This is my TryHackMe walkthrough, created to document my learning journey and share solutions with the community. The writeups include a mix of hints, step-by-step explanations, and final answers to help players who get stuck, while still encouraging independent problem-solving.
Unified Kill Chain Room - The Unified Kill Chain is a framework which establishes the phases of an attack, and a means of identifying and mitigating risk to IT assets.
Overview
- Room URL: https://tryhackme.com/room/unifiedkillchain
- Difficulty: Easy
- Time to complete: 40
Walkthrough
1. Introduction
No hints needed!
2. What is a “Kill Chain”
Where does the term "Kill Chain" originate from?
For this answer, you must fill in the blank!: The ********
=> Answer: military
3. What is “Threat Modelling”
- What is the technical term for a piece of software or hardware in IT (Information Technology?)
=> Answer: asset
4. Introducing the Unified Kill Chain
- In what year was the Unified Kill Chain framework released?
=> Answer: 2017
According to the Unified Kill Chain, how many phases are there to an attack?
=> Answer: 18
What is the name of the attack phase where an attacker employs techniques to evade detection?
=> Answer: Defense Evasion
What is the name of the attack phase where an attacker employs techniques to remove data from a network?
=> Answer: Exfiltration
What is the name of the attack phase where an attacker achieves their objectives?
=> Answer: Objectives
5. Phase: In (Initial Foothold)
- What is an example of a tactic to gain a foothold using emails?
=> Answer: Phishing
Impersonating an employee to request a password reset is a form of what?
=> Answer: Social Engineering
An adversary setting up the Command & Control server infrastructure is what phase of the Unified Kill Chain?
=> Answer: Weaponization
Exploiting a vulnerability present on a system is what phase of the Unified Kill Chain?
=> Answer: Exploitation
Moving from one system to another is an example of?
=> Answer: Pivoting
Leaving behind a malicious service that allows the adversary to log back into the target is what?
=> Answer: Persistence
6. Phase: Through (Network Propagation)
- As a SOC analyst, you pick up numerous alerts pointing to failed login attempts from an administrator account. What stage of the kill chain would an attacker be seeking to achieve?
=> Answer: Privilege Escalation
Mimikatz, a known post-exploitation tool, was recently detected running on the IT Manager’s computer. Security logs show that Mimikatz attempted to access memory spaces typically used by Windows to store user authentication secrets. Considering the usual capabilities and purpose of Mimikatz, what is the primary objective of this tool in such an attack scenario?
=> Answer: Credential dumping
7. Phase: Out (Action on Objectives)
- While monitoring the network as a SOC analyst, you realise that there is a spike in the network activity, and all the traffic is outbound to an unknown IP address. What stage could describe this activity?
=> Answer: Exfiltration
Personally identifiable information (PII) has been released to the public by an adversary, and your organisation is facing scrutiny for the breach. What part of the CIA triad would be affected by this action?
=> Answer: Confidentiality
8. Practical
- Match the scenario prompt to the correct phase of the Unified Kill Chain to reveal the flag at the end. What is the flag?
=> Answer: THM{UKC_SCENARIO}
9. Conclusion
No hints needed!