Network Discovery Detection Tryhackme Answers

Understand how attackers discover assets in a network, and how to detect that activity.

CYBERSECURITYTHREAT DETECTIONTRYHACKME WALKTHROUGHTECHNOLOGYETHICAL HACKINGTRYHACKMESECURITY OPERATIONS (SOC)NETWORKINGNETWORK DISCOVERYDETECTIONTRYHACKME WRITEUPS

10/1/20251 min read

Task 1 : Introduction

Learning Objectives

By the end of this room, we aim to understand:

  • What is network discovery

  • Why attackers perform network discovery

  • What are the different types of network discovery

  • How network discovery techniques work, and how we can detect them

Task 2 : Network Discovery

What do attackers scan, other than, IP addresses, ports, and OS version, in order to identify vulnerabilities in a network?

Services

Task 3 : External vs Internal Scanning

Which file contains logs that showcase internal scanning activity?

log-session-2.csv

How many log entries are present for the internal IP performing internal scanning activity?

2276

What is the external IP address that is performing external scanning activity?

203.0.113.25

Task 4 : Horizontal vs Vertical Scanning

One of the log files contains evidence of a horizontal scan. Which IP range was scanned? Format X.X.X.X/X

203.0.113.0/24

In the same log file, there is one IP address on which a vertical scan is performed. Which IP address is this?

192.168.230.145

On one of the IP addresses, only a few ports are scanned which host common services. Which are the ports that are scanned on this IP address? Format: port1, port2, port3 in ascending order.

80, 445, 3389

Task 5 : The Mechanics of Scanning

Which source IP performs a ping sweep attack across a whole subnet?

192.168.230.127

The zeek.conn.conn_state value shows the connection state. Using the information provided by this value, identify the type of scan being performed by 203.0.113.25 against 192.168.230.145

TCP SYN Scan

Is there any UDP scanning attempt in the logs? Y/N

N

Task 6 : Conclusion

And that's all for this room. In this room, we have learned:
  • What is network discovery

  • The difference between external and internal scanning, and the severity on each.

  • Port scanning and host scanning, and why each of those is performed.

  • How different types of scans are performed at a more granular room.