We covered investigating a cyber incident scenario ,where PhpMyAdmin database was hacked along with its e-commerce website, using the elastic stack (logstash, Kibana and elastic search) and KQL queries. We uncovered the scanner the attacker used to fingerprint the database, the directory enumeration tool and the credential brute-force tool used to gain access to the admin panel of the website. This was part of TryHackMe Slingshot room.

Appunti di studio della squadra blu

Cyber Security Study Notes

TryHackMe Slingshot Challenge Description

Slingway Inc., a leading toy company, has recently noticed suspicious activity on its e-commerce web server and potential modifications to its database. To investigate the suspicious activity, they’ve hired you as a SOC Analyst to look into the web server logs and uncover any instances of malicious activity.

To aid in your investigation, you’ve received an Elastic Stack instance containing logs from the suspected attack. Below, you’ll find credentials to access the Kibana dashboard. Slingway’s IT staff mentioned that the suspicious activity started on July 26, 2023.

By investigating and answering the questions below, we can create a timeline of events to lead the incident response activity. This will also allow us to present concise and confident findings that answer questions such as:

  • What vulnerabilities did the attacker exploit on the web server?
  • What user accounts were compromised?
  • What data was exfiltrated from the server?

Punti salienti

What is Elastic Stack?

Elastic stack is the collection of different open source components linked together to help users take the data from any source and in any format and perform a search, analyze and visualize the data in real-time.

Elastic Search


Elasticsearch is a full-text search and analytics engine used to store JSON-formated documents. Elasticsearch is an important component used to store, analyze, perform correlation on the data, etc.
It is built on top of Apache Lucene and provides a scalable solution for full-text search, structured querying, and data analysis.
Elasticsearch supports RESTFul API to interact with the data.

Log Stash

Logstash is a data processing engine used to take the data from different sources, apply the filter on it or normalize it, and then send it to the destination which could be Kibana or a listening port.

Kibana

Kibana is a web-based data visualization that works with elasticsearch to analyze, investigate and visualize the data stream in real-time. It allows the users to create multiple visualizations and dashboards for better visibility.

Risposte in camera

What was the attacker’s IP?

10.0.2.15

WWhat was the first scanner that the attacker ran against the web server?

NMAP Scripting Engine

What was the User Agent of the directory enumeration tool that the attacker used on the web server?

Mozilla/5.0 (Gobuster)

In total, how many requested resources on the web server did the attacker fail to find?

1867

What is the flag under the interesting directory the attacker found?

a76637b62ea99acda12f5859313f539a

WhWhat login page did the attacker discover using the directory enumeration tool?

/admin-login.php

What was the user agent of the brute-force tool that the attacker used on the admin panel?

Mozilla/4.0 (Hydra)

HWhat username:password combination did the attacker use to gain access to the admin page?

admin:thx1138

WWhat flag was included in the file that the attacker uploaded from the admin directory?

THM{ecb012e53a58818cbd17a924769ec447}

What was the first command the attacker ran on the web shell?

chi sono

WhicWhat file location on the web server did the attacker extract database credentials from using Local File Inclusion?

/etc/phpmyadmin/config-db.php

Che cosa directory did the attacker use to access the database manager?

/phpmyadmin

Look at the file input plugin documentationWhat was the name of the database that the attacker exported?

customer_credit_cards

LoWhat flag does the attacker insert into the database?

c6aa3215a7d519eeb40a660f3b76e64c

Videoprocedura dettagliata

Circa l'autore

Creo note sulla sicurezza informatica, note di marketing digitale e corsi online. Fornisco anche consulenza di marketing digitale, inclusi ma non limitati a SEO, annunci Google e Meta e amministrazione CRM.

Visualizza articoli