InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

HTB Sherlock ProcNet: Exploring Windows API Call Monitoring with API Monitor

Muhammad Haidar Akita Tresnadi
InfoSec Write-ups
Published in
8 min readMar 29, 2024

Source : https://labs.hackthebox.com/storage/challenges/1728efbda81692282ba642aafd57be3a.png

desktop-r30eamh

TimelineExplorer view
msedge.exe executable full path
csgo.exe executable full path
Connection Details
Wireshark TCP stream (GET / )
TLS handshake
Client hello packet details
Wireshark TCP stream (GET /csgo.exe )
VirusTotal submission
API monitor csgo.exe
Search with the search string feature
CLRCreateinstance windows API call
vaultcli.dll loaded using LoadLibraryExW
csgo.exe import VaulEnumerateVaultsW function
net.exe api call
csgo.exe create new net.exe process
wminets_utils.dll loaded using LoadLibraryExW
csgo.exe import ExecQueryWmi function
SharpWMI string allocated
SharpWMI arguments
vbscript command
vbscript command (more readable)

DC01

Command for extracting ntds.dit content
GetFullPathNameW windows API call

Closing

Reference

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

No responses yet

Write a response