TryHackMe - Volt Typhoon challenge (medium level)
Introduction
I’m publishing today a walkthrough of the new TryHackMe room named “Volt Typhoon” where you’re supposed to investigate a suspected intrusion by the notorious APT group Volt Typhoon.
What is Volt Typhoon?
Volt Typhoon – also known as Vanguard Panda, Brronze Silhouette, Dev-0391, UNC3236, Voltzite, and Insidious Taurus – is a state-supported Chinese cyber operation that has compromised thousands of internet-connected devices.
How does it work?
Volt Typhoon works by exploiting vulnerabilities in small and end-of-life routers, firewalls and virtual private networks (VPNs), often using administrator credentials and stolen passwords, or taking advantage of outmoded tech that hasn’t had regular security updates – key weaknesses identified in US digital infrastructure.
In this challenge, we need as a security analyst investigate the intrusion realized by Volt Typhoon by retracing their steps over various log types from a two-week time frame during which the suspected attack occurred with Splunk.
Execution part :
In the Execution part, we’re told the following information : “Volt Typhoon is known to exploit Windows Management Instrumentation Command-line (WMIC) for a range of execution techniques.
In the second question from this part we know that they’re using “ntdsutil” tool that is a “command-line tool that provides management facilities for Active Directory Domain Services (AD DS) and Active Directory Lightweight Directory Services (AD LDS).”
Defense Evasion:
In the third question you can look also for the term "“HKEY” will be more easy.
I hope you enjoy with this challange !!

Comments
Post a Comment