Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Threat Hunting: Pivoting

Premium room

Hunting suspicious activities indicating threat propagation across the infrastructure.

medium

120 min

8,511

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

Is your organisation's network robust enough to spot lateral movements of adversaries within your systems? Can you detect unusual network activities or illicit privilege escalation that could indicate a pivot attack? Can you use network telemetry and analytics to identify abnormal behaviour and halt lateral movement before it wreaks havoc?

These are essential questions to mull over when considering the critical pivoting stage in the cyber kill chain. Cyber threat actors, every day, devise innovative methods to move laterally within compromised networks, exploiting credentials, network misconfigurations or unpatched software to extend their foothold. As a security team, you are responsible for safeguarding the network perimeter and continuously monitoring for anomalous internal activities to intercept the attackers during their stealthy lateral movement. The task can be overwhelming, given the subtle nature of pivot attacks and the tenacity of modern cyber criminals.

Learning Objectives

In this room, we will learn to hunt malicious activity indicating a potential internal network pivoting in continuation of achieving an initial foothold. In addition, we will tackle the following topics throughout the room:

  • Understanding the attacker's mindset in moving inside the compromised internal network.
  • Correlating succeeding actions executed by an attacker after establishing persistent and continuous internal access.
  • Differentiating suspicious host and network events from benign ones. 
  • Getting acquainted with the Tactics involved once an attacker attempts to jump from one machine to another.

Prerequisites

It is suggested to clear the following rooms first before proceeding with this room:

Threat Hunting Virtual Machine

Before we proceed with the following tasks, start the Threat Hunting  attached to this task by clicking the Start Button in the upper-right corner. The provided virtual machine runs an elastic stack (), which contains the logs that will be used throughout the room.

Once the machine is up, access the console using the following credentials below. The instance may take up to 3-5 minutes to initialise.

TryHackMe Credentials
URL ://MACHINE_IP
Username elastic
Password elastic

Before we proceed, note that all concepts discussed moving forward are not limited to the Elastic Query syntax (including all field names). Every theoretical way of hunting can be applied to any other / platform.

Moreover, the instance contains the following indices that will be used in the threat-hunting activity:

  • Winlogbeat - Contains all events (Windows Event Logs and ) generated by Windows machines. 
  • Packetbeat - Contains network traffic events generated by the workstations and servers.

Lastly, the emulated network runs the following workstations and servers:

HostOperating SystemPurpose
INTSRV01Windows Server 2019Server running an internal web application used by the organisation.
WKSTN-1Windows 10One of the workstations used by the employees.
WKSTN-2Windows 10One of the workstations used by the employees.
DC01Windows Server 2019Domain controller of the internal network.
Answer the questions below
I have started the VM and now ready to hunt!

Ready to learn Cyber Security?

The Threat Hunting: Pivoting room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.