Outline: Threat Hunting for Beginners: Hunting Standard Dll-Injected C2 Implants

Posted on Aug 12, 2023

Return to course page

#Topic
0Pre-Course Banter
1Setting Up Your Virtual Environment
1.1Introduction
1.2Requirements
1.3Hosted Hypervisor
1.4VM Images
1.5VM 1: Windows 10 aka “The Victim”
1.5.1Installation
1.5.2VMWare Tools
1.5.3Deep disable MS Defender + Updates
1.5.4Sysmon
1.5.5PowerShell ScriptBlock Logging
1.5.6Install Software
1.5.7Creating a Template
1.6VM 2: Kali Linux aka “The Attacker”
1.7VM 3: Ubuntu Linux 20.04 aka “The Analyst”
1.7.1Installation
1.7.2Install Software
1.7.2.1Volatility3
1.7.2.2WireShark
2.Performing the Attack
2.1Introduction
2.2Theory
2.2.1What is DLL?
2.2.2What is a DLL-Injection Attack?
2.2.3What is a Command and Control (C2) Stager, Server, and Payload?
2.2.4Further Reading
2.3ATTACK!
2.3.1Getting IPs
2.3.2Generate + Transfer Stager
2.3.3Hit The Record Button
2.3.4Preparing Our Injection Script
2.3.5Injecting Our Malicious DLL
2.3.6Artifact Consolidation
2.4Shenanigans! A (honest) review of our attack
3.Live Analysis: Native Windows Tools
3.1Introduction
3.2Theory
3.3Analysis
3.3.1Connections
3.3.2Processes
3.4Final Thoughts
4.Live Analysis: Process Hacker
4.1Introduction
4.2Theory
4.3Analysis
4.4Final Thoughts
5Post-Mortem Forensics: Memory
5.1Transferring the Artifacts
5.2Introduction to Volatility
5.3Analysis
5.3.1pslist, pstree, and psinfo
5.3.2handles
5.3.3cmdline
5.3.4netscan
5.3.5malfind
5.4Final Thoughts
6Post-Mortem Forensics: Log Analysis
6.1Introduction
6.2A Quick Note
6.3Sysmon
6.3.1Theory
6.3.2Analysis
6.4PowerShell ScriptBlock
6.4.1Analysis
6.5Final Thoughts
7Post-Mortem Forensics: Traffic Analysis
7.1Introduction
7.2Analysis
8Course Review

Return to course page