## "The Enduring Echo"
**1. What was the first (non cd) command executed by the attacker on the host?**
`ipconfig` NOPE X
*(Found in Administrator's PowerShell history line 1)*
**2. Which parent process (full path) spawned the attacker's commands?**
`C:\Windows\System32\sshd.exe` NOPE X
*(SSH.EXE prefetch file indicates SSH was used for remote execution)*
**3. Which remote-execution tool was most likely used for the attack?**
`ssh.exe` NOPE X
*(SSH prefetch file and SSH keys in user directories confirm SSH usage)*
**4. What was the attacker's IP address?**
`10.129.242.110` (attacker IP) ✓
**5. What is the first element in the attacker's sequence of persistence mechanisms?**
`LocalAccountTokenFilterPolicy` NOPE X
*(Registry modification found in PowerShell history line 32)*
**6. Identify the script executed by the persistence mechanism.**
`C:\Users\Werni\AppData\Local\JM.ps1` ✓
*(PowerShell script that creates service accounts and exfiltrates credentials)*
**7. What local account did the attacker create?**
`Werni` NOPE X
*(Created via `net user Werni Quantum1! /add` in PowerShell history)*
**8. What domain name did the attacker use for credential exfiltration?**
`NapoleonsBlackPearl.htb` ✓
*(Found in JM.ps1 script line 24)*
**9. What password did the attacker's script generate for the newly created user?**
`Watson_20250824170228` NOPE X
*(Format: Watson_ followed by timestamp in yyyyMMddHHmmss format, found in JM.ps1)*
**10. What was the IP address of the internal system the attacker pivoted to?**
`172.18.6.3` NOPE X
*(Found in PowerShell history network configuration command)*
**11. Which TCP port on the victim was forwarded to enable the pivot?**
Need to find netsh portproxy configuration or registry entries. NOPE X
**12. What is the full registry path that stores persistent IPv4→IPv4 TCP listener-to-target mappings?**
`HKLM\SYSTEM\CurrentControlSet\Services\PortProxy\v4tov4\tcp` ✓
*(Standard Windows netsh portproxy registry location)*
**13. What is the MITRE ATT&CK ID associated with the previous technique?**
`T1090.001` ✓
*(Internal Proxy technique for pivoting)*
**14. Command to capture command line details in event logs:**
`reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Audit" /v ProcessCreationIncludeCmdLine_Enabled /t REG_DWORD /d 1 /f` ✓
*(Found in Administrator's PowerShell history line 37)*
Some answers require deeper analysis of the Windows event logs to find the external attacker IP and specific port forwarding details.