{"id":1271,"date":"2026-02-03T23:15:29","date_gmt":"2026-02-03T23:15:29","guid":{"rendered":"https:\/\/epbrtcybersecurityportfolio.xyz\/?p=1271"},"modified":"2026-02-03T23:15:29","modified_gmt":"2026-02-03T23:15:29","slug":"sec511-defend-the-flag","status":"publish","type":"post","link":"https:\/\/epbrtcybersecurityportfolio.xyz\/?p=1271","title":{"rendered":"Sec511 Defend The Flag"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"424\" height=\"57\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-5.png\" alt=\"\" class=\"wp-image-1272\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-5.png 424w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-5-300x40.png 300w\" sizes=\"auto, (max-width: 424px) 100vw, 424px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"54\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-6.png\" alt=\"\" class=\"wp-image-1273\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-6.png 600w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-6-300x27.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<p>This was discussed in section 5 of the class, in the Monitoring Critical Windows Events chapter. This is event number 4737.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"108\" height=\"54\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-7.png\" alt=\"\" class=\"wp-image-1277\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"336\" height=\"43\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-8.png\" alt=\"\" class=\"wp-image-1279\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-8.png 336w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-8-300x38.png 300w\" sizes=\"auto, (max-width: 336px) 100vw, 336px\" \/><\/figure>\n\n\n\n<p>Discussed in 511.2, section: DNS Architecture and Encryption. It explicitly supports TCP port 853. However, the RFC allows for nonstandard ports.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"160\" height=\"59\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-9.png\" alt=\"\" class=\"wp-image-1283\" style=\"width:160px;height:auto\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"375\" height=\"36\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-10.png\" alt=\"\" class=\"wp-image-1285\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-10.png 375w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-10-300x29.png 300w\" sizes=\"auto, (max-width: 375px) 100vw, 375px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"156\" height=\"403\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-11.png\" alt=\"\" class=\"wp-image-1286\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-11.png 156w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-11-116x300.png 116w\" sizes=\"auto, (max-width: 156px) 100vw, 156px\" \/><\/figure>\n\n\n\n<p>HTTP\/3 uses the QUIC protocol, a protocol designed by Google that uses UDP ports 80 and 443. Both are encrypted but port 80 does not verify the server certificate. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"171\" height=\"48\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-12.png\" alt=\"\" class=\"wp-image-1289\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"297\" height=\"35\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-13.png\" alt=\"\" class=\"wp-image-1291\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"205\" height=\"473\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-14.png\" alt=\"\" class=\"wp-image-1293\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-14.png 205w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-14-130x300.png 130w\" sizes=\"auto, (max-width: 205px) 100vw, 205px\" \/><\/figure>\n\n\n\n<p>In the Att&amp;ck framework, Tactics represent the &#8216;why&#8217; of an Att&amp;ck technique and it indicates the goal of an adversary associated with that element of a larger intrusion campaign. Tactic TA006 is associated with Credential Access.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"689\" height=\"99\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-15.png\" alt=\"\" class=\"wp-image-1296\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-15.png 689w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-15-300x43.png 300w\" sizes=\"auto, (max-width: 689px) 100vw, 689px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"715\" height=\"36\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-16.png\" alt=\"\" class=\"wp-image-1297\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-16.png 715w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-16-300x15.png 300w\" sizes=\"auto, (max-width: 715px) 100vw, 715px\" \/><\/figure>\n\n\n\n<p>The attack surface reduction rules focus on blocking\/detecting apps engaging in suspicious behavior. When rules get fired due to this kind of behavior, an event will be written to the defendor log. An ASR rule firing and causing an activity to be blocked results in EventID 1121. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"279\" height=\"63\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-17.png\" alt=\"\" class=\"wp-image-1300\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"701\" height=\"107\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-18.png\" alt=\"\" class=\"wp-image-1301\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-18.png 701w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-18-300x46.png 300w\" sizes=\"auto, (max-width: 701px) 100vw, 701px\" \/><\/figure>\n\n\n\n<p>CloudTrail is part of the AWS Security Stack and it enables the monitoring of user, role, or services actions against AWS resources. It does this by capturing details of API calls associated with managing cloud resources. It is enabled by default. The CloudTrail Event History will contain the most recent 90 days of management events. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"257\" height=\"45\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-19.png\" alt=\"\" class=\"wp-image-1305\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"725\" height=\"56\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-20.png\" alt=\"\" class=\"wp-image-1307\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-20.png 725w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-20-300x23.png 300w\" sizes=\"auto, (max-width: 725px) 100vw, 725px\" \/><\/figure>\n\n\n\n<p>Beats are lightweight data shippers that you install as agents on your servers to send data to Elasticsearch. They use fewer system resources than Logstash.   Functionbeat is the beat that uses a serverless cloud data shipper. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"283\" height=\"55\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-21.png\" alt=\"\" class=\"wp-image-1310\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"714\" height=\"102\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-22.png\" alt=\"\" class=\"wp-image-1311\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-22.png 714w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-22-300x43.png 300w\" sizes=\"auto, (max-width: 714px) 100vw, 714px\" \/><\/figure>\n\n\n\n<p>Security onion is an open-source NSM framework. To easily import packets and process them with a tool like Kibana or Zeek, we can use the so-import-pcap command.   <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"154\" height=\"54\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-23.png\" alt=\"\" class=\"wp-image-1314\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-23.png 154w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-23-150x54.png 150w\" sizes=\"auto, (max-width: 154px) 100vw, 154px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"656\" height=\"38\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-24.png\" alt=\"\" class=\"wp-image-1316\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-24.png 656w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-24-300x17.png 300w\" sizes=\"auto, (max-width: 656px) 100vw, 656px\" \/><\/figure>\n\n\n\n<p>Sysmon is a free toll that monitors and logs system activity to the Windows event log. Sysmon event ID 25 is called ProcessTampering and it is generated when process hiding techniques are detected. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"276\" height=\"58\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-25.png\" alt=\"\" class=\"wp-image-1321\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"697\" height=\"63\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-26.png\" alt=\"\" class=\"wp-image-1323\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-26.png 697w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-26-300x27.png 300w\" sizes=\"auto, (max-width: 697px) 100vw, 697px\" \/><\/figure>\n\n\n\n<p>Pass-the-hash is a lateral movement technique where an attacker uses stolen hashes from an authorized user to authenticate. The attacker does not need to know the actual password. SSO systems and Windows environments tend to be vulnerable to this attack. Microsoft Security Advisory 2871997 limits the effectiveness of this attack by limiting lateral movement for most local accounts (not the local administrator though). <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"708\" height=\"128\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-29.png\" alt=\"\" class=\"wp-image-1330\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-29.png 708w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-29-300x54.png 300w\" sizes=\"auto, (max-width: 708px) 100vw, 708px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"356\" height=\"63\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-27.png\" alt=\"\" class=\"wp-image-1327\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-27.png 356w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-27-300x53.png 300w\" sizes=\"auto, (max-width: 356px) 100vw, 356px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"728\" height=\"134\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-28.png\" alt=\"\" class=\"wp-image-1328\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-28.png 728w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-28-300x55.png 300w\" sizes=\"auto, (max-width: 728px) 100vw, 728px\" \/><\/figure>\n\n\n\n<p>After unzipping the pcap file, I used the below command in Tshark to extract and lists all unique User-Agent strings from the HTTP traffic<\/p>\n\n\n\n<p>tshark -n -r capture.pcap -Y &#8216;http&#8217; -T fields -e http.user_agent | sort -u<\/p>\n\n\n\n<p>Looking at User Agent that was generated, I quickly find the two misspelled agents:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"423\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-30-1024x423.png\" alt=\"\" class=\"wp-image-1334\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-30-1024x423.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-30-300x124.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-30-768x317.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-30.png 1104w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"52\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-31-1024x52.png\" alt=\"\" class=\"wp-image-1335\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-31-1024x52.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-31-300x15.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-31-768x39.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-31-1536x79.png 1536w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-31.png 1541w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"539\" height=\"75\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-32.png\" alt=\"\" class=\"wp-image-1337\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-32.png 539w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-32-300x42.png 300w\" sizes=\"auto, (max-width: 539px) 100vw, 539px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"741\" height=\"65\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-33.png\" alt=\"\" class=\"wp-image-1339\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-33.png 741w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-33-300x26.png 300w\" sizes=\"auto, (max-width: 741px) 100vw, 741px\" \/><\/figure>\n\n\n\n<p>To find all the Windows NT kernel version in the pcap file, I just piped grep to this same command: <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"21\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-34-1024x21.png\" alt=\"\" class=\"wp-image-1341\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-34-1024x21.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-34-300x6.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-34-768x16.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-34.png 1494w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>I then get a list of the Windows NT kernel version and the oldest claim one version 5.1:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"853\" height=\"108\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-35.png\" alt=\"\" class=\"wp-image-1343\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-35.png 853w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-35-300x38.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-35-768x97.png 768w\" sizes=\"auto, (max-width: 853px) 100vw, 853px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"364\" height=\"53\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-36.png\" alt=\"\" class=\"wp-image-1345\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-36.png 364w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-36-300x44.png 300w\" sizes=\"auto, (max-width: 364px) 100vw, 364px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"118\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-37.png\" alt=\"\" class=\"wp-image-1346\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-37.png 700w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-37-300x51.png 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure>\n\n\n\n<p>I first used the below command, but it return no result:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"41\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-38-1024x41.png\" alt=\"\" class=\"wp-image-1348\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-38-1024x41.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-38-300x12.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-38-768x30.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-38.png 1314w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Using this command, I am just filtering through unencrypted traffic. If I want to be able to look at encrypted traffic in Wireshark, I first need to unencrypt it using the rsa key that was provided to me:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"407\" height=\"661\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-40.png\" alt=\"\" class=\"wp-image-1354\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-40.png 407w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-40-185x300.png 185w\" sizes=\"auto, (max-width: 407px) 100vw, 407px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"701\" height=\"652\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-41.png\" alt=\"\" class=\"wp-image-1356\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-41.png 701w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-41-300x279.png 300w\" sizes=\"auto, (max-width: 701px) 100vw, 701px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"687\" height=\"624\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-42.png\" alt=\"\" class=\"wp-image-1358\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-42.png 687w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-42-300x272.png 300w\" sizes=\"auto, (max-width: 687px) 100vw, 687px\" \/><\/figure>\n\n\n\n<p>Once the rsa has been imported, I can rerun my command in Tshark:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"42\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-43-1024x42.png\" alt=\"\" class=\"wp-image-1361\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-43-1024x42.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-43-300x12.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-43-768x31.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-43.png 1296w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>the script name is xmlrpc.php<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"225\" height=\"59\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-44.png\" alt=\"\" class=\"wp-image-1363\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"710\" height=\"64\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-45.png\" alt=\"\" class=\"wp-image-1365\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-45.png 710w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-45-300x27.png 300w\" sizes=\"auto, (max-width: 710px) 100vw, 710px\" \/><\/figure>\n\n\n\n<p>Looking at the Conversions tab in the Statistics menu in Wireshark, I can see all the point-to-point communications between two endpoints in my packet capture. I am interested in the IPv4 tab and if I sort it out by Bytes I can see that the IP that sent the most traffic is 24.224.16.178<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"193\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-46-1024x193.png\" alt=\"\" class=\"wp-image-1367\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-46-1024x193.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-46-300x57.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-46-768x145.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-46.png 1529w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"219\" height=\"56\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-47.png\" alt=\"\" class=\"wp-image-1369\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"725\" height=\"69\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-48.png\" alt=\"\" class=\"wp-image-1371\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-48.png 725w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-48-300x29.png 300w\" sizes=\"auto, (max-width: 725px) 100vw, 725px\" \/><\/figure>\n\n\n\n<p>In Wireshark, I used the &#8216;Find Packets&#8217; menu and changed &#8220;Display filter&#8221; to &#8220;String&#8221; and &#8220;Packet list&#8221; to &#8220;Packet details&#8221; to be able to search for &#8220;viper&#8221; in my pcap:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"413\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-49-1024x413.png\" alt=\"\" class=\"wp-image-1375\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-49-1024x413.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-49-300x121.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-49-768x309.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-49-1536x619.png 1536w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-49.png 1586w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>I quickly find on packet using a Viper User Agent. The Firefox version is 932.0.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"264\" height=\"54\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-50.png\" alt=\"\" class=\"wp-image-1377\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"757\" height=\"97\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-51.png\" alt=\"\" class=\"wp-image-1379\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-51.png 757w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-51-300x38.png 300w\" sizes=\"auto, (max-width: 757px) 100vw, 757px\" \/><\/figure>\n\n\n\n<p>The IP address for the Viper pilot referenced in the last question is 24.224.163.178. I can use a simple Wireshark to see how many packets were sent between this address and the galactica one:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"485\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-52-1024x485.png\" alt=\"\" class=\"wp-image-1381\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-52-1024x485.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-52-300x142.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-52-768x364.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-52.png 1346w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>40406 packets were exchanged between these two addresses.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"194\" height=\"44\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-53.png\" alt=\"\" class=\"wp-image-1384\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"742\" height=\"86\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-54.png\" alt=\"\" class=\"wp-image-1386\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-54.png 742w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-54-300x35.png 300w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/><\/figure>\n\n\n\n<p>If we follow the http stream for the Get request for \/robots.txt, we can see the three directories that web crawler should not access in the response to this request:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"682\" height=\"413\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-55.png\" alt=\"\" class=\"wp-image-1388\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-55.png 682w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-55-300x182.png 300w\" sizes=\"auto, (max-width: 682px) 100vw, 682px\" \/><\/figure>\n\n\n\n<p>The third directory is called \/Battlestar Galactica\/<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"716\" height=\"181\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-58.png\" alt=\"\" class=\"wp-image-1393\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-58.png 716w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-58-300x76.png 300w\" sizes=\"auto, (max-width: 716px) 100vw, 716px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"353\" height=\"61\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-56.png\" alt=\"\" class=\"wp-image-1390\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-56.png 353w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-56-300x52.png 300w\" sizes=\"auto, (max-width: 353px) 100vw, 353px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"485\" height=\"59\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-57.png\" alt=\"\" class=\"wp-image-1391\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-57.png 485w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/12\/image-57-300x36.png 300w\" sizes=\"auto, (max-width: 485px) 100vw, 485px\" \/><\/figure>\n\n\n\n<p>First, I unzip the file using the unzip linux command. A new directory containing these two files gets created. I can use the the wc -l linux command to find out the number of lines contained in each file: <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"958\" height=\"219\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image.png\" alt=\"\" class=\"wp-image-1397\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image.png 958w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-300x69.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-768x176.png 768w\" sizes=\"auto, (max-width: 958px) 100vw, 958px\" \/><\/figure>\n\n\n\n<p> These two files have 115020 lines combined. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"423\" height=\"42\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-1.png\" alt=\"\" class=\"wp-image-1399\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-1.png 423w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-1-300x30.png 300w\" sizes=\"auto, (max-width: 423px) 100vw, 423px\" \/><\/figure>\n\n\n\n<p>I can chain several Linux commands to extract IP addresses from log lines using <code>awk<\/code>, filter for unique values with <code>sort | uniq<\/code>, and then count them with <code>wc -l<\/code>:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"970\" height=\"55\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-2.png\" alt=\"\" class=\"wp-image-1401\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-2.png 970w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-2-300x17.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-2-768x44.png 768w\" sizes=\"auto, (max-width: 970px) 100vw, 970px\" \/><\/figure>\n\n\n\n<p>There are 3305 unique IP addresses in this log file.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"433\" height=\"55\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-3.png\" alt=\"\" class=\"wp-image-1403\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-3.png 433w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-3-300x38.png 300w\" sizes=\"auto, (max-width: 433px) 100vw, 433px\" \/><\/figure>\n\n\n\n<p>I used a slightly different chain of commands to extract the number of times each unique IP address connected: <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"297\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-4-1024x297.png\" alt=\"\" class=\"wp-image-1405\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-4-1024x297.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-4-300x87.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-4-768x223.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-4.png 1109w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The IP address 40.88.21.235 connected 535 times. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"558\" height=\"58\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-5.png\" alt=\"\" class=\"wp-image-1408\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-5.png 558w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-5-300x31.png 300w\" sizes=\"auto, (max-width: 558px) 100vw, 558px\" \/><\/figure>\n\n\n\n<p>Using grep I can search for the &#8220;200&#8221; code (HTTP response code for &#8220;OK&#8221; succeeded), and then I used a command similar to what I used to solve the previous questions:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"126\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-6-1024x126.png\" alt=\"\" class=\"wp-image-1410\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-6-1024x126.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-6-300x37.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-6-768x95.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-6.png 1192w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The IP address 49.7.20.94 connected successfully 179 times.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"594\" height=\"78\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-7.png\" alt=\"\" class=\"wp-image-1412\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-7.png 594w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-7-300x39.png 300w\" sizes=\"auto, (max-width: 594px) 100vw, 594px\" \/><\/figure>\n\n\n\n<p>404 is the HTTP code for files that are not found. Using a command similar to the last question, I can quickly find the full path for this file that was not found.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"144\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-9-1024x144.png\" alt=\"\" class=\"wp-image-1415\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-9-1024x144.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-9-300x42.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-9-768x108.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-9.png 1269w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"430\" height=\"52\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-10.png\" alt=\"\" class=\"wp-image-1419\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-10.png 430w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-10-300x36.png 300w\" sizes=\"auto, (max-width: 430px) 100vw, 430px\" \/><\/figure>\n\n\n\n<p>206 is the http status code for partial downloads. Using the grep command and pipping it with the wc command, we can quickly figure out the number of partial downloads contained in the file. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"673\" height=\"57\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-11.png\" alt=\"\" class=\"wp-image-1422\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-11.png 673w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-11-300x25.png 300w\" sizes=\"auto, (max-width: 673px) 100vw, 673px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"748\" height=\"204\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-12.png\" alt=\"\" class=\"wp-image-1424\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-12.png 748w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-12-300x82.png 300w\" sizes=\"auto, (max-width: 748px) 100vw, 748px\" \/><\/figure>\n\n\n\n<p>Using the below command, the longest POST is 99 characters long: <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"179\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-13-1024x179.png\" alt=\"\" class=\"wp-image-1426\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-13-1024x179.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-13-300x53.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-13-768x135.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-13.png 1284w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"522\" height=\"40\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-14.png\" alt=\"\" class=\"wp-image-1429\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-14.png 522w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-14-300x23.png 300w\" sizes=\"auto, (max-width: 522px) 100vw, 522px\" \/><\/figure>\n\n\n\n<p>In this query log file, the IP addresses come with there associated port numbers. I used the below command to only select the IP addresses from the file:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"135\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-15-1024x135.png\" alt=\"\" class=\"wp-image-1431\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-15-1024x135.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-15-300x40.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-15-768x101.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-15.png 1294w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>206.221.176.229 is the client IP address that connected the most number of times.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"63\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-16.png\" alt=\"\" class=\"wp-image-1433\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-16.png 696w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-16-300x27.png 300w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"219\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-17-1024x219.png\" alt=\"\" class=\"wp-image-1435\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-17-1024x219.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-17-300x64.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-17-768x164.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-17.png 1158w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"553\" height=\"34\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-18.png\" alt=\"\" class=\"wp-image-1437\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-18.png 553w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-18-300x18.png 300w\" sizes=\"auto, (max-width: 553px) 100vw, 553px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"312\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-19-1024x312.png\" alt=\"\" class=\"wp-image-1439\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-19-1024x312.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-19-300x91.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-19-768x234.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-19.png 1048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"597\" height=\"45\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-20.png\" alt=\"\" class=\"wp-image-1441\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-20.png 597w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-20-300x23.png 300w\" sizes=\"auto, (max-width: 597px) 100vw, 597px\" \/><\/figure>\n\n\n\n<p>The query-flags field is the 10th space-delimited field. The &#8220;E&#8221; flag means the EDNS option is set<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"894\" height=\"51\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-21.png\" alt=\"\" class=\"wp-image-1443\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-21.png 894w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-21-300x17.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-21-768x44.png 768w\" sizes=\"auto, (max-width: 894px) 100vw, 894px\" \/><\/figure>\n\n\n\n<p>80937 EDNS request were made in this log file.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"715\" height=\"109\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-22.png\" alt=\"\" class=\"wp-image-1445\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-22.png 715w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-22-300x46.png 300w\" sizes=\"auto, (max-width: 715px) 100vw, 715px\" \/><\/figure>\n\n\n\n<p>The query-flags field is the 10th space-delimited field. The &#8220;-&#8221; flag means that recursion is not requested. Using the below command:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"933\" height=\"60\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-23.png\" alt=\"\" class=\"wp-image-1446\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-23.png 933w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-23-300x19.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-23-768x49.png 768w\" sizes=\"auto, (max-width: 933px) 100vw, 933px\" \/><\/figure>\n\n\n\n<p>we see that 22778 requests specified no recursion.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"710\" height=\"215\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-26.png\" alt=\"\" class=\"wp-image-1453\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-26.png 710w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-26-300x91.png 300w\" sizes=\"auto, (max-width: 710px) 100vw, 710px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"324\" height=\"53\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-24.png\" alt=\"\" class=\"wp-image-1449\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-24.png 324w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-24-300x49.png 300w\" sizes=\"auto, (max-width: 324px) 100vw, 324px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"82\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-25.png\" alt=\"\" class=\"wp-image-1451\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-25.png 750w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-25-300x33.png 300w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/figure>\n\n\n\n<p>First, I need to unzip the file:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"929\" height=\"199\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-27.png\" alt=\"\" class=\"wp-image-1455\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-27.png 929w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-27-300x64.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-27-768x165.png 768w\" sizes=\"auto, (max-width: 929px) 100vw, 929px\" \/><\/figure>\n\n\n\n<p>I can then import the pcap file to Security Onion:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"956\" height=\"242\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-28.png\" alt=\"\" class=\"wp-image-1457\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-28.png 956w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-28-300x76.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-28-768x194.png 768w\" sizes=\"auto, (max-width: 956px) 100vw, 956px\" \/><\/figure>\n\n\n\n<p> We see that this pcap data timetsamp range is 2023-11-29. In SO hunt menu, we then have to select this exact range. n the Query section, I can then select the predefined &#8216;Alert&#8217; query:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"125\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-30-1024x125.png\" alt=\"\" class=\"wp-image-1462\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-30-1024x125.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-30-300x36.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-30-768x93.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-30.png 1398w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>This gives me all the alerts that were generated during this time range:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"131\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-31-1024x131.png\" alt=\"\" class=\"wp-image-1463\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-31-1024x131.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-31-300x39.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-31-768x99.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-31.png 1348w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>10 Suricata alerts were generated that day.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"196\" height=\"46\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-32.png\" alt=\"\" class=\"wp-image-1465\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"708\" height=\"69\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-33.png\" alt=\"\" class=\"wp-image-1466\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-33.png 708w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-33-300x29.png 300w\" sizes=\"auto, (max-width: 708px) 100vw, 708px\" \/><\/figure>\n\n\n\n<p>First, I have to reorder the Timestamp in chronological order. I can then see the rule name for the first alert:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"327\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-34-1024x327.png\" alt=\"\" class=\"wp-image-1468\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-34-1024x327.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-34-300x96.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-34-768x245.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-34.png 1383w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"57\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-35.png\" alt=\"\" class=\"wp-image-1470\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"670\" height=\"46\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-36.png\" alt=\"\" class=\"wp-image-1472\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-36.png 670w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-36-300x21.png 300w\" sizes=\"auto, (max-width: 670px) 100vw, 670px\" \/><\/figure>\n\n\n\n<p>To find the name of this outfile, I have to look for data being exfiltrated (from the internal network to the external). Looking at the first alert, I can right-click on it, select Actions and then PCAP:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"419\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-37-1024x419.png\" alt=\"\" class=\"wp-image-1476\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-37-1024x419.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-37-300x123.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-37-768x314.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-37.png 1393w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>I get taken to a different screen that contains the PCAP details for this. From there, I can click on the&nbsp;&#8216;Send the transcript to CyberChef&#8217;&nbsp;icon to the left of the&nbsp;Download all packets as a PCAP file&nbsp;icon. Then I can search the&nbsp;Output:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"306\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-38-1024x306.png\" alt=\"\" class=\"wp-image-1478\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-38-1024x306.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-38-300x90.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-38-768x229.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-38.png 1535w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Looking at the CyberChef output, I see that the client downloaded a file called gold.hta which was probably the initial compromise. This file is going from the external to the internal so this is not what I am looking for: <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"796\" height=\"257\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-39.png\" alt=\"\" class=\"wp-image-1479\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-39.png 796w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-39-300x97.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-39-768x248.png 768w\" sizes=\"auto, (max-width: 796px) 100vw, 796px\" \/><\/figure>\n\n\n\n<p>If I scroll down, I find the payload contained inside this gold.hta file:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"793\" height=\"395\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-40.png\" alt=\"\" class=\"wp-image-1481\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-40.png 793w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-40-300x149.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-40-768x383.png 768w\" sizes=\"auto, (max-width: 793px) 100vw, 793px\" \/><\/figure>\n\n\n\n<p>The payload is a script containing the outfile name. This outfile (<code>dhi48487chhd.exe<\/code>) serves as the locally saved copy of the attacker&#8217;s stage 2 payload, which then phones home to give the attacker hands-on-keyboard access to the victim machine.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"448\" height=\"57\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-41.png\" alt=\"\" class=\"wp-image-1484\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-41.png 448w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-41-300x38.png 300w\" sizes=\"auto, (max-width: 448px) 100vw, 448px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"709\" height=\"58\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-42.png\" alt=\"\" class=\"wp-image-1486\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-42.png 709w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-42-300x25.png 300w\" sizes=\"auto, (max-width: 709px) 100vw, 709px\" \/><\/figure>\n\n\n\n<p>The fourth alert references the Powershell User-Agent:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"291\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-43-1024x291.png\" alt=\"\" class=\"wp-image-1488\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-43-1024x291.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-43-300x85.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-43-768x218.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-43.png 1397w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Expanding this alert, I can quickly find the associated rule reference:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"738\" height=\"95\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-44.png\" alt=\"\" class=\"wp-image-1489\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-44.png 738w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-44-300x39.png 300w\" sizes=\"auto, (max-width: 738px) 100vw, 738px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"428\" height=\"52\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-45.png\" alt=\"\" class=\"wp-image-1491\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-45.png 428w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-45-300x36.png 300w\" sizes=\"auto, (max-width: 428px) 100vw, 428px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"699\" height=\"181\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-46.png\" alt=\"\" class=\"wp-image-1493\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-46.png 699w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-46-300x78.png 300w\" sizes=\"auto, (max-width: 699px) 100vw, 699px\" \/><\/figure>\n\n\n\n<p>I can find this data in the &#8216;network.data.decoded&#8217; line:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"99\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-47-1024x99.png\" alt=\"\" class=\"wp-image-1495\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-47-1024x99.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-47-300x29.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-47-768x74.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-47.png 1028w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"267\" height=\"52\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-48.png\" alt=\"\" class=\"wp-image-1497\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"715\" height=\"61\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-49.png\" alt=\"\" class=\"wp-image-1499\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-49.png 715w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-49-300x26.png 300w\" sizes=\"auto, (max-width: 715px) 100vw, 715px\" \/><\/figure>\n\n\n\n<p>First, I need to download the pcap from Security Onion and then I can open it in Wireshark. From there I can go to File then Export Objects and select HTTP: <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"467\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-51-1024x467.png\" alt=\"\" class=\"wp-image-1504\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-51-1024x467.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-51-300x137.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-51-768x351.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-51.png 1411w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>From there I can save the file &#8216;stage2.exe&#8217; to the disk: <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"757\" height=\"553\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-52.png\" alt=\"\" class=\"wp-image-1506\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-52.png 757w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-52-300x219.png 300w\" sizes=\"auto, (max-width: 757px) 100vw, 757px\" \/><\/figure>\n\n\n\n<p>Once the file is saved, I can use the following command line to get the file hash:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"942\" height=\"56\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-53.png\" alt=\"\" class=\"wp-image-1508\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-53.png 942w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-53-300x18.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-53-768x46.png 768w\" sizes=\"auto, (max-width: 942px) 100vw, 942px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"387\" height=\"57\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-54.png\" alt=\"\" class=\"wp-image-1511\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-54.png 387w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-54-300x44.png 300w\" sizes=\"auto, (max-width: 387px) 100vw, 387px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"622\" height=\"121\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-55.png\" alt=\"\" class=\"wp-image-1513\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-55.png 622w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-55-300x58.png 300w\" sizes=\"auto, (max-width: 622px) 100vw, 622px\" \/><\/figure>\n\n\n\n<p>Using tcpdump and the grep command, I can quickly find this information:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"215\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-56-1024x215.png\" alt=\"\" class=\"wp-image-1515\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-56-1024x215.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-56-300x63.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-56-768x161.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-56.png 1083w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"245\" height=\"52\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-57.png\" alt=\"\" class=\"wp-image-1517\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"734\" height=\"58\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-58.png\" alt=\"\" class=\"wp-image-1519\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-58.png 734w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-58-300x24.png 300w\" sizes=\"auto, (max-width: 734px) 100vw, 734px\" \/><\/figure>\n\n\n\n<p>Looking at the alert menu in SO, we see that we have 4 low severity alerts out of our 10 Suricata alerts:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"367\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-59-1024x367.png\" alt=\"\" class=\"wp-image-1521\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-59-1024x367.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-59-300x108.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-59-768x276.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-59.png 1034w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Which one seems the least suspicious? The two powershell and the whoami alerts seem very suspicious. Let&#8217;s look at the &#8220;ET INFO Packed Executable Download&#8221; alert. This rule detects the download of packed executable files over HTTP by looking for a specific pattern within the file&#8217;s data. It identifies files starting with the &#8220;MZ&#8221; header, which is typical of Windows executable files. Let&#8217;s use WireShark to download the exe file and check if the file is suspicious or not:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"541\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-60-1024x541.png\" alt=\"\" class=\"wp-image-1527\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-60-1024x541.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-60-300x158.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-60-768x405.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-60.png 1110w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>There are two exe files in the PCAP that seem to be windows update executables. Let&#8217;s export these EXE from Wireshark and upload them to virustotal.com.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"148\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-61-1024x148.png\" alt=\"\" class=\"wp-image-1529\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-61-1024x148.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-61-300x43.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-61-768x111.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-61.png 1457w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>These files come up clean in VirusTotal.