Incident Response: Azure Log Analysis

  Рет қаралды 63,146

John Hammond

John Hammond

6 ай бұрын

jh.live/pwyc || Jump into Pay What You Can training at whatever cost makes sense for you! jh.live/pwyc
Free Cybersecurity Education and Ethical Hacking
🔥KZfaq ALGORITHM ➡ Like, Comment, & Subscribe!
🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware

Пікірлер: 83
@Logan-vw8bg
@Logan-vw8bg 6 ай бұрын
Came back to reference some of your syntax for the THM Advent of Cyber ;) . Always so helpful John, thanks for everything you contribute to the community.
@samadams4582
@samadams4582 6 ай бұрын
Another thing that I noticed. There were 2 RMM tools running on that workstation, Ninja and CW Automate. Typically MSPs have only 1 RMM configured, unless they are transitioning over to another one. Some threat actors are utilizing RMM tools to backdoor into remote systems.
@zedsec
@zedsec 6 ай бұрын
Someone finally making blue teaming sexy! Would have been interesting to see this from a Log Analytics Workspace to make it more real-world
@MyDFIR
@MyDFIR 6 ай бұрын
Johns expression thumbnail is me when I see RMM on a DC - Great video❤
@olevalente6523
@olevalente6523 6 ай бұрын
Entertaining and easily digestible information. Good job!
@paritoshbhatt
@paritoshbhatt 6 ай бұрын
Nicely Explained ! Great Video Man.
@kevinportillo1971
@kevinportillo1971 6 ай бұрын
I usually go through logs just to find what and when the original moment of compromise took place, unless the tenant has the enhanced security protections license for Explorer then it makes it easier to even prevent the threat.
@iConk3r
@iConk3r 6 ай бұрын
So this video went from: User's Azure AD account was compromised -> Ad Break -> Now they have a foot hold in the work station. How?? Just because you have access to someone's Azure Credentials doesn't automatically give you remote access to their workstation. Can you expand a bit on how they would pivot from Azure AD to accessing a device on the network?
@biglike7981
@biglike7981 5 ай бұрын
No mention of how they bypassed 2fa after compromising the acct. Very informative video. Really enjoyed it.
@86ajmn
@86ajmn 4 ай бұрын
They did mention that, aka cookie stealer. Keep learning young padawan.
@bestsellervideos
@bestsellervideos 6 ай бұрын
Congratulations on 1 Million!!!! 🙌🙌🙌
@MsDuketown
@MsDuketown 6 ай бұрын
For sh automation the cut command has been replaced oldfashioned ways of detecting delimiters, like an obedient master-slave rekation tied to ever-lasting upgrading systems and EoL OS'es. setting up an Azure Workspace makes more sense. Or reuse something incidents reports with webparts. Excel is handy for manual digging and finding patrons based om experience.
@landless-wind
@landless-wind 6 ай бұрын
big thanks PCA from philippines
@malvinportner
@malvinportner 6 ай бұрын
If you buy the on-demand access for antisyphontraining, do you get access to all the courses or just to the selected course?
@hawks5196
@hawks5196 6 ай бұрын
Could you do some more Virus analysis? I’m not even in the industry but I love watching you pick apart and de-obfuscate viruses code. I had no idea people went to those extents to avoid detection. Some of them do stupid messy tricks, but some you have pulled apart and they seem insanely clever! Love learning about it all, even if I will never use the skills/knowledge 😂
@user-cc1uu1zh7n
@user-cc1uu1zh7n 5 ай бұрын
A smile is a light in the window of your face to show your heart is at home.
@mattoney3805
@mattoney3805 6 ай бұрын
Thank you, great stuff!!
@dyarizadeh3
@dyarizadeh3 6 ай бұрын
Just a note - I don't think file auditing is on by default (please correct me if I'm wrong) in many orgs, so don't always expect to find ID 4663
@dyerseve3001
@dyerseve3001 5 ай бұрын
It used to be that way with 365 tenants but it's on by default now.
