{"id":1074,"date":"2025-11-25T01:53:11","date_gmt":"2025-11-25T01:53:11","guid":{"rendered":"https:\/\/epbrtcybersecurityportfolio.xyz\/?p=1074"},"modified":"2025-11-25T01:53:11","modified_gmt":"2025-11-25T01:53:11","slug":"detecting-traditional-attack-techniques","status":"publish","type":"post","link":"https:\/\/epbrtcybersecurityportfolio.xyz\/?p=1074","title":{"rendered":"Detecting Traditional Attack Techniques"},"content":{"rendered":"\n<p>This is Lab 1.1 for the SEC511 Class<\/p>\n\n\n\n<p>In this lab, I will be using Security Onion and little bit of Wireshark as well. The goal of the lab is to get some familiarity with the classic flow of traditional service side attack. We will also see some evidence of both Exploitation and Command and Control.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"266\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-37.png\" alt=\"\" class=\"wp-image-1078\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-37.png 600w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-37-300x133.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<p>I am given a date stamp for this exploit but looking at Security Onion&#8217;s Alert menu there are no Date Stamp listed there. Everything is grouped by the name of the alert and the name of the module that triggered the alert:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1003\" height=\"146\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-38.png\" alt=\"\" class=\"wp-image-1080\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-38.png 1003w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-38-300x44.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-38-768x112.png 768w\" sizes=\"auto, (max-width: 1003px) 100vw, 1003px\" \/><\/figure>\n\n\n\n<p>To see more details, I am first going to click &#8220;Ungroup&#8221; <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"488\" height=\"433\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-39.png\" alt=\"\" class=\"wp-image-1082\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-39.png 488w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-39-300x266.png 300w\" sizes=\"auto, (max-width: 488px) 100vw, 488px\" \/><\/figure>\n\n\n\n<p>Now, it is going to show us some additional fields:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"181\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-40-1024x181.png\" alt=\"\" class=\"wp-image-1084\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-40-1024x181.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-40-300x53.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-40-768x136.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-40.png 1030w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>I can use the Timestamp field to look at the date we are looking for or I can use the search tab to search for a specific date: <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"628\" height=\"504\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-41.png\" alt=\"\" class=\"wp-image-1086\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-41.png 628w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-41-300x241.png 300w\" sizes=\"auto, (max-width: 628px) 100vw, 628px\" \/><\/figure>\n\n\n\n<p>3 alerts were generated on that day:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"188\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-42-1024x188.png\" alt=\"\" class=\"wp-image-1088\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-42-1024x188.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-42-300x55.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-42-768x141.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-42.png 1034w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Given the rule names that were triggered, it looks like the service that was compromised is SSH. To determine the attacker and victim IP addresses, I can expand these alerts. Looking at the first alert, we have a Destination IP address and Port of:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"489\" height=\"74\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-43.png\" alt=\"\" class=\"wp-image-1090\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-43.png 489w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-43-300x45.png 300w\" sizes=\"auto, (max-width: 489px) 100vw, 489px\" \/><\/figure>\n\n\n\n<p>And the Source IP and Port are:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"469\" height=\"70\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-44.png\" alt=\"\" class=\"wp-image-1093\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-44.png 469w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-44-300x45.png 300w\" sizes=\"auto, (max-width: 469px) 100vw, 469px\" \/><\/figure>\n\n\n\n<p>It is weird that the source port is 22 as I would expect it to be the source port in this exploit. Looking at the alert rule:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1010\" height=\"59\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-45.png\" alt=\"\" class=\"wp-image-1095\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-45.png 1010w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-45-300x18.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-45-768x45.png 768w\" sizes=\"auto, (max-width: 1010px) 100vw, 1010px\" \/><\/figure>\n\n\n\n<p>I see alert ssh $HOME_NET. The alert is coming from the network we are trying to protect (HOME_NET). The source IP is therefore the victim IP while the attacker IP is the destination IP. Looking at the second alert (the one named ET exploit), I see these same two IP addresses. <\/p>\n\n\n\n<p>Now, I have to identify the stage 2 executable download. After the adversary successfully exploited the SSH service, they usually want to expand their capabilities to. Pushing an executable to a compromised box that could do C2 and persistence or keystroke logging, is one of the ways for attacker to achieve this goal. The third rule in Security Onion is called ET info Executable. Expanding this rule, I see the same IPs involved but it is a different session from the first two rules (the source and destination port numbers are different). To look at the packet itself, I can left-click on the alert, click on the Actions menu and select PCAP:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"889\" height=\"253\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-46.png\" alt=\"\" class=\"wp-image-1106\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-46.png 889w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-46-300x85.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-46-768x219.png 768w\" sizes=\"auto, (max-width: 889px) 100vw, 889px\" \/><\/figure>\n\n\n\n<p>We see the victim IP address (192.168.225.204) reaching out to the attacker IP address on an unexpected port (5115)<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"196\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-47-1024x196.png\" alt=\"\" class=\"wp-image-1109\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-47-1024x196.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-47-300x57.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-47-768x147.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-47.png 1378w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Switching to Wireshark to analyse this packet, we can follow the TCP stream to get a better understanding of what is going on from a payload perspective. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"235\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-48-1024x235.png\" alt=\"\" class=\"wp-image-1113\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-48-1024x235.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-48-300x69.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-48-768x177.