Relying solely on Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) platforms is insufficient. While these tools provide significant protection, attackers continually develop sophisticated methods to bypass them. This lab writeup explores the use of DeepBlueCLI, a powerful command-line tool for analyzing Windows Event Logs, to detect potential security incidents that may evade EDR and XDR systems. Specifically, I will demonstrate how to use DeepBlueCLI to identify new user additions, password spray attacks, and obfuscation techniques.
This lab is part of Antisyphon Training's SOC Core Skills course with John Strand. Visit Antisyphon for more information.
- Navigate to the DeepBlueCLI directory
- Enter powershell
- Set-ExecutionPolicy unrestricted so we can run the scripts without any restrictions
cd \tools\DeepBlueCLI-master
powershell
Set-ExecutionPolicy unrestricted
It is very common for attackers to add additional users on to a system they have compromised. This gives them a level of persistence that they otherwise would not gain with malware. Why? There are lots and lots of tools to detect malware. By creating an extra user account it allows them to blend in.
I check the .evtx files for adding a new user. (Choose R when prompted)
.\DeepBlue.ps1 .\evtx\new-user-security.evtx
There are 2 entries where new users were added. The first entry with 'username -' shows a user added to the local Administrators group and is worth investigating.
Another attack that very few SIEMs detect is password spraying. This is where an attacker takes a user list from a domain, and sprays it with the same password. Password sprays are effective because it keeps the lockout threshold below the lockout policy and many times flies under the radar simply because accounts are not getting locked out. But, this is the exact behavior that UEBA should be able to detect.
Let's look at an event log with a password guessing attack. This is very much part of what a full UEBA(User and Entity Behavior Analytics) solution does:
.\DeepBlue.ps1 .\evtx\smb-password-guessing-security.evtx
Here I see 3560 failed login attempts for for the administrator account. This is a very clear indication of a password attack against a single account.
Let's see what a password spray looks like.
.\DeepBlue.ps1 .\evtx\password-spray.evtx
I notice a bunch of user accounts that are trying to be accessed. And they are all trying to be acced from one user: jwrig. A single password against multiple accounts.
Finally, I take a look at how DeepBlueCLI detects various encoding tactics that attackers use to obfuscate their attacks. It is very common for attackers to use a number of encoding techniques to bypass signature detection. However, it is not something that normally happens with standard scripts.
.\DeepBlue.ps1 .\evtx\Powershell-Invoke-Obfuscation-encoding-menu.evtx
Understanding these detection methods is crucial for maintaining robust security postures and highlights the importance of augmenting automated defenses with detailed log analysis. This lab highlights the reasons why it is so important to go beyond automated defenses and include detailed log analysis in your security strategy.