@mateusgodoy5060
@mateusgodoy5060 6 ай бұрын
Amazing video. Congratulations!
@LtChachee
@LtChachee 6 ай бұрын
What course was this for? I can't seem to find it on the site.
@user-pz4nr9dv3l
@user-pz4nr9dv3l 5 ай бұрын
If you love someone, set them free. If they come back they're yours; if they don't they never were.
@DrDoktor60
@DrDoktor60 6 ай бұрын
KQL my dude. No one does log analysis like that in Azure
@Soup69God
@Soup69God 6 ай бұрын
even using Excel would be better lol
@kevinportillo1971
@kevinportillo1971 6 ай бұрын
I hate how several KQL templates don’t work right off the bat.
@forid200
@forid200 6 ай бұрын
John is just doing things how he's comfortable, I guess as long as you get the end result. That's all that matters.
@Agile691
@Agile691 6 ай бұрын
This is the best way, how would you do that?
@krshn4n
@krshn4n 6 ай бұрын
sometimes you have to deal with raw logs. sentinel and log analytics ease up the hunt but no harm in learning to dig through raw logs
@davidaustin967
@davidaustin967 6 ай бұрын
This raises an interesting question about how long you should retain logs.
@Wahinies
@Wahinies 6 ай бұрын
Definitely a consideration because the default for Azure is 30 days which is inadequate. The maximum was raised to 180 days but just to CYA the correct answer is "as long as feasible" which means rolling into permanent storage.
@Agile691
@Agile691 6 ай бұрын
Simply awesome 👏👏👏🎊
@user-dj3ns7ds2j
@user-dj3ns7ds2j 5 ай бұрын
I'd always thought lightning was something only I could see.
@eliemassaad5720
@eliemassaad5720 6 ай бұрын
Did you try to analyze Azure Log with Wazuh ?
@balajisharathkumar9753
@balajisharathkumar9753 6 ай бұрын
this video is very amaing video john as a bule team investigate like me should know these type of attacks in detail thanks for sharing 🤩🤩🤩🤩🤩🤩🤩🤩🤩💖💖💖💗💗
@HLSiTech
@HLSiTech 6 ай бұрын
Did we have a CVE about that? 🤔
@raycordero01
@raycordero01 5 ай бұрын
SIMPLY AWESOME!
@user-gd4mn9kw5k
@user-gd4mn9kw5k 5 ай бұрын
It's important to remember to be aware of rampaging grizzly bears.
@user-jt5qu8ir4e
@user-jt5qu8ir4e 5 ай бұрын
As long as your going to be thinking anyway, think big.
@davidbl1981
@davidbl1981 6 ай бұрын
Login cred spraying to knowing the users MFA heh .. the “thin red line” kinda blows …😅
@nsnsuplementos2397
@nsnsuplementos2397 5 ай бұрын
That’s crazy my wiggaz
@kevinportillo1971
@kevinportillo1971 6 ай бұрын
NinjaRMM and CyberCNS??? They should have been able to detect the threat.
@dyarizadeh3
@dyarizadeh3 6 ай бұрын
Just curious, incase anyone picked up on it, did they say how the attacker initially accessed the device (pivot from cloud to disk)? I might be confused, but later in the video we look at security logs on the user's device, but it looks like there was a password spray against a specific application (possibly Azure portal?) hosted in the cloud. Thanks!
@KrysticsCorner
@KrysticsCorner 6 ай бұрын
The DC in this example is in the Azure environment. It logged the pw spray including failures and the successfully compromised user - Afterwards, 10:45 you were shown that compromised user manipulating machines because they already had that users access into the environment. The machine in this case "WS-3" was likely a VDI from Azure, thus already in the environment. If it was physical and in a separate location with Azure AD, it could still be compromised, though we would probably be looking at attempts to use Onedrive or some other vector to have access to the machine. The exercise does not explicitly describe the physical vs virtual desktop scenario and you are only meant (IMO) to be looking at what was done with the Azure account (which would have been possible in either scenario once the actor had access to interactive login).
