Threat Hunting and Log Analysis Workshop - Part 1

Workshop Resource Link: https://update.gravwell.io/archive/threathunt-workshop/1/
Join us on Discord: https://discord.com/invite/gravwell

CTF Scenario

In this scenario, you have been tapped as an expert to help an organization investigate a potential breach.The threat hunting team lead has a hypothesis that the attackers were able to obtain access through the ssh daemon in April. Your task is to test that hypothesis and provide a report of activity during that period.

In this directory is auth.log data. You first need to stand up a Gravwell instance and ingest the data (via the GUI is easiest). Then, please answer the questions below using Gravwell search.

The following questions serve as a bit of a "roadmap" to this hunt:
How many entries are there for this time period?
How many failed entries are there for this time period?
Provide a time series bar chart of users who have successfully logged in during this time period and the query used to generate it.
Provide a geographical map of all login attempts (successful or not) during this time period and the query used to generate it. (our network enrichment kit will help)
How many successful logins occurred during this period?
Provide a stackgraph chart of the count of successful authorizations by accounts and their login methods.

Extrapolations :
Do you confirm or reject the threat hunting hypothesis?
If confirm, please explain your thoughts and provide evidence of compromise.
If reject, please explain your thoughts and provide any evidence or searches backing that conclusion.

Useful links for standup and ingestions are:
https://www.gravwell.io/community-edition - Get a Community Edition license
https://docs.gravwell.io/quickstart/quickstart.html
https://hub.docker.com/r/gravwell/gravwell/
https://github.com/gravwell/gravwell/tree/master/ingesters

Complete form to access webinar