CyberOps Skills Assessment - Student TRNG - Exam
CyberOps Skills Assessment - Student TRNG - Exam
CyberOps Skills Assessment - Student TRNG - Exam
1
Skills Assessment
Introduction
Working as the security analyst for ACME Inc., you notice a number of events on the SGUIL dashboard. Your
task is to analyze these events, learn more about them, and decide if they indicate malicious activity.
You will have access to Google to learn more about the events. Security Onion is the only VM with Internet
access in the Cybersecurity Operations virtual environment.
The tasks below are designed to provide some guidance through the analysis process.
You will practice and be assessed on the following skills:
o Evaluating Snort/SGUIL events.
o Using SGUIL as a pivot to launch ELSA, Bro and Wireshark for further event inspection.
o Using Google search as a tool to obtain intelligence on a potential exploit.
Content for this assessment was obtained from http://www.malware-traffic-analysis.net/ and is used with
permission. We are grateful for the use of this material.
Addressing Table
The following addresses are preconfigured on the network devices. Addresses are provided for reference
purposes.
© Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 5
Skills Assessment CCNA Cybersecurity Operations v1.0
g. What is the MAC address of the internal computer involved in the events? How did you find it?
MAC address 00:1b:21:ca:fe:d7, can be found by right clicking on Alert ID and using Wireshark
h. What are some of the Source IDs of the rules that fire when the exploit occurs? Where are the Source IDs
from?
Multiple source IDs and in Emerging threats website:
93.114.64.118, 173.201.198.128, 192.99.198.158, 208.113.226.171, 209.126.97.209 (209.165.200.235)
i. Do the events look suspicious to you? Does it seem like the internal computer was infected or
compromised? Explain.
Yes, the event looks suspicious and the fact is that internal compromises have been made. The Flash
plugin warning has expired and the Angler EK warning is strong evidence of possible exploitation or
compromise
j. What is the operating system running on the internal computer in question?
Window-based OS
© Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 5
Skills Assessment CCNA Cybersecurity Operations v1.0
3. The malicious code scans the victim’s system, looks for vulnerabilities and extracts the results to
other malicious servers via POST
4. Based on filtered data, the malicious server prepares a customized exploit and sends it to the
victim’s browser
g. What is the most common file type that is related to that vulnerable software?
adobe flash authoring file – FLA
action script file – AS
flash XML file – XML
compiled flash file – SWF
h. Use ELSA to gather more evidence to support the hypothesis that the host you identified above delivered
the malware. Launch ELSA and list all hosts that downloaded the type of file listed above. Remember to
adjust the timeframe accordingly.
Were you able to find more evidence? If so, record your findings here.
Yes.
1510604611.228059|CYCGVz4HyAXsgGuNV2|209.165.201.17|47144|209.165.200.235|80|1|GET|
209.165.200.235|/mutillidae/index.php?
page=userinfo.php&username=’+union+select+ccid,ccnumber,ccv,expiration,null+from+credit_cards+–
© Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 5
Skills Assessment CCNA Cybersecurity Operations v1.0
+&password=&user-info-php-submitbutton=View+Account+Details|http://209.165.200.235/mutillidae/
index.php?page=userinfo.php&username=%27+union+select+ccid%2Cccnumber%2Cccv%2Cexpiration
%2Cnull+from+credit_cards+–+&password=&user-info-php-submit-button=View+Account+Details|1.1|
Mozilla/5.0 (X11; Linuxx86_64; rv:45.0) Gecko/20100101 Firefox/45.0|0|960|200|OK|-|-|
HTTP::URI_SQLI|-|-|-|-|-|-|FvFBhF1tikxaHjaG1|-|text/html
The second new event in SGUIL implies that the compromised site allowed for a malicious Flash-based
ad to be loaded from an ads site. This Flash-based ad is designed to scan the victim’s computer and
exfiltrate data to the EK’s landing page.
After the vulnerability information has been collected, the Flash-based advertisement submits it via POST
to a PHP script hosted on lifeinsidedetroit.com, the landing page. The landing page processes the
collected info and chooses the exploit according to the vulnerability that has been discovered.
The exploit is then delivered to the client’s web browser. As seen earlier in this documents, the victim’s
computer has an outdated version of Fkash. The exploit, hosted at qwe.mvdunalterableairreport.net, is
then sent to the victim’s computer. Notice that exploit is designed to allow code execution only. The
exploit also contains further malware, known by EK terminology as the payload. The execution of the
payload is the end game of the E
b. What is the domain name that delivered the exploit kit and malware payload?
qwe.mvdunalterableairreport.net
© Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 5
Skills Assessment CCNA Cybersecurity Operations v1.0
c. What is the IP address that delivered the exploit kit and malware payload?
192.99.198.158
d. Pivoting from events in SGUIL, launch Wireshark and export the files from the captured packets as was
done in a previous lab. What files or programs are you able to successfully export?
3xdz3bcxc8
© Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 5