Pepper Minstix – Yule Log Analysis

We speak to Pepper Minstix, who has been a victim of password spraying!
“We fear that they were successful in accessing one of our Elf Web Access accounts,
but we don’t know which one.
Parsing through .evtx files can be tricky, but there’s a Python script that can help you convert it into XML for easier grep’ing.”

We are given this URL for a hint.

When we open the terminal for Yule Log Analysis were greeted with this.

“I am Pepper Minstix, and I’m looking for your help.
Bad guys have us tangled up in pepperminty kelp!
“Password spraying” is to blame for this our grinchy fate.
Should we blame our password policies which users hate?

Here you’ll find a weblog filled with failure and success.
One successful login there requires your redress.
Can you help us figure out which user attacked?
Tell us who fell victim, and please handle this with tact.

Submit the compromised webmail username to
“run to answer” to complete this challenge.”

So, check the logs. Find the one who fell victim and use run to answer to submit the compromised webmail username.

We have three files “evtx_dump. Py“, “ho-ho-no.evtx” and “runtoanswer” is a python script to “Dump a binary EVTX file into XML” which is for ho-ho-no.evt which is the weblog filled with failure and success and run to answer where we submit our answer.

I am using the command python evtx_dump. Py ho-ho-no.evtx, where given a whole butch of logs.

I could spend hours going through each event and finding who’s user was attacked. However, the challenge is to figure out which user was attacked and “Submit the
compromised webmail username to run to answer to complete this challenge.”
Password Spraying: “Password spraying refers to the attack method that takes a large number of usernames and loops them with a single password.”

So, we need to find which username has logged in more than once. I have an idea!
First let’s run python ho-ho-no.evtx > log.text this will dump all of ho
ho-no.evtx into log.text.

Now let’s look at some of the log’s and find the username prefix, which is “TargetUserName”.

Now we have the prefix; we use grep to find only the TargetUserName parts.
grep -r “TargetUserName” log.text.

Ok! Now have the Usernames we needed, so let’s copy them. So in this case, use this website to paste them in, and this website makes the following “Count Duplicates in a List Online Tool.

So the answer is “minty. candycane”, why? We’ll see because of minty candy cane duplicates itself six times! Which means the password spraying looped this username.

Thinking outside the box here!


Leave a Comment

Your email address will not be published. Required fields are marked *