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"708\" height=\"194\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-64.png\" alt=\"\" class=\"wp-image-1535\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-64.png 708w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-64-300x82.png 300w\" sizes=\"auto, (max-width: 708px) 100vw, 708px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"353\" height=\"51\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-62.png\" alt=\"\" class=\"wp-image-1531\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-62.png 353w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-62-300x43.png 300w\" sizes=\"auto, (max-width: 353px) 100vw, 353px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"645\" height=\"56\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-63.png\" alt=\"\" class=\"wp-image-1533\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-63.png 645w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-63-300x26.png 300w\" sizes=\"auto, (max-width: 645px) 100vw, 645px\" \/><\/figure>\n\n\n\n<p>After opening the PCAP in WireShark, we can see that it contains 19548 packets.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"482\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-65-1024x482.png\" alt=\"\" class=\"wp-image-1538\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-65-1024x482.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-65-300x141.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-65-768x362.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-65.png 1414w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"219\" height=\"65\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-66.png\" alt=\"\" class=\"wp-image-1540\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"731\" height=\"108\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-67.png\" alt=\"\" class=\"wp-image-1542\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-67.png 731w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-67-300x44.png 300w\" sizes=\"auto, (max-width: 731px) 100vw, 731px\" \/><\/figure>\n\n\n\n<p>First, I went to the Wireshark&#8217;s Statistics menu. I then clicked &#8220;Conversations&#8221;, selected the TCP tab and sorted by bytes. At the top of the list is the TCP socket pair that sent the most data: <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"146\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-68-1024x146.png\" alt=\"\" class=\"wp-image-1545\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-68-1024x146.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-68-300x43.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-68-768x109.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-68.png 1358w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"361\" height=\"61\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-69.png\" alt=\"\" class=\"wp-image-1547\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-69.png 361w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-69-300x51.png 300w\" sizes=\"auto, (max-width: 361px) 100vw, 361px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"726\" height=\"63\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-70.png\" alt=\"\" class=\"wp-image-1549\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-70.png 726w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-70-300x26.png 300w\" sizes=\"auto, (max-width: 726px) 100vw, 726px\" \/><\/figure>\n\n\n\n<p>I Used a filter in wireshark to find the Domain\/Workgroup this IP address is a member of: <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"469\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-71-1024x469.png\" alt=\"\" class=\"wp-image-1551\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-71-1024x469.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-71-300x137.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-71-768x352.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-71.png 1410w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"348\" height=\"60\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-72.png\" alt=\"\" class=\"wp-image-1552\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-72.png 348w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-72-300x52.png 300w\" sizes=\"auto, (max-width: 348px) 100vw, 348px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"734\" height=\"66\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-73.png\" alt=\"\" class=\"wp-image-1554\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-73.png 734w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-73-300x27.png 300w\" sizes=\"auto, (max-width: 734px) 100vw, 734px\" \/><\/figure>\n\n\n\n<p>In Wireshark, I pressed&nbsp;CTRL-F. I set the filters to&nbsp;String&nbsp;and&nbsp;Packet bytes. Then I searched for the string&nbsp;&#8220;<code>This program cannot be run in DOS mode<\/code>&#8221;&nbsp;and followed that TCP stream.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"431\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-74-1024x431.png\" alt=\"\" class=\"wp-image-1558\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-74-1024x431.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-74-300x126.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-74-768x323.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-74-1536x646.png 1536w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-74.png 1585w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"946\" height=\"640\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-75.png\" alt=\"\" class=\"wp-image-1561\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-75.png 946w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-75-300x203.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-75-768x520.png 768w\" sizes=\"auto, (max-width: 946px) 100vw, 946px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"294\" height=\"66\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-76.png\" alt=\"\" class=\"wp-image-1563\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"557\" height=\"49\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-77.png\" alt=\"\" class=\"wp-image-1564\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-77.png 557w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-77-300x26.png 300w\" sizes=\"auto, (max-width: 557px) 100vw, 557px\" \/><\/figure>\n\n\n\n<p>I first started looking for unusual HTTP or HHTPS request, especially looking for POST request coming from IP address 192.168.99.14:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"199\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-78-1024x199.png\" alt=\"\" class=\"wp-image-1566\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-78-1024x199.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-78-300x58.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-78-768x149.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-78-1536x298.png 1536w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-78.png 1587w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p> There are 39 POST requests made from 192.168.99.14 to the same IP address 143.198.54.35 which seems very unusual. These POST requests of varying sizes are made almost every 5 seconds and definitely looks like beaconing activity. If i follow the HTTP stream for one of these packets:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"943\" height=\"316\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-79.png\" alt=\"\" class=\"wp-image-1569\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-79.png 943w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-79-300x101.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-79-768x257.png 768w\" sizes=\"auto, (max-width: 943px) 100vw, 943px\" \/><\/figure>\n\n\n\n<p>The user agent is not malformed, but it references Windows NT 6.1 (Windows 7) which is an outdated OS, that very few legitimate machines should still be running it, and rv:11.0 (Internet Explorer 11.0) a browser retired in 2022 and not used for real browsing anymore. We also notice that the body of the request is encoded in Base64. When we put all these pieces together, it creates a puzzle that looks incredibly suspect and a prime candidate for C2 Activity.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"246\" height=\"46\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-80.png\" alt=\"\" class=\"wp-image-1573\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"740\" height=\"151\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-81.png\" alt=\"\" class=\"wp-image-1575\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-81.png 740w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-81-300x61.png 300w\" sizes=\"auto, (max-width: 740px) 100vw, 740px\" \/><\/figure>\n\n\n\n<p>It is under the host section of the HTTP request:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"917\" height=\"306\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-82.png\" alt=\"\" class=\"wp-image-1577\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-82.png 917w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-82-300x100.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-82-768x256.png 768w\" sizes=\"auto, (max-width: 917px) 100vw, 917px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"104\" height=\"53\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-83.png\" alt=\"\" class=\"wp-image-1579\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"517\" height=\"51\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-84.png\" alt=\"\" class=\"wp-image-1581\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-84.png 517w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-84-300x30.png 300w\" sizes=\"auto, (max-width: 517px) 100vw, 517px\" \/><\/figure>\n\n\n\n<p> I first filtered for the ARP protocol in Wireshark and then I sorted the &#8220;info&#8221; column:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"133\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-85-1024x133.png\" alt=\"\" class=\"wp-image-1583\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-85-1024x133.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-85-300x39.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-85-768x100.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-85.png 1357w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>There are only 4 ARP replies, three of which are unique.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"494\" height=\"51\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-86.png\" alt=\"\" class=\"wp-image-1585\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-86.png 494w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-86-300x31.png 300w\" sizes=\"auto, (max-width: 494px) 100vw, 494px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"724\" height=\"85\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-87.png\" alt=\"\" class=\"wp-image-1586\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-87.png 724w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-87-300x35.png 300w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/figure>\n\n\n\n<p>I know from a previous question that one of the kernel version is 6.1. Based on this piece of data, I can use the below Wireshark filter to find the other kernel that used by this IP address: <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"358\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-88-1024x358.png\" alt=\"\" class=\"wp-image-1588\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-88-1024x358.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-88-300x105.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-88-768x268.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-88-1536x537.png 1536w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-88.png 1566w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"314\" height=\"60\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-89.png\" alt=\"\" class=\"wp-image-1590\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-89.png 314w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-89-300x57.png 300w\" sizes=\"auto, (max-width: 314px) 100vw, 314px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"405\" height=\"41\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-90.png\" alt=\"\" class=\"wp-image-1591\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-90.png 405w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-90-300x30.png 300w\" sizes=\"auto, (max-width: 405px) 100vw, 405px\" \/><\/figure>\n\n\n\n<p>It&#8217;s one of the two operating systems referred to by the NT kernel versions in the answer to the previous question (Windows NT 6.1 (Windows 7) and Windows NT 10.0 (Windows 10)). The stage 2 executable download used the real user agent then the stage 2 executable ran and downloaded a file (and then started C2), using its own (forged) version. We know from a previous question that this stage 2 executable download happened in packet # 1520. Looking at this packet again, we can find which OS was used: <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"609\" height=\"122\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-91.png\" alt=\"\" class=\"wp-image-1597\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-91.png 609w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-91-300x60.png 300w\" sizes=\"auto, (max-width: 609px) 100vw, 609px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"361\" height=\"53\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-92.png\" alt=\"\" class=\"wp-image-1599\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-92.png 361w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-92-300x44.png 300w\" sizes=\"auto, (max-width: 361px) 100vw, 361px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"736\" height=\"59\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-93.png\" alt=\"\" class=\"wp-image-1601\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-93.png 736w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-93-300x24.png 300w\" sizes=\"auto, (max-width: 736px) 100vw, 736px\" \/><\/figure>\n\n\n\n<p>Zeek can automatically extract files from network traffic. All I need to do is run Zeek against my pcap with file extraction enabled:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"66\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-94-1024x66.png\" alt=\"\" class=\"wp-image-1603\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-94-1024x66.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-94-300x19.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-94-768x50.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-94-1536x99.png 1536w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-94.png 1575w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>I then run the file command on everything in that directory. This command examines all files contained in the Extract_files directory and tells me what type they are based on their contents (magic bytes\/file signature), not their extensions:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"637\" height=\"34\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-95.png\" alt=\"\" class=\"wp-image-1605\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-95.png 637w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-95-300x16.png 300w\" sizes=\"auto, (max-width: 637px) 100vw, 637px\" \/><\/figure>\n\n\n\n<p>Looking at the list that was generated by the previous command, I need to look for a PE32 or PE32+ executable type file and I quickly find it:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"33\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-96-1024x33.png\" alt=\"\" class=\"wp-image-1606\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-96-1024x33.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-96-300x10.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-96-768x24.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-96-1536x49.png 1536w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-96.png 1572w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Now that I have identified the file name, I can get its sha256 hash using the below command:  <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"37\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-97-1024x37.png\" alt=\"\" class=\"wp-image-1607\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-97-1024x37.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-97-300x11.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-97-768x28.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-97-1536x56.png 1536w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-97.png 1570w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"185\" height=\"54\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-98.png\" alt=\"\" class=\"wp-image-1613\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"722\" height=\"86\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-99.png\" alt=\"\" class=\"wp-image-1615\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-99.png 722w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-99-300x36.png 300w\" sizes=\"auto, (max-width: 722px) 100vw, 722px\" \/><\/figure>\n\n\n\n<p>I run Clamscan against the PE file:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"165\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-100-1024x165.png\" alt=\"\" class=\"wp-image-1617\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-100-1024x165.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-100-300x48.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-100-768x124.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-100-1536x247.png 1536w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-100.png 1552w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"282\" height=\"53\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-101.png\" alt=\"\" class=\"wp-image-1619\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"747\" height=\"97\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-102.png\" alt=\"\" class=\"wp-image-1621\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-102.png 747w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-102-300x39.png 300w\" sizes=\"auto, (max-width: 747px) 100vw, 747px\" \/><\/figure>\n\n\n\n<p>The Zeek conn.log file contains connection records. We can find the destination (responder) port field, and the protocol (tcp, udp, icmp) field associated with each report. Using the zeek-cut command we can extract these two specific columns. We can then pipe this output into a grep command that will filter for TCP protocol and port 443 exactly. Finally, we can pipe this into the &#8216;wc -l&#8217; command that will count the lines generated in the previous output:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"45\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-103-1024x45.png\" alt=\"\" class=\"wp-image-1624\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-103-1024x45.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-103-300x13.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-103-768x34.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-103.png 1259w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"553\" height=\"56\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-104.png\" alt=\"\" class=\"wp-image-1627\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-104.png 553w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-104-300x30.png 300w\" sizes=\"auto, (max-width: 553px) 100vw, 553px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"722\" height=\"42\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-105.png\" alt=\"\" class=\"wp-image-1628\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-105.png 722w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-105-300x17.png 300w\" sizes=\"auto, (max-width: 722px) 100vw, 722px\" \/><\/figure>\n\n\n\n<p>We can slightly modify our previous command to now only look for the UDP protocol and then sort and look for unique values in the output:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"92\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-106-1024x92.png\" alt=\"\" class=\"wp-image-1629\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-106-1024x92.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-106-300x27.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-106-768x69.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-106.png 1471w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>We see that port 57621 was only connected to one time.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"185\" height=\"58\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-107.png\" alt=\"\" class=\"wp-image-1631\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"753\" height=\"148\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-108.png\" alt=\"\" class=\"wp-image-1633\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-108.png 753w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-108-300x59.png 300w\" sizes=\"auto, (max-width: 753px) 100vw, 753px\" \/><\/figure>\n\n\n\n<p>We can find this answer by applying the same logic used with the two previous commands but applying to the ssh.log folder and using the server and id.orig_h columns:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"52\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-109-1024x52.png\" alt=\"\" class=\"wp-image-1636\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-109-1024x52.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-109-300x15.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-109-768x39.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-109.png 1125w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"388\" height=\"61\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-110.png\" alt=\"\" class=\"wp-image-1638\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-110.png 388w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-110-300x47.png 300w\" sizes=\"auto, (max-width: 388px) 100vw, 388px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"707\" height=\"131\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-111.png\" alt=\"\" class=\"wp-image-1640\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-111.png 707w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-111-300x56.png 300w\" sizes=\"auto, (max-width: 707px) 100vw, 707px\" \/><\/figure>\n\n\n\n<p>Zeek logs protocol anomalies and unusual network behavior to the wierd.log folder. This includes malformed packets like those with zero-length IP headers. I am going to use the zeek-cut command again to extract the &#8216;name&#8217; column. This will allow me to quickly look for packets with zero-length IP headers:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"93\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-112-1024x93.png\" alt=\"\" class=\"wp-image-1644\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-112-1024x93.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-112-300x27.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-112-768x70.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-112.png 1113w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"268\" height=\"39\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-116.png\" alt=\"\" class=\"wp-image-1649\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"708\" height=\"358\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-113.png\" alt=\"\" class=\"wp-image-1646\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-113.png 708w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-113-300x152.png 300w\" sizes=\"auto, (max-width: 708px) 100vw, 708px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"323\" height=\"57\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-114.png\" alt=\"\" class=\"wp-image-1647\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-114.png 323w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-114-300x53.png 300w\" sizes=\"auto, (max-width: 323px) 100vw, 323px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"568\" height=\"38\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-115.png\" alt=\"\" class=\"wp-image-1648\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-115.png 568w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-115-300x20.png 300w\" sizes=\"auto, (max-width: 568px) 100vw, 568px\" \/><\/figure>\n\n\n\n<p>After unzipping the file, I first looked into the security.evtx file in the event viewer. I scrolled down the 9 events stored in the file and found Event ID 1102 called &#8216;Log Clear&#8217;. The account name is &#8216;student&#8217;:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"462\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-117-1024x462.png\" alt=\"\" class=\"wp-image-1652\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-117-1024x462.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-117-300x135.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-117-768x346.