step approach to solving the questions while enhancing your skills in log analysis and cybersecurity incident response.
Stay tuned for more daily walkthroughs as we continue to secure Wareville and uncover Glitch’s journey!
Thank YOU
Comments
Post a Comment