TRANSCRIPTEnglish

PSExec Hunt Lab Cyberdefenders

9m 23s1,314 words193 segmentsEnglish

FULL TRANSCRIPT

0:00

hello everyone so today we will do a

0:02

quick lab by sa Defenders called the PS

0:05

exec hunt lab so I already did it but

0:08

let's let's do it together so let's

0:11

start by reading the scenario so the

0:14

scenario says an alert from the

0:16

intrusion detection system flag

0:18

suspicious lateral movement activity

0:20

involving P exit this indicates

0:23

potential unauthorized access and

0:25

movement across the network the sock

0:27

analyst your task is to investigate the

0:29

provided pickup file to trace the attack

0:32

activities identify the entry point the

0:35

mching target the extent of the bridge

0:37

and critical indicator that repal the

0:40

tactics and objective within the

0:42

compromised environment right so here we

0:44

have seven

0:45

question let's start by answering it

0:48

them all right so uh of course after you

0:52

download the files and you know here we

0:54

have the password after you download the

0:56

files it will have the pickup file and

0:59

yeah just for your understanding for

1:01

those who don't know for those who don't

1:03

know P PSX is basically a command line

1:06

tool that allow users to run programs on

1:08

remote system and so you know this can

1:10

be used by you on at the same time it

1:13

can also be abused by attackers if they

1:15

were successful in compromising you so

1:18

let's start so number one says question

1:20

number one uh says to effectively Trace

1:23

theack activities within our Network can

1:25

you identify the IP address of the

1:27

machine from which the attack in

1:29

initially gained access all right here

1:31

so here we have the pickup files so

1:35

let's let's have a look at the

1:38

statistics conversations and ip4 so as

1:41

you can see here you know um as you can

1:45

see for this this IP is a bit suspicious

1:48

because you know the number of bucket

1:51

the number of bucket here is huge

1:54

8,284 all right

1:56

so so this might be the IP address in

2:00

order to double check for those who

2:02

don't know PS exit use the SMB protocol

2:06

you know for for lateral movement so if

2:10

you can search for sb2 and look at the

2:14

statistics um conversation ipv4 and so

2:19

indeed you can see that the the IP or

2:22

the source IP is actually

2:25

10.0.0 one. 130 all right so it's trying

2:28

to access 1 131 and 133 so indeed the

2:32

initial compromise was uh started by

2:37

this IP address 10.0.0

2:40

130 all

2:42

right here it is 130 question number two

2:46

to fully understand the extent of the

2:47

breach can you determine the MCH and

2:50

host name to which the attaka first

2:52

privated okay all right so coming back

2:56

to our bucket

2:58

capture all right smb2 as you can see

3:02

here okay here um here we have 130

3:08

negotiating protocol request negotiating

3:10

protocol response session set up until

3:13

negotiate all right status more

3:16

processing all right so we can assume

3:18

that it first started to compromise this

3:21

MCH this uh this IP address or this

3:23

machine 10.0.0 to 133 all right so there

3:27

will be a session setup request all

3:29

right and then it's authent

3:31

authenticated using the user SSL so um

3:35

we can follow the TCP

3:39

stream all right and what was the

3:41

question they're asking the host name so

3:44

the host name is uh easily we can draw

3:49

from here the host name is indeed here

3:52

sales

3:54

PC sorry this one sales PC is the host

3:58

name of the machine that was initially

4:01

compromised all right

4:03

so M yes okay so the answer is

4:08

indeed sales PCR question number three

4:13

knowing the username of the account the

4:15

attacker used for authentication will

4:17

give us insights into the extent of the

4:19

breach so what's the username utilized

4:22

by the attacker from the authentication

4:24

so here as we have seen the username

4:27

that has been used to uh comp compromise

4:30

this host name or use for authentication

4:32

is here SS cells this one yeah this is

4:37

the

4:38

username that has been

4:41

utilized all right we can check

4:46

here yeah think host PC account ssls

4:51

right so yeah this is the username SS

4:57

CS indeed SS CS question number four

5:01

After figuring out how the attackers

5:03

moved with with within our Network we