@dyarizadeh3
@dyarizadeh3 6 ай бұрын
Azure VDI interesting take/great insight thank you
@iConk3r
@iConk3r 6 ай бұрын
@@KrysticsCorner But WS3 wasn't the original foothold. WS1 was. How did the threat actor get WS3 to reach out to WS1's SMB share with no control over it, download and execute the payload? Workstations aren't going to just arbitrarily reach out to any host serving SMB shares and download things. This exercise seems to take a lot of liberties and doesn't demonstrate a real world scenario. There's a lot of assumptions and cut corners here.
@KrysticsCorner
@KrysticsCorner 6 ай бұрын
@@iConk3r I've seen this happen real world. It isn't that a machine normally does this, simply that it is possible. In my scenario the Dom creds were not MFA protected, however, and the machines were physical. I wish I understood more about the micro level of Microsoft auth in the background here, but I don't have enough info to help further right now. Apologies.
@user-ot2jl3ww5z
@user-ot2jl3ww5z 5 ай бұрын
Remember always that you not only have the right to be an individual, you have an obligation to be one.
@TheYossi86
@TheYossi86 6 ай бұрын
So how did they bypass the 2 factor authentication in the beginning? It doesn't say.
@themariokartlick
@themariokartlick 6 ай бұрын
@@wildstorm74users not being educated is basically a given and not a good excuse for a security team. There were many steps along the way where these attack steps could have been mitigated, detected, and even outright prevented. Security admins who blame end users are lazy and limit their own potential to actually implement cool and fun shit
@TheYossi86
@TheYossi86 6 ай бұрын
@@wildstorm74 yeah but the initial access itself needed 2FA and it doesn't say how he bypassed the initial 2FA.
@HexNebula
@HexNebula 6 ай бұрын
@@wildstorm74 Prolly the user accepted MFA by accident - or was tricked through social engineering to accept it. ... Cookies would mean no password or MFA would be needed, it'd become an anomalous token As the ID was bruteforced/sprayed... Cookie/token hijack isn't the case, as they're raising unnecessary alarm bells
@Soup69God
@Soup69God 6 ай бұрын
@@HexNebula MFA was via TXT which means that the token would have logically had to have been stolen via spearphishing. Plus, number matching is enforced in Azure so unless MFA is phone call, the user cant just click "yes" and log in. Token theft or sim swap are likely, but sim swap is very very rare.
@TylerFugate
@TylerFugate 6 ай бұрын
@@Soup69GodMost likely a targeted phish after the successful password entry. John misspoke when he says the successes for Paul Bowman were later in the same minute, it was 49 minutes after. The attacker would have had time to perform an AitM attack targeted at Paul Bowman, possibly leveraging his known password as a way to gain trust. Although, an AitM attack doesn't require knowledge of the password, so it could be something else entirely.
@BrutusMaximusAurelius
@BrutusMaximusAurelius 6 ай бұрын
What triggered the investigation? Did we just randomly hunt or was something malicious detected?
@MrPapaFate
@MrPapaFate 6 ай бұрын
I think in this case the amount of failed logins within a certain timeframe would cause an alert. Not sure if its the same for like "all users" vs per user though.
@j_t_eklund
@j_t_eklund 6 ай бұрын
Bad security check design, it should ask for a new 2fa for the existing cookie to after a ip change. It is a separate login..
@Sonyboj
@Sonyboj 5 ай бұрын
ah good , something that is useful finally
@xXhotshot55Xx
@xXhotshot55Xx 6 ай бұрын
I feel like it'd be a lot easier to sort through this data in excel instead of using a text editor for a csv file.
@cristophersoto1244
@cristophersoto1244 5 ай бұрын
That's true,
@86ajmn
@86ajmn 4 ай бұрын
If its easier for YOU, then thats great. Use whatever tools you can. the point is CSV means comma seperated so whatever can deal with that is fine. For me I use Sentintel which has all of the count and sort functions he used here built into the tool.
