Skip to content

trixiahorner/DeepBlueCLI

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 

Repository files navigation

Beyond EDR and XDR: Using DeepBlueCLI to Identify Bypass Techniques

Relying solely on Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) platforms is insufficient. While these tools provide significant protection, attackers continually develop sophisticated methods to bypass them. This lab writeup explores the use of DeepBlueCLI, a powerful command-line tool for analyzing Windows Event Logs, to detect potential security incidents that may evade EDR and XDR systems. Specifically, I will demonstrate how to use DeepBlueCLI to identify new user additions, password spray attacks, and obfuscation techniques.

Environment

This lab is part of Antisyphon Training's SOC Core Skills course with John Strand. Visit Antisyphon for more information.

Setup

  1. Navigate to the DeepBlueCLI directory
  2. Enter powershell
  3. Set-ExecutionPolicy unrestricted so we can run the scripts without any restrictions
cd \tools\DeepBlueCLI-master
powershell
Set-ExecutionPolicy unrestricted

set-execution

Methodology

Check for new user add

It is very common for attackers to add additional users on to a system they have compromised. This gives them a level of persistence that they otherwise would not gain with malware. Why? There are lots and lots of tools to detect malware. By creating an extra user account it allows them to blend in.
I check the .evtx files for adding a new user. (Choose R when prompted)

.\DeepBlue.ps1 .\evtx\new-user-security.evtx

user add
There are 2 entries where new users were added. The first entry with 'username -' shows a user added to the local Administrators group and is worth investigating.

Detecting password attacks

Another attack that very few SIEMs detect is password spraying. This is where an attacker takes a user list from a domain, and sprays it with the same password. Password sprays are effective because it keeps the lockout threshold below the lockout policy and many times flies under the radar simply because accounts are not getting locked out. But, this is the exact behavior that UEBA should be able to detect.

Let's look at an event log with a password guessing attack. This is very much part of what a full UEBA(User and Entity Behavior Analytics) solution does:

.\DeepBlue.ps1 .\evtx\smb-password-guessing-security.evtx

password guess
Here I see 3560 failed login attempts for for the administrator account. This is a very clear indication of a password attack against a single account.

Let's see what a password spray looks like.

.\DeepBlue.ps1 .\evtx\password-spray.evtx

password spray
I notice a bunch of user accounts that are trying to be accessed. And they are all trying to be acced from one user: jwrig. A single password against multiple accounts.

Idnetifiying encoding/obfuscation tactics

Finally, I take a look at how DeepBlueCLI detects various encoding tactics that attackers use to obfuscate their attacks. It is very common for attackers to use a number of encoding techniques to bypass signature detection. However, it is not something that normally happens with standard scripts.

.\DeepBlue.ps1 .\evtx\Powershell-Invoke-Obfuscation-encoding-menu.evtx

obfuscation
obfuscation

Conclusion

Understanding these detection methods is crucial for maintaining robust security postures and highlights the importance of augmenting automated defenses with detailed log analysis. This lab highlights the reasons why it is so important to go beyond automated defenses and include detailed log analysis in your security strategy.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published