5:06

need to know what did what the what they

5:11

did on the taret machine what's the name

5:13

of the service executable the attacker

5:15

set up on the target so uh as you can

5:19

see uh the has inter process

5:23

communication and then he got admin

5:27

access all right and then he he created

5:31

as you can

5:32

see uh three connect he

5:36

created he created a request file with

5:40

the PSX exe and then he got a

5:45

response you know successfully so we can

5:48

assume that the file that he tried to

5:51

upload or tried to uh set up is PS exit

5:56

we can also double check by going to

5:58

file EXP Port

6:02

objects yeah sorry and then we look at

6:05

the S SMP so as you can see here file

6:08

name

6:09

PSX as you can see so yeah this is the

6:12

answer PSX is indeed the

6:15

answer yeah

6:17

correct

6:19

okay question number five we need to

6:22

know how the attack install the service

6:24

on the compromised machine to understand

6:25

the attacker lateral movement tactics

6:28

this can help identify Al affect the

6:30

system which network share use was used

6:33

by PSX to install the service on the

6:36

target machine all right so normally to

6:38

install Services you need you know some

6:41

kind of uh admin access right so uh we

6:45

can look at if we look at this file if

6:47

you click here at PS exit Okay and we

6:51

look down here we can see at the three

6:53

ID we have 10.0.0 23 admin this is the

6:58

network share that has been used by the

6:59

user admin dollar sign and it's actually

7:03

here this one this is the so this is the

7:06

network share that was utilized by

7:08

attacker right so yeah it's

7:11

admin all right and we question number

7:15

six says we must identify the network

7:17

share used to communicate between the

7:20

two machine which network share did PSX

7:23

used for communication and of course

7:26

this is like the uh this is interprocess

7:29

communication

7:31

ipcs you can check this by going to down

7:35

we have it

7:36

here we have it here already is IPC but

7:40

also to double check that we can look

7:42

for the set ID down down down maybe yeah

7:47

this one

7:49

s yeah this one STD i n all right and if

7:53

you look at here the three ID here we

7:56

can have the interprocess communication

7:59

is set so this is the uh this is the

8:04

network share that was used for

8:07

communication question number seven

8:10

says now that we have a clearer picture

8:13

of the attack activities on the

8:14

compromise machine it's important to

8:17

identify any further lateral movement

8:19

what's the host name of the second

8:20

machine the attacker targeted and pivate

8:24

within our Network all right so as we

8:26

have you know pointed in the first part

8:30

that when you look at the conversations

8:32

we have here two IP address the first

8:34

one which was the initial compromise or

8:37

was of this IP address and the second

8:39

one is actually this one 131 okay but to

8:42

double check let's apply this as a

8:44

filter and selected it to be all right

8:47

so we can have it here this one 13 to

8:51

131 let's follow TCB stream to know

8:55

what's the name of the host name so as

8:58

you can see here the host name is

9:00

marketing PC yeah marketing PC this is

9:04

the name of the second machine that was

9:07

compromized or you know went lateral

9:09

movement so yeah this is the name of the

9:12

second machine so yeah I hope you

9:14

enjoyed this lab was a quick lab and you

9:17

know

9:18

informative you see you in the next one

UNLOCK MORE

Sign up free to access premium features

INTERACTIVE VIEWER

Watch the video with synced subtitles, adjustable overlay, and full playback control.

SIGN UP FREE TO UNLOCK

AI SUMMARY

Get an instant AI-generated summary of the video content, key points, and takeaways.

SIGN UP FREE TO UNLOCK

TRANSLATE

Translate the transcript to 100+ languages with one click. Download in any format.

SIGN UP FREE TO UNLOCK

MIND MAP

Visualize the transcript as an interactive mind map. Understand structure at a glance.

SIGN UP FREE TO UNLOCK

CHAT WITH TRANSCRIPT

Ask questions about the video content. Get answers powered by AI directly from the transcript.

SIGN UP FREE TO UNLOCK

GET MORE FROM YOUR TRANSCRIPTS

Sign up for free and unlock interactive viewer, AI summaries, translations, mind maps, and more. No credit card required.