A windows machine has been hacked, its your job to go investigate this windows machine and find clues to what the hacker might have done.


Task 1 Investigating Windows

This is a challenge that is exactly what is says on the tin, there are a few challenges around investigating a windows machine that has been previously compromised.

Connect to the machine using RDP. The credentials the machine are as follows:

Username: Administrator Password: letmein123!

Please note that this machine does not respond to ping (ICMP) and may take a few minutes to boot up.

  1. Whats the version and year of the windows machine?

Windows Server 2016

  1. Which user logged in last?

Administrator

  1. When did John log onto the system last? Answer format: MM/DD/YYYY H:MM:SS AM/PM

03/02/2019 5:48:32 PM

  1. What IP does the system connect to when it first starts?

10.34.2.3

  1. What two accounts had administrative privileges (other than the Administrator user)? Answer format: username1, username2
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
PS C:\Users\Administrator> net localgroup administrators
Alias name     administrators
Comment        Administrators have complete and unrestricted access to the computer/domain

Members

-------------------------------------------------------------------------------
Administrator
Guest
Jenny
The command completed successfully.

PS C:\Users\Administrator>

Jenny, Guest

  1. Whats the name of the scheduled task that is malicous.

Clean File System

  1. What file was the task trying to run daily?

nc.ps1

  1. What port did this file listen locally for?

1348

  1. When did Jenny last logon?
1
2
C:\Users\Administrator>net user jenny | findstr /B /C:"Last logon"
Last logon                   Never

Never

  1. At what date did the compromise take place? Answer format: MM/DD/YY

03/02/2019

  1. At what time did Windows first assign special privileges to a new logon? Answer format: MM/DD/YYYY HH:MM:SS AM/PM

03/02/2019 4:04:49 PM

  1. What tool was used to get Windows passwords?

mimikatz

  1. What was the attackers external control and command servers IP?
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Microsoft Windows [Version 10.0.14393]
(c) 2016 Microsoft Corporation. All rights reserved.

C:\Users\Administrator>ipconfig /displaydns

Windows IP Configuration


    google.com
    ----------------------------------------
    No records of type AAAA


    google.com
    ----------------------------------------
    Record Name . . . . . : google.com
    Record Type . . . . . : 1
    Time To Live  . . . . : 86400
    Data Length . . . . . : 4
    Section . . . . . . . : Answer
    A (Host) Record . . . : 76.32.97.132



C:\Users\Administrator>

76.32.97.132

  1. What was the extension name of the shell uploaded via the servers website?

.jsp

  1. What was the last port the attacker opened?

1337

  1. Check for DNS poisoning, what site was targeted?

google.com