Part 4
Some of SOPs
🚨 Exploitation of Remote Services
🔍 1. Attack Breakdown
📝 What is Exploitation of Remote Services?
📑 Why Attackers Exploit Remote Services?
📌 Common Exploited Services and Techniques
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Trace Failed Authentication Attempts
2️⃣ Identify Active Remote Sessions
3️⃣ Inspect Process Activity Related to Remote Services
4️⃣ Check Open Ports
5️⃣ Review Suspicious Network Connections
🔧 4. Remediation Steps
📌 1. Terminate Unauthorized Sessions
📌 2. Disable Unused Remote Services
📌 3. Reset Compromised Accounts
📌 4. Block Suspicious IPs
📌 5. Patch Known Vulnerabilities
📌 6. Enable Network Level Authentication (NLA) for RDP
📌 7. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 File and Directory Discovery: Advanced Threat Analysis
🔍 1. Attack Breakdown
📝 What is File and Directory Discovery?
📑 Why Attackers Use File and Directory Discovery?
📌 Common Techniques for File and Directory Discovery
📊 Common Tools Used
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Identify Suspicious File Access Commands
2️⃣ Trace Process Tree
3️⃣ Inspect Access to Sensitive Folders
4️⃣ Identify Recently Accessed Files
5️⃣ Analyze Command History
🔧 4. Remediation Steps
📌 1. Revoke Unnecessary File Permissions
📌 2. Monitor Critical Directories
📌 3. Quarantine Suspicious Processes
📌 4. Remove Unauthorized Access
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Persistence via Registry Run Keys/Startup Folder
🔍 1. Attack Breakdown
📝 What is Persistence via Registry Run Keys/Startup Folder?
📑 Why Attackers Use These Techniques?
📌 Common Techniques for Persistence
📌 Example Commands
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Identify Malicious Registry Entries
2️⃣ Analyze Startup Folder
3️⃣ Trace Malicious Processes
4️⃣ Inspect Services for Persistence
5️⃣ Review Scheduled Tasks
🔧 4. Remediation Steps
📌 1. Remove Malicious Registry Keys
📌 2. Delete Malicious Startup Files
📌 3. Disable Malicious Services
📌 4. Terminate Suspicious Processes
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Valid Accounts: Default Accounts
🔍 1. Attack Breakdown
📝 What is Default Account Exploitation?
📑 Why Attackers Target Default Accounts?
📌 Common Default Accounts and Services
📌 Common Techniques for Exploiting Default Accounts
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Identify Enabled Default Accounts
2️⃣ Trace Account Activity
3️⃣ Review Remote Access Logs
4️⃣ Check SQL Server Login Logs
🔧 4. Remediation Steps
📌 1. Disable Unused Default Accounts
📌 2. Enforce Strong Passwords for Default Accounts
📌 3. Remove Default Accounts from Admin Groups
📌 4. Monitor SQL Server sa Account
sa Account📌 5. Enable Account Lockout Policies
📌 6. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Data Transfer Size Limits
🔍 1. Attack Breakdown
📝 What is Data Transfer Size Limit Abuse?
📑 Why Attackers Manipulate Data Transfer Size?
📌 Common Techniques for Data Transfer Size Manipulation
📌 Common Attack Scenarios
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Analyze Network Traffic
2️⃣ Inspect Compressed/Archived Files
3️⃣ Trace DNS Queries for Data Transfer
4️⃣ Review HTTP/S Traffic for Repeated Small Transfers
🔧 4. Remediation Steps
📌 1. Block Malicious IPs
📌 2. Quarantine Suspicious Files
📌 3. Terminate Malicious Processes
📌 4. Monitor DNS Traffic for Tunneling
📌 5. Enable Data Loss Prevention (DLP) Policies
📌 6. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Process Doppelgängingysis
🔍 1. Attack Breakdown
📝 What is Process Doppelgänging?
📑 Why Attackers Use Process Doppelgänging?
📌 How Does Process Doppelgänging Work?
📌 Common Tools for Process Doppelgänging
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Trace Suspicious Processes
2️⃣ Inspect Memory Regions
3️⃣ Analyze NTFS Transactions
4️⃣ Check Recent Executable Activity
5️⃣ Trace DLL Injections
🔧 4. Remediation Steps
📌 1. Terminate Suspicious Processes
📌 2. Remove Malicious Files
📌 3. Clear NTFS Transaction Logs
📌 4. Isolate Compromised Hosts
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Spearphishing via Service: Advanced Threat Analysis
🔍 1. Attack Breakdown
📝 What is Spearphishing via Service?
📑 Why Attackers Use Spearphishing via Service?
📌 Common Techniques Used in Spearphishing via Service
📌 Common Attack Scenarios
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Analyze Malicious URLs
2️⃣ Inspect OAuth Grants
3️⃣ Trace Malicious Downloads
4️⃣ Inspect User Activity
5️⃣ Check OAuth Audit Logs
🔧 4. Remediation Steps
📌 1. Revoke OAuth Permissions
📌 2. Quarantine Malicious Files
📌 3. Block Malicious URLs
📌 4. Reset Compromised Accounts
📌 5. Terminate Malicious Processes
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
Last updated