CVE-2020-3991 VMWare Security Advisory for VMWare Horizon Client - https://www.vmware.com/security/advisories/VMSA-2020-0022.html

Traffic Analysis Quiz: Ugly-Wolf.net

Published: 2020-10-16
Last Updated: 2020-10-16 03:51:07 UTC
by Brad Duncan (Version: 1)
2 comment(s)

Introduction

It's that time of the month again...  Time for another traffic analysis quiz!  This one is from a Windows 10 client logged into an Active Directory (AD) environment.  Details follow:

  • LAN segment:  10.10.16.0/24 (10.10.16.1 through 10.10.16.255)
  • Domain Controller:  Ugly-Wolf-DC at 10.10.16.6
  • Gateway:  10.10.16.1
  • Broadcast address:  10.10.16.255

The pcap and alerts are available on my Github repository at:

The zip archives are password-protected with the term: infected

The alerts archive contains an image of alerts and a text file with the same information.


Shown above:  Alerts image for this quiz, with the alerts blurred (you'll have to download the alerts file to see them).

The alerts file was created using Security Onion running Suricata using the EmergingThreats Pro ruleset, and the alerts were viewed using Sguil.

The alerts should give away the type of infection(s) happening on the Windows computer at ugly-wolf.net.  Since this is an AD environment, you should also be able to find the user account name that was logged into the Windows host before it became infected.  In a real-world situation, this could help you track down an infected user and perform incident response actions.

You can also use this quiz to practice drafting an incident report.

If the answers are not obvious, feel free to leave a comment in the comments section, and I'll answer when I get the time.

---
Brad Duncan
brad [at] malware-traffic-analysis.net

Keywords:
2 comment(s)
ISC Stormcast For Friday, October 16th 2020 https://isc.sans.edu/podcastdetail.html?id=7212

Comments


Diary Archives