How to Be an Excellent Blue Team Member (Internal Network Part)

0 18
0x00 PrefaceWith the opening of the two-month-long network defense action, so fa...

0x00 Preface

With the opening of the two-month-long network defense action, so far, many units have suffered from red team penetration attacks such as phishing, poisoning, and lateral movement. Last time we mentionedHow to Be an Excellent Blue Team Member (External Network Part)This article still refers to the ATT&CK model and actual cases to describe the execution, persistence, and privilege escalation modules, draw and analyze the attack techniques, find and defend against the threats brought by the internal network.

0x01 Execution

Analysis of Attack Techniques

In the execution phase, the main threats faced are two, namely, fileless Webshell (memory horse) and execution of entity malicious software. We will analyze the possible alarms from the network level and strike them accurately.

1. Traffic Mining

How to Be an Excellent Blue Team Member (Internal Network Part)

Different from the footprinting, penetration, and other attacks on the external network, the transmission at the execution level is mainly documents, programs, images, and scripts, with obvious alarm features. It is advisable to focus on finding upload ports and auditing uploaded files.

Analysis Indicators
1.1 Summary of Situation Awareness
Currently, most of the situation awareness on the market can be achieved through the assets and interfaces existing in traffic mapping systems, such as Weibu, DeepinServe Situation Awareness, Tianyan, and other products, which can audit files by sorting out the upload interfaces.
Screenshot_20240809163326.png

1.2 Traffic Packet Feature Search
If the function does not exist in the situation awareness, it can also be manually discovered and sorted according to the features. The following is a form of upload type:

POST /upload HTTP/1.1
Host: xxxx
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryxJoimunuCt1r2RmT
Accept: application/json, text/plain, */*
Connection: close

------WebKitFormBoundaryxJoimunuCt1r2RmT

Content-Disposition: form-data; name="file.exe"

50 4b (hexadecimal is used for demonstration convenience, and the actual traffic packet is ascii characters)
------WebKitFormBoundaryxJoimunuCt1r2RmT

By analyzing the form, searches can be performed for the upload ports through the following features

Content-Type: multipart/form-data; 
------WebKitFormBoundary
name="file"
504b file headers (hexadecimal search)

Sandbox Analysis
After obtaining suspected malicious files, the files should be packaged to avoid secondary infection. In the network defense environment, in addition to the deep analysis of virus files for special needs, the most commonly used method is to scan and kill attacks through sandboxes or virus scanners. Once suspicious behavior is detected, it can be directly blocked and intercepted to save manual time. The following are commonly used malicious software analysis websites:

VirSCAN: https://www.virscan.org
VirusTotal: https://www.virustotal.com
NoDistribute: http://nodistribute.com
Weibuyun Online Cloud Sandbox: https://s.threatbook.cn
Tencent Habo Analysis System: https://habo.qq.com
Qianxin Threat Intelligence Center: https://ti.qianxin.com
Great Sage Cloud Sandbox Detection System: https://mac-cloud.riskivy.com

Pasted image 20240809165035.png

2. Defense Techniques

Needle

你可能想看:

4.5 Main person in charge reviews the simulation results, sorts out the separated simulation issues, and allows the red and blue teams to improve as soon as possible. The main issues are as follows

5. Collect exercise results The main person in charge reviews the exercise results, sorts out the separated exercise issues, and allows the red and blue sides to improve as soon as possible. The main

Internal and external cultivation | Under the high-confrontation offensive and defensive, internal network security cannot be ignored

Completely separable two-dimensional vector graph encryption domain robust reversible watermark algorithm (Part 1)

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

HTTP data packets & request methods & status code judgment & brute force encryption password & exploiting data packets

Grade Protection Evaluation: Detailed Explanation of CentOS Login Failure Parameters and Two-Factor Authentication

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

Git leak && AWS AKSK && AWS Lambda cli && Function Information Leakage && JWT secret leak

最后修改时间:
admin
上一篇 2025年03月29日 16:33
下一篇 2025年03月29日 16:55

评论已关闭