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-48.png 1057w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Nothing really sticks out looking at the payload. If i switch from ASCII to an Hex Dump:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"729\" height=\"216\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-49.png\" alt=\"\" class=\"wp-image-1116\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-49.png 729w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-49-300x89.png 300w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/figure>\n\n\n\n<p>I can quickly find the signature that triggered the alert. This is our .elf executable file. Now, I have to carve it. To do this, in Wireshark, I am going to save what the server (the attacker) sent:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"484\" height=\"179\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-50.png\" alt=\"\" class=\"wp-image-1118\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-50.png 484w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-50-300x111.png 300w\" sizes=\"auto, (max-width: 484px) 100vw, 484px\" \/><\/figure>\n\n\n\n<p>and I am going to change the format to Raw and then save the file:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"666\" height=\"179\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-51.png\" alt=\"\" class=\"wp-image-1120\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-51.png 666w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-51-300x81.png 300w\" sizes=\"auto, (max-width: 666px) 100vw, 666px\" \/><\/figure>\n\n\n\n<p>All the data in this file is not of interest as we only care about carving the executable. We can use Bless to remove the data located before the executable. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"546\" height=\"30\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-52.png\" alt=\"\" class=\"wp-image-1123\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-52.png 546w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-52-300x16.png 300w\" sizes=\"auto, (max-width: 546px) 100vw, 546px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"757\" height=\"429\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-53.png\" alt=\"\" class=\"wp-image-1125\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-53.png 757w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-53-300x170.png 300w\" sizes=\"auto, (max-width: 757px) 100vw, 757px\" \/><\/figure>\n\n\n\n<p>From our alert, I know that the executable starts at 7F 45:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"319\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-54-1024x319.png\" alt=\"\" class=\"wp-image-1127\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-54-1024x319.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-54-300x93.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-54-768x239.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-54.png 1314w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>I can delete all the data located before simply by highlighting it and clicking on delete:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"381\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-55-1024x381.png\" alt=\"\" class=\"wp-image-1129\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-55-1024x381.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-55-300x112.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-55-768x286.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-55.png 1199w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p> I can this as a file again. To make sure the file we saved correspond to our executable, I can use the file command in Linux:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"961\" height=\"77\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-56.png\" alt=\"\" class=\"wp-image-1132\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-56.png 961w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-56-300x24.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-56-768x62.png 768w\" sizes=\"auto, (max-width: 961px) 100vw, 961px\" \/><\/figure>\n\n\n\n<p>It is indeed a ELF file and I can scan it with clamscan:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"895\" height=\"505\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-57.png\" alt=\"\" class=\"wp-image-1135\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-57.png 895w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-57-300x169.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-57-768x433.png 768w\" sizes=\"auto, (max-width: 895px) 100vw, 895px\" \/><\/figure>\n\n\n\n<p>It tells us that this a Unix Trojan executable. <\/p>\n\n\n\n<p>The lab&#8217;s last question is regarding the identification of C2 traffic. I am looking for communication during this same time frame. This network traffic was not associated with an actual alert. Once thing I can use in Security Onion that could help with this is the Hunt menu. If I left-click on the victim IP address, select action and click Hunt:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"482\" height=\"200\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-58.png\" alt=\"\" class=\"wp-image-1142\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-58.png 482w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-58-300x124.png 300w\" sizes=\"auto, (max-width: 482px) 100vw, 482px\" \/><\/figure>\n\n\n\n<p>The Hunt screen is going to give a lot more details regarding events associated with this IP address on this day: <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"348\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-59-1024x348.png\" alt=\"\" class=\"wp-image-1144\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-59-1024x348.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-59-300x102.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-59-768x261.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-59.png 1035w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>We first see the ssh exploitation in this events list with the attacker IP address interacting with our victim over port 22.<\/p>\n\n\n\n<p>Going down this list, we see a second session corresponding to the ELF file download: <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"95\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-60-1024x95.png\" alt=\"\" class=\"wp-image-1147\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-60-1024x95.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-60-300x28.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-60-768x72.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-60.png 1331w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>After this, I see something different were the compromised system reaches out to the attacker IP address on port 8888:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"190\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-61-1024x190.png\" alt=\"\" class=\"wp-image-1149\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-61-1024x190.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-61-300x56.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-61-768x143.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/11\/image-61.png 1077w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>I see that one of these events comes from the Zeek.ssl data set which means that Zeek identified it as a TLS encrypted communication which would make sense for C2 traffic as it often occurs over a TLS channel. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is Lab 1.1 for the SEC511 Class In this lab, I will be using Security Onion and little bit of Wireshark as well. The goal of the lab is to get some familiarity with the classic flow of traditional service side attack. We will also see some evidence of both Exploitation and Command and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1074","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/posts\/1074","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1074"}],"version-history":[{"count":5,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/posts\/1074\/revisions"}],"predecessor-version":[{"id":1153,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/posts\/1074\/revisions\/1153"}],"wp:attachment":[{"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1074"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1074"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}