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-117-1536x692.png 1536w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-117.png 1602w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"406\" height=\"58\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-118.png\" alt=\"\" class=\"wp-image-1654\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-118.png 406w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-118-300x43.png 300w\" sizes=\"auto, (max-width: 406px) 100vw, 406px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"710\" height=\"65\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-119.png\" alt=\"\" class=\"wp-image-1656\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-119.png 710w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-119-300x27.png 300w\" sizes=\"auto, (max-width: 710px) 100vw, 710px\" \/><\/figure>\n\n\n\n<p>I looked through the Sysmon evtx file. I paid special attention to Event ID 1 (process creation). Going through the entries for this event, I ended up with a suspiscious entry:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-120-1024x512.png\" alt=\"\" class=\"wp-image-1659\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-120-1024x512.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-120-300x150.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-120-768x384.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-120.png 1303w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>What first caught my eye was the path: <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"813\" height=\"55\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-121.png\" alt=\"\" class=\"wp-image-1661\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-121.png 813w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-121-300x20.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-121-768x52.png 768w\" sizes=\"auto, (max-width: 813px) 100vw, 813px\" \/><\/figure>\n\n\n\n<p>the file was downloaded via Internet Explorer and executed directly from the browser cache. This is a major red flag. Looking at the other log entries, I found some other red flags. The metadata fields are all blanks which never happens with legitimate software:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"330\" height=\"124\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-122.png\" alt=\"\" class=\"wp-image-1663\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-122.png 330w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-122-300x113.png 300w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/figure>\n\n\n\n<p>The parent process is iexplorer.exe:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"561\" height=\"74\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-123.png\" alt=\"\" class=\"wp-image-1665\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-123.png 561w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-123-300x40.png 300w\" sizes=\"auto, (max-width: 561px) 100vw, 561px\" \/><\/figure>\n\n\n\n<p>A browser spawning an executable is another strong indicator of exploitation.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"252\" height=\"62\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-124.png\" alt=\"\" class=\"wp-image-1668\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"413\" height=\"40\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-125.png\" alt=\"\" class=\"wp-image-1669\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-125.png 413w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-125-300x29.png 300w\" sizes=\"auto, (max-width: 413px) 100vw, 413px\" \/><\/figure>\n\n\n\n<p>This value is contained in one of the Sysmon log&#8217;s field: <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"77\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-126-1024x77.png\" alt=\"\" class=\"wp-image-1672\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-126-1024x77.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-126-300x23.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-126-768x58.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-126.png 1177w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"374\" height=\"58\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-127.png\" alt=\"\" class=\"wp-image-1674\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-127.png 374w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-127-300x47.png 300w\" sizes=\"auto, (max-width: 374px) 100vw, 374px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"694\" height=\"65\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-128.png\" alt=\"\" class=\"wp-image-1675\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-128.png 694w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-128-300x28.png 300w\" sizes=\"auto, (max-width: 694px) 100vw, 694px\" \/><\/figure>\n\n\n\n<p>From the previous questions, we know the Process GUID tied to this executable:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"856\" height=\"178\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-129.png\" alt=\"\" class=\"wp-image-1678\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-129.png 856w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-129-300x62.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-129-768x160.png 768w\" sizes=\"auto, (max-width: 856px) 100vw, 856px\" \/><\/figure>\n\n\n\n<p>Using PowerShell, I can use this unique identifier to find child processes that it spawned. The below command line gives me each child process with its image path, command line, and GUID:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"271\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-130-1024x271.png\" alt=\"\" class=\"wp-image-1680\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-130-1024x271.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-130-300x79.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-130-768x203.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-130.png 1262w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"108\" height=\"50\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-131.png\" alt=\"\" class=\"wp-image-1682\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"740\" height=\"92\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-132.png\" alt=\"\" class=\"wp-image-1684\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-132.png 740w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-132-300x37.png 300w\" sizes=\"auto, (max-width: 740px) 100vw, 740px\" \/><\/figure>\n\n\n\n<p>In Sysmon, DNS queries are classified under event 22. Using a different PowerShell Command, I can filter for this specific id # still using the same Process GUID: <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"193\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-135-1024x193.png\" alt=\"\" class=\"wp-image-1690\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-135-1024x193.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-135-300x57.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-135-768x145.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-135.png 1244w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"399\" height=\"52\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-136.png\" alt=\"\" class=\"wp-image-1692\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-136.png 399w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-136-300x39.png 300w\" sizes=\"auto, (max-width: 399px) 100vw, 399px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"735\" height=\"58\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-137.png\" alt=\"\" class=\"wp-image-1694\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-137.png 735w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-137-300x24.png 300w\" sizes=\"auto, (max-width: 735px) 100vw, 735px\" \/><\/figure>\n\n\n\n<p>There is an evtx file called PowerShell-Operational. I should be able to quickly find a scriptblock using this file. Event ID 4104 should capture Script Block Logging.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"337\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-138-1024x337.png\" alt=\"\" class=\"wp-image-1696\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-138-1024x337.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-138-300x99.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-138-768x253.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-138.png 1239w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The script is base64 encoded. I am going to use CyberChef to decode it. First, I need to drag &#8220;Data Format&#8221; -&gt; &#8220;FromBase64&#8221; to the&nbsp;Recipe&nbsp;section. Then I need to drag &#8220;Compression&#8221; -&gt; &#8220;Gunzip&#8221; to the same section. I finally I can copy\/paste the base64 to the&nbsp;Input&nbsp;section:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"494\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-139-1024x494.png\" alt=\"\" class=\"wp-image-1698\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-139-1024x494.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-139-300x145.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-139-768x371.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-139-1536x742.png 1536w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-139.png 1603w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"369\" height=\"51\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-140.png\" alt=\"\" class=\"wp-image-1700\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-140.png 369w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-140-300x41.png 300w\" sizes=\"auto, (max-width: 369px) 100vw, 369px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"698\" height=\"66\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-141.png\" alt=\"\" class=\"wp-image-1702\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-141.png 698w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-141-300x28.png 300w\" sizes=\"auto, (max-width: 698px) 100vw, 698px\" \/><\/figure>\n\n\n\n<p>PowerShell splits large scriptblocks into parts and logs the total in the <code>MessageTotal<\/code> field. I can therefore query for events where <code>MessageTotal<\/code> equals 11:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"405\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-142-1024x405.png\" alt=\"\" class=\"wp-image-1705\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-142-1024x405.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-142-300x119.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-142-768x304.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-142.png 1244w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Using Cyberchef again to decode and decompress the text, we find the 3 line of the script:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"578\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-143-1024x578.png\" alt=\"\" class=\"wp-image-1707\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-143-1024x578.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-143-300x169.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-143-768x434.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-143.png 1291w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"370\" height=\"53\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-144.png\" alt=\"\" class=\"wp-image-1709\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-144.png 370w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-144-300x43.png 300w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"725\" height=\"73\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-145.png\" alt=\"\" class=\"wp-image-1711\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-145.png 725w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/01\/image-145-300x30.png 300w\" sizes=\"auto, (max-width: 725px) 100vw, 725px\" \/><\/figure>\n\n\n\n<p>Still using the Process GUID, we can use PowerShell to look for Event ID 5(process termination) associated with this PGUID:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"151\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-1024x151.png\" alt=\"\" class=\"wp-image-1714\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-1024x151.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-300x44.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-768x113.