National CCDC 2019 Red Team Debrief

National CCDC 2019 Red Team Debrief - Hacking Exposed by David Cowen


Hello Reader,


Daily Blog #660: Solution Saturday 4/13/19 - Dropbox Audit Logs Challenge






Hello Reader,
           This weeks winner only recently discovered the blog and the contests therein. Why bring this up? It shows that you don't have to be around for years to have a chance at winning a Sunday Funday. In Michael's case he posted a comment with an answer and sent me an email, and when he is getting in reply today is a winning answer. Congratulations Michael Bryan!




Question: 
For Dropbox Audit logs what all data can you determine about someone who was logged in?
What allows you to unique identify a file?
The Winning Answer:

Master Deputy Michael Bryan

Dropbox Audit Logs or Activity Logs are a feature of the Dropbox business accounts. The Advanced Team accounts include file level Audit logs as a part of the paid service. These logs are accessible from the Account Console which available the account administrator or administrators. The console provides very detailed information about team member’s usage of the account and nearly all facets of the members’ interactions are recorded and can be reviewed. The following items can be viewed in the Console of an advanced account regarding FILES:
Added a file
Added a file to their Dropbox
Added a file to their Dropbox (non-team member)
Added a folder
Allowed anyone to view links to files in a shared folder
Allowed file request emails for the team
Allowed non collaborators to view links to files in a shared folder
Allowed only team members to view links to files in a shared folder
Changed a file request
Closed a file request
Copied a file
Copied a file to their Dropbox
Copied a file to their Dropbox (non-team member)
Copied a folder
Created a link to a file using an app
Created a new file request
Deleted a file
Deleted a file comment
Deleted a folder
Disabled file requests
Downloaded a file (non-team member)
Downloaded files
Edited files
Enabled file request emails for everyone
Enabled file requests
Failed to delete some files remotely
File added to a showcase
File downloaded (non-team member) from a showcase
File downloaded (team member) from a showcase
File in showcase viewed by non-team member
File in showcase viewed by team member
File removed from a showcase
Liked a file comment
Made a file viewable only to members of the file
Made a file viewable only to team members with the link
Made a file viewable to anyone with the link
Moved a file
Moved a folder
Multiple files downloaded (non-team member) from a showcase
Multiple files downloaded (team member) from a showcase
Opened a file (non-team member)
Prevented non-team members from viewing links to files in a shared folder
Previewed files
Received files via file request
Received files via file request
Renamed a file
Renamed a folder
Requested access to a file (non-team member)
Resolved a file comment
Restored a file
Restored a folder
Restored a resolved file comment
Reverted files to a previous version
Rolled back file changes
Subscribed to file comment notifications
Successfully deleted some files remotely
Unliked a file comment
Unsubscribed from file comment notifications

Additionally, the audit logs maintain information about the users themselves. An administrator can see the following regarding member uses:
The date and time of the event
The member who initiated the event
The details of the event
The location in the form of an IP address of the team member
The logs detail who are the active team members of the last 28 days, the number of shared folders over the last 28 days, how much storage space is used, the number of links created, and a log of what devices are accessing the account over the previous 28 days. From the console you can also monitor password changes, sign ins, connected apps, changes in sharing, changes in groups, and changes in membership. 

The files specific path and file name along with the connected user interactions would allow an administrator to identify a file in the log data.

The information for this initial and feeble attempt at an answer was gathered from poking around the internet and reading Dropbox.com helps files, Dropboxforum posts and two blogs written by “Kevin” on metadatum.wordpress.com (who actual cites the author of this challenge in his 2013 post about Dropbox forensics.) 

Also Read: Daily Blog #659

Daily Blog #659: Sunday Funday 4/7/19 - Dropbox Audit Logs Challenge

Dropbox Audit Logs Challenge by David Cowen



Hello Reader,
           Sounds like Google Compute DFIR knowledge must be sparse based on the responses I've gotten .. namely none! So let's change platforms to see how well you know PaaS, Platform as a Service specifically Dropbox.

The Prize:

$100 Amazon Giftcard

The Rules:

  1. You must post your answer before Friday 4/12/19 7PM CST (GMT -5)
  2. The most complete answer wins
  3. You are allowed to edit your answer after posting
  4. If two answers are too similar for one to win, the one with the earlier posting time wins
  5. Be specific and be thoughtful
  6. Anonymous entries are allowed, please email them to dcowen@g-cpartners.com. Please state in your email if you would like to be anonymous or not if you win.
  7. In order for an anonymous winner to receive a prize they must give their name to me, but i will not release it in a blog post


The Challenge:
For Dropbox Audit logs what all data can you determine about someone who was logged in?
What allows you to unique identify a file?

Also Read: Daily Blog #658

Daily Blog #658: MUS 2019 DFIR CTF Perfect Score Achieved

MUS 2019 DFIR CTF Perfect Score Achieved

Hello Reader,
           Just a note that we already have a perfect score winner!

MUS 2019 DFIR CTF Perfect Score Achieved


Congratulations to Plop aka Bastien Lardy who I will be contacting about their prize!

The CTF will remain up for quite some time to allow all of you a chance to learn and get ready for the big DFIR CTF of the year, the Defcon Unofficial DFIR CTF!

Also Read: Daily Blog #657

Daily Blog #657: MUS2019 DFIR CTF Open to the Public

MUS2019 DFIR CTF Open to the Public



Hello Reader,
    The DFIR CTF that we ran at the magnet user summit is now open to the public.

You can download the evidence and a 30 day license key for Magnet Axiom here:
https://drive.google.com/drive/u/0/mobile/folders/1E0lELj9NouMwSMGZCI7lXWRqYE2uQCpW?usp=sharing

You can register for the CTF and play here:
https://mus2019.ctfd.io/

Daily Blog #656: Forensic Lunch 4/3/19 Live from MUS2019 with Kevin Pagano, Jessica Hyde, and Jad Saliba

Forensic Lunch 4/3/19 Live from MUS2019

Hello Reader,
           Today we had a Forensic Lunch live from the Magnet User Summit 2019 with guests:
  • Kevin Pagano talking about his experience playing (and winning) the MUS2019 DFIR CTF
  • Jessica Hyde and Jad Saliba talking about whats next for Magnet 
You can watch the video here:


Also Read: Daily Blog #655

Daily Blog #655: Magnet User Summit DFIR CTF 2019 Results

Magnet User Summit DFIR CTF 2019 Results


Hello Reader,
             We had a great CTF today that will soon be released to the public. I'm happy to announce the top three winners.

#1 Kevin Pagano
#2 Jonathan Rajewski
#3 Santiago Ayala

Prizes were given away and more prizes await those who will now compete in the online public offering that will be released Thursday Until then you can see the current scoreboard here:


https://mus2019.ctfd.io/scoreboard

You can also register for an account in expectation of Thursday, the CTF is currently paused until then.