HTB CDSA Guide: SOC Analysis Across DC01, PURPLE, IIS and Quantum Security Lab

When you start working on HTB CDSA SOC analysis (Cyber Defense & SOC Analyst) scenarios, it quickly becomes clear that this isn’t about exploitation—it’s about visibility.

Logs, endpoints, user activity… everything tells a story. But it rarely tells it in order.

In this walkthrough-style guide, we’ll connect key elements like DC01.corp.local, PURPLE.corp.local, IIS.corp.local, and artifacts such as invoice.doc, alongside users like Marty.Mcfly, iis_svc, and HTBDEFENSE\sallym. The goal isn’t just to list findings—but to understand how a SOC analyst would actually piece them together.


Understanding the Environment: A Multi-Host SOC Perspective

The CDSA lab environment is intentionally layered. You’re not dealing with a single compromised system—you’re observing activity across multiple hosts:

And in parallel, another environment appears:

These systems reflect endpoint-level visibility—where detection really happens.


Starting Point: SOC Analysis Mindset

Before diving into specific artifacts, it’s important to approach CDSA like a SOC analyst would.

You’re not “attacking.” You’re:

That means asking questions like:

Because in most cases, the compromise isn’t hidden—it’s just buried in noise.


Suspicious Document: invoice.doc as an Entry Vector HTB CDSA SOC analysis

Files like invoice.doc are classic initial access vectors.

At first glance, it looks harmless. But in SOC investigations, documents like this often:

If you see this file referenced in logs (email, downloads, or execution events), it’s a strong indicator of:
➡️ Phishing-based initial access

The key is to trace:


User Activity: Marty.Mcfly and Initial Compromise

The user Marty.Mcfly stands out as a likely entry point.

In many CDSA scenarios, a standard domain user:

From a SOC perspective, you’d look for:

This is where the attack chain begins.


Service Accounts: iis_svc and Lateral Movement

After initial access, attackers often pivot.

The presence of iis_svc suggests a service account tied to IIS.corp.local. These accounts are valuable because:

In logs, watch for:

If a regular user account leads to service account usage, that’s a strong sign of credential harvesting and lateral movement.


Domain Controller: DC01.corp.local Indicators HTB CDSA SOC analysis

The Domain Controller (DC01.corp.local) is where things escalate.

Suspicious activity here might include:

If you see access tied to accounts like:

you should immediately ask:

Because once attackers reach the DC, the impact becomes critical.


PURPLE.corp.local: Simulation or Attacker Host?

The hostname PURPLE.corp.local is a subtle hint.

“Purple” often refers to purple team environments—blending red (attack) and blue (defense). In CDSA, this could represent:

If logs show communication with PURPLE:

it’s worth treating it as a potential attacker pivot point.


Endpoint Analysis: htbdefence.local Systems HTB CDSA SOC analysis

The htbdefence.local machines add another layer:

These endpoints are where you validate what actually happened.

Look for:

For example:
➡️ A process spawned on one machine using credentials from another = lateral movement indicator.


Correlating the Attack Chain

When you connect everything, a likely flow starts to emerge:

  1. invoice.doc delivered to a user (possibly Marty.Mcfly)
  2. Execution triggers script-based activity
  3. Credentials harvested or reused
  4. Access gained to IIS.corp.local via iis_svc
  5. Movement across systems in htbdefence.local
  6. Escalation attempts toward DC01.corp.local
  7. Possible interaction with PURPLE.corp.local as attacker infrastructure

This is exactly the kind of chain a SOC analyst is expected to reconstruct.


Common Detection Opportunities HTB CDSA SOC analysis

CDSA scenarios are full of detection points—if you know where to look.

Some key ones:

Missing one is normal. Missing all of them usually means you’re not correlating events.


Practical SOC Takeaways

Working through this kind of lab builds habits that matter:

Because in real SOC environments, alerts are just the starting point.


Final Thoughts

The HTB CDSA lab isn’t about finding one “right answer.” It’s about understanding how multiple small signals—across systems like DC01.corp.local, IIS.corp.local, PURPLE.corp.local, and endpoints in htbdefence.local—come together.

Artifacts like invoice.doc, users like Marty.Mcfly, and accounts such as iis_svc or HTBDEFENSE\sallym are just pieces.

The real skill is putting them together.

Vendor: https://academy.hackthebox.com/preview/certifications/htb-certified-defensive-security-analyst

Buy this dump: https://cyberservices.store/

HTB CDSA SOC analysis
×
?

Secure connection established...

Syncing...
1 / 3
error: Content is protected !!