@casfren
@casfren 6 ай бұрын
i still don't understand how did they bypass 2fa. I would really appreciate a explanation.
@KrysticsCorner
@KrysticsCorner 6 ай бұрын
They did not have to bypass it directly. They used cookies that still had valid access from an authenticated session.
@casfren
@casfren 6 ай бұрын
@@KrysticsCorner I was talking about the first one. I get how though malware you can steal cookies. But the first account should have been protected by 2FA right? How did they bypass that?
@grimtrigg3r
@grimtrigg3r 6 ай бұрын
@@casfrenthere are a few ways, but Evilproxy phishing is one common effective method. Google evilproxy, non FIDO2 mfa methods are vulnerable to this attack.
@dyerseve3001
@dyerseve3001 5 ай бұрын
​@@casfren I don't think that was covered in the video, but the training is out there for you to look at on your own.
@ca7986
@ca7986 6 ай бұрын
Imagine being Paul.
@user-tg7ni2be6k
@user-tg7ni2be6k 5 ай бұрын
Slow down and everything you are chasing will come around and catch you.
@ReligionAndMaterialismDebunked
@ReligionAndMaterialismDebunked 6 ай бұрын
Early crew.
@adrianocaporro639
@adrianocaporro639 4 ай бұрын
Is this incident response on try and hack me or any other platform?
@Zachsnotboard
@Zachsnotboard 6 ай бұрын
azure has a GUI for all of this lol
@steingat
@steingat 6 ай бұрын
Whats Azure? Microsoft tells me that theres only Entra ID these days...... /sarcasm
@ac0rpbg
@ac0rpbg 6 ай бұрын
All this is assuming the offender put 0 effort in wiping the logs :D
@igyxo1439
@igyxo1439 5 ай бұрын
So you are doing incident response by looking into csv files? Yeah, that's efficient. 🤣 I'm stopping to watch now.
@Benmaluco9
@Benmaluco9 6 ай бұрын
1st
@Ec1Ipc3
@Ec1Ipc3 6 ай бұрын
Congrats
@anonsforever_
@anonsforever_ 6 ай бұрын
I am a noob. I have no idea what's going on here but I been falling asleep to hacker videos so a lot of these words are starting to sound familiar to me. I'm like a toddler for example, learning english for the very first time. 😅
This Company Got Hacked... but HOW?
19:00
John Hammond
Рет қаралды 89 М.
He tried to hack me...
34:15
John Hammond
Рет қаралды 374 М.
WHY DOES SHE HAVE A REWARD? #youtubecreatorawards
00:41
Levsob
Рет қаралды 38 МЛН
Black Magic 🪄 by Petkit Pura Max #cat #cats
00:38
Sonyakisa8 TT
Рет қаралды 32 МЛН
ELE QUEBROU A TAÇA DE FUTEBOL
00:45
Matheus Kriwat
Рет қаралды 26 МЛН
Monitoring and Incident Response in Azure AD
41:31
SANS Cyber Defense
Рет қаралды 3,9 М.
This Cybercrime Group Puts Its Hackers Through School
18:37
John Hammond
Рет қаралды 72 М.
Exploring Ransomware Builders
50:00
Cyber from the Frontlines
Рет қаралды 1,5 М.
Incident Response Plan based on NIST- Daniel's Security Academy
16:05
Daniel's Security Academy
Рет қаралды 3,4 М.
Bruteforcing MFA & Fail2ban Manipulation - TryHackMe! (Biteme)
44:38
I Hacked The Cloud: Azure Managed Identities
29:29
John Hammond
Рет қаралды 60 М.
i BACKDOORED a Desktop Shortcut (to run malware)
13:58
John Hammond
Рет қаралды 75 М.
How Hackers Can Bypass Your Security Defenses
19:31
John Hammond
Рет қаралды 52 М.
Cyber Security Incident Response - How SOC Responds, See LIVE
25:55
WHY DOES SHE HAVE A REWARD? #youtubecreatorawards
00:41
Levsob
Рет қаралды 38 МЛН