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-1536x227.png 1536w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image.png 1580w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"99\" height=\"43\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-1.png\" alt=\"\" class=\"wp-image-1716\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"716\" height=\"466\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-2.png\" alt=\"\" class=\"wp-image-1718\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-2.png 716w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-2-300x195.png 300w\" sizes=\"auto, (max-width: 716px) 100vw, 716px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"344\" height=\"52\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-3.png\" alt=\"\" class=\"wp-image-1720\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-3.png 344w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-3-300x45.png 300w\" sizes=\"auto, (max-width: 344px) 100vw, 344px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"598\" height=\"39\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-4.png\" alt=\"\" class=\"wp-image-1721\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-4.png 598w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-4-300x20.png 300w\" sizes=\"auto, (max-width: 598px) 100vw, 598px\" \/><\/figure>\n\n\n\n<p>After unzipping galactica.zip, I see that there is a RSA key contained in the folder. I am going to import this keyfile to WireShark to be able to decrypt the communication in the pcap:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"723\" height=\"536\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-5.png\" alt=\"\" class=\"wp-image-1724\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-5.png 723w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-5-300x222.png 300w\" sizes=\"auto, (max-width: 723px) 100vw, 723px\" \/><\/figure>\n\n\n\n<p>Once this is done, the first thing I did was to search for the string &#8216;basestar&#8217; in my pcap:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"165\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-6-1024x165.png\" alt=\"\" class=\"wp-image-1727\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-6-1024x165.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-6-300x48.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-6-768x124.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-6-1536x247.png 1536w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-6.png 1597w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Looking at the DNS query trying to resolve the IP address of the basestar.cc domain name, I see that it resolves to the below address:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"69\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-7-1024x69.png\" alt=\"\" class=\"wp-image-1729\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-7-1024x69.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-7-300x20.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-7-768x51.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-7-1536x103.png 1536w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-7.png 1568w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>I can now filter the pcap using this specific IP address:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"400\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-8-1024x400.png\" alt=\"\" class=\"wp-image-1731\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-8-1024x400.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-8-300x117.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-8-768x300.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-8-1536x599.png 1536w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-8.png 1594w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>This creates a list of 166 ICMP packets of varying size between the same two IP addresses. This is very odd and worth inspecting. Looking at this list more carefully, we see that this is a series of echo request and echo reply containing data inside the payload. Normally a ping carries a small dummy payload, but there&#8217;s nothing stopping an attacker from putting real data in there. Looking at the payload of the first request, it looks like it is base64 encoded:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"246\" height=\"137\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-9.png\" alt=\"\" class=\"wp-image-1733\"\/><\/figure>\n\n\n\n<p>I used Cyberchef to decode it:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"841\" height=\"401\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-10.png\" alt=\"\" class=\"wp-image-1735\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-10.png 841w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-10-300x143.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-10-768x366.png 768w\" sizes=\"auto, (max-width: 841px) 100vw, 841px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"351\" height=\"53\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-11.png\" alt=\"\" class=\"wp-image-1737\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-11.png 351w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-11-300x45.png 300w\" sizes=\"auto, (max-width: 351px) 100vw, 351px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"594\" height=\"43\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-12.png\" alt=\"\" class=\"wp-image-1739\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-12.png 594w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-12-300x22.png 300w\" sizes=\"auto, (max-width: 594px) 100vw, 594px\" \/><\/figure>\n\n\n\n<p>Looking at the second Echo Request in the list, we see a different payload:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"355\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-13-1024x355.png\" alt=\"\" class=\"wp-image-1744\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-13-1024x355.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-13-300x104.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-13-768x266.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-13-1536x532.png 1536w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-13.png 1603w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Data [\u2026]: 34652037352036642036322036352037322032302035342037372036662033612032302034382037352036642036312036652036392037342037392032372037332032302036332036382036392036632036342037322036352036652032302036312037322036352032302037322036352<\/p>\n\n\n\n<p>Using CyberChef again, I can try to decode this HEX data:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"333\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-14-1024x333.png\" alt=\"\" class=\"wp-image-1747\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-14-1024x333.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-14-300x98.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-14-768x250.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-14.png 1275w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"378\" height=\"57\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-15.png\" alt=\"\" class=\"wp-image-1749\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-15.png 378w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-15-300x45.png 300w\" sizes=\"auto, (max-width: 378px) 100vw, 378px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"628\" height=\"37\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-16.png\" alt=\"\" class=\"wp-image-1751\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-16.png 628w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-16-300x18.png 300w\" sizes=\"auto, (max-width: 628px) 100vw, 628px\" \/><\/figure>\n\n\n\n<p>I apply the same strategy to the third Echo request. This time the data is HEX encoded, then Base64 encoded and compressed:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"336\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-17-1024x336.png\" alt=\"\" class=\"wp-image-1753\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-17-1024x336.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-17-300x98.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-17-768x252.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-17.png 1295w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"380\" height=\"48\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-18.png\" alt=\"\" class=\"wp-image-1755\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-18.png 380w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-18-300x38.png 300w\" sizes=\"auto, (max-width: 380px) 100vw, 380px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"34\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-19.png\" alt=\"\" class=\"wp-image-1757\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-19.png 602w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-19-300x17.png 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><\/figure>\n\n\n\n<p>I keep on using the same method to find Number Four message in the Echo Request # 4:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"372\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-20-1024x372.png\" alt=\"\" class=\"wp-image-1760\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-20-1024x372.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-20-300x109.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-20-768x279.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-20.png 1283w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"365\" height=\"52\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-21.png\" alt=\"\" class=\"wp-image-1762\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-21.png 365w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-21-300x43.png 300w\" sizes=\"auto, (max-width: 365px) 100vw, 365px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"608\" height=\"51\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-22.png\" alt=\"\" class=\"wp-image-1764\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-22.png 608w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-22-300x25.png 300w\" sizes=\"auto, (max-width: 608px) 100vw, 608px\" \/><\/figure>\n\n\n\n<p>Using CyberChef again with the Payload of the fifth Echo Request, I get:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"418\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-23-1024x418.png\" alt=\"\" class=\"wp-image-1766\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-23-1024x418.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-23-300x123.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-23-768x314.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-23.png 1270w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"342\" height=\"69\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-24.png\" alt=\"\" class=\"wp-image-1768\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-24.png 342w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-24-300x61.png 300w\" sizes=\"auto, (max-width: 342px) 100vw, 342px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"596\" height=\"55\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-25.png\" alt=\"\" class=\"wp-image-1770\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-25.png 596w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-25-300x28.png 300w\" sizes=\"auto, (max-width: 596px) 100vw, 596px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"968\" height=\"535\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-26.png\" alt=\"\" class=\"wp-image-1772\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-26.png 968w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-26-300x166.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2026\/02\/image-26-768x424.png 768w\" sizes=\"auto, (max-width: 968px) 100vw, 968px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>This was discussed in section 5 of the class, in the Monitoring Critical Windows Events chapter. This is event number 4737. Discussed in 511.2, section: DNS Architecture and Encryption. It explicitly supports TCP port 853. However, the RFC allows for nonstandard ports. HTTP\/3 uses the QUIC protocol, a protocol designed by Google that uses UDP [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1271","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/posts\/1271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1271"}],"version-history":[{"count":5,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/posts\/1271\/revisions"}],"predecessor-version":[{"id":1778,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/posts\/1271\/revisions\/1778"}],"wp:attachment":[{"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}