Featured image of post Cyberdefenders - WebStrike

Cyberdefenders - WebStrike

Cyberdefenders Lab Writes up

Q1

Understanding the geographical origin of the attack aids in geo-blocking measures and threat intelligence analysis. What city did the attack originate from?


先去 conversation 看有哪些ip

發現只有兩個,於是就去tcp看有沒有攻擊的相關痕跡
發現 Stream 13

接下來就看誰是攻擊者ㄌ

答案便是117.11.88.124 那依據題目的要求我們需要找到攻擊者在哪

ans : Tianjin

Q2

Knowing the attacker’s user-agent assists in creating robust filtering rules. What’s the attacker’s user agent?


點一個HTTP Protocol的來看

ans : Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0

Q3

We need to identify if there were potential vulnerabilities exploited. What’s the name of the malicious web shell uploaded?


一樣翻一下TCP看攻擊者的攻擊過程
最後在Stream 5發現了整個犯案過程ww

ans : image.jpg.php

Q4

Knowing the directory where files uploaded are stored is important for reinforcing defenses against unauthorized access. Which directory is used by the website to store the uploaded files?


同上 最後在 Stream 9發現

Q5

Identifying the port utilized by the web shell helps improve firewall configurations for blocking unauthorized outbound traffic. What port was used by the malicious web shell?


在之前的Stream 5發現攻擊者上傳的webshell,我們可以觀察上面的payload 發現他已8080這個port當webshell

ans: 8080

Q6

Understanding the value of compromised data assists in prioritizing incident response actions. What file was the attacker trying to exfiltrate?


在之前的Stream 13看到了他RCE進去之後輸入的指令 發現他想要去etc/passwdroot的帳號
可是這題只讓我們輸入6個字,所以我想了想就輸入passwd,然後答案就對ㄌ:D

ans : passwd

後記

數位鑑識好玩:D

comments powered by Disqus
Built with Hugo
Theme Stack designed by Jimmy