Question: While working on threat detection content development you observe some odd activity in the firewall logs. You notice a number of allowed HTTP connections outbound

While working on threat detection content development you observe some odd activity in the firewall logs. You notice a number of allowed HTTP connections outbound from a client's environment (Client IP - 192.168.10.15) towards a Russian IP address - 185.211.245.198. After further investigation you notice these HTTP connections seem to happen on a regular basis, even during off hours, in what looks to be a pattern. You know that this client's IP belongs to one of their user subnets and that this client has no business with or in Russia. We have no IDS or Anti-virus alerts for this device at this time.
Please write up an escalation case communicating the observations, level of concern, and recommended actions to the client.
Challenges
Challenge 1
We've received an alert about a Brute Force attempt on this user. Based on the Windows Event Log below, please answer the following questions:
1. What is the account name associated with the login failures?
2. What system is this user attempting to authenticate from?
3. What domain controller are they attempting to authenticate to?
4. What does Logon Type 3 mean and what does that signify?
5. What type of authentication was used?
6. What's the other most common Windows logon authentication?
7. What do the Status and Sub Status codes mean and what does that tell us?
8. Can you conclude the investigation as a likely Brute Force event or a False Positive, and why or why not?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!