Jasper Alblas
Jasper Alblas
In this room we will learn about the Open Source platform MISP. MISP is an open source software solution for collecting, storing, distributing and sharing cyber security indicators and threats about cyber security incidents analysis and malware analysis. MISP is designed by and for incident analysts, security and ICT professionals or malware reversers to support their day-to-day operations to share structured information efficiently.
Room URL: https://tryhackme.com/r/room/misp
This room is part of the SOC Level 1 Path.
I am making these walkthroughs to keep myself motivated to learn cyber security, and ensure that I remember the knowledge gained by these challenges on HTB and THM. Join me on learning cyber security. I will try and explain concepts as I go, to differentiate myself from other walkthroughs.
Now, let’s move on!
Alright, let’s get started. TryHackMe incudes the following room overview:
General familiarity with security concepts is: check out the Pre-Security path and the Jr. Security Analyst room.
Answer: No answer needed
MISP (Malware Information Sharing Platform) is an open-source platform for collecting, storing, and sharing threat intelligence and Indicators of Compromise (IOCs) related to malware, cyberattacks, financial fraud, and other cyber threats. It operates within communities of trusted members and supports closed, semi-private, and public sharing models. The platform integrates with tools like Network Intrusion Detection Systems (NIDS), log analysis tools, and Security Information and Event Management Systems (SIEM).
Use Cases:
Core Functionalities:
Key Terms:
Answer: No answer needed
Username: Analyst@THM.thm Password: Analyst12345&
This streamlined process enables analysts to effectively track, manage, and share threat intelligence using MISP.
There are four distribution options: organization-only, community-only, connected communities, or all communities).
Answer: 4
After creation, the organisation admin will review and publish events to make them accessible via defined distribution channels.
Answer: organisation admin
MISP (Malware Information Sharing Platform) uses feeds, taxonomies, and tagging to manage and share security threat information:
Feeds: These provide updated indicators and information about security events. They enable analysts to exchange threat data, preview events, import relevant events, and correlate attributes across different events and feeds. Site admins manage feeds.
Taxonomies: Taxonomies classify information with tags based on standard features or attributes. They help categorize events, indicators, and threat actors, allowing analysts to ensure proper event classification and enrich intrusion detection systems. Taxonomies are managed by the site admin.
Tagging: Tags are used to identify events and attributes based on security indicators. Tags can be global (shared across users) or local (specific to an organization). Analysts can also add unique tags. Tags help in effective sharing of threat information.
Best Practices:
Difference taxonomies and tags
Wondering about the difference between taxonomies and tags?
Taxonomies are a more structured way to classify information according to predefined categories, while tags are used to label and identify specific attributes or events for easier identification and sharing.
Answer: No answer needed
It is time for a scenario, yay! Until now, this room has been very theory heavy. I don’t know about you, but things don’t stick so well for me if it is all theory. So let’s get some real world experience with MISP! Here we go.
CIRCL (Computer Incident Respons Center Luxembourg) published an event associated with PupyRAT infection. Your organisation is on alert for remote access trojans and malware in the wild, and you have been tasked to investigate this event and correlate the details with your SIEM. Use what you have learned from the room to identify the event and complete this task.
Start by starting up the attachment machine in task 3. Login with the provided initials. Let’s move on with question 1.
Search for PupyRAT in the search field on the top right of the screen. You will find the following event:
The event ID is 1145.
Answer: 1145
Look carefully at the tags attached to the event. A variety of them mentions “RemoteAccess”. This is the answer to the question.
Answer:Remote Access
Click on the Event ID to see the details of the event.
Once you are on the event page, look at the list of attributes in the bottom.
If you search for “command” you will see the following entry:
The answer is 89.107.62.39.
Answer: 89.107.62.39
Answer:Magic Hound
Look at the tag sets in the upper end of the page. One of them is called osint:certainty=”50″.
Answer: osint
Additional resources:
Answer: No answer needed
Great job everybody! We are done with this short, and theory heavy room. I think the scenario in the end really showed the value of the MISP platform. I am sure we will cover more another day.
In the meanwhile, come back soon for more walkthroughs of rooms on TryHackMe and HackTheBox.
You are welcome to comment on this article, and please share with friends.
I would be even more grateful if you support me by buying me a cup of coffee:
I learned a lot through HackTheBox’s Academy. If you want to sign up, you can get extra cubes, and support me in the process, if you use the following link: