TryHackMe - Volt Typhoon challenge (medium level)

 




Introduction

I’m publishing today a walkthrough of the new TryHackMe room named “Volt Typhoon” where you’re supposed to investigate a suspected intrusion by the notorious APT group Volt Typhoon.


What is Volt Typhoon?


       Volt Typhoon – also known as Vanguard Panda, Brronze Silhouette, Dev-0391, UNC3236, Voltzite, and Insidious Taurus – is a state-supported Chinese cyber operation that has compromised thousands of internet-connected devices.


How does it work?


      Volt Typhoon works by exploiting vulnerabilities in small and end-of-life routers, firewalls and virtual private networks (VPNs), often using administrator credentials and stolen passwords, or taking advantage of outmoded tech that hasn’t had regular security updates – key weaknesses identified in US digital infrastructure.


      In this challenge, we need as a security analyst investigate the intrusion realized by Volt Typhoon by retracing their steps over various log types from a two-week time frame during which the suspected attack occurred with Splunk.







Execution part :     


       In the Execution part, we’re told the following information : “Volt Typhoon is known to exploit Windows Management Instrumentation Command-line (WMIC) for a range of execution techniques.

       In the second question from this part we know that they’re using “ntdsutil” tool that is a “command-line tool that provides management facilities for Active Directory Domain Services (AD DS) and Active Directory Lightweight Directory Services (AD LDS).”



Defense Evasion:

      In the third question you can look also for the term "“HKEY” will be more easy.





I hope you enjoy with this challange !! 




Comments

Popular posts from this blog

TryHackMe - Threat Hunting Simulator - Health Hazard

TryHackMe - Typo Snare Threat Hunter Simulator (medium level)

Phishing Unfolding SIM (SOC Simulator TryHackMe)