Introduction

Slingway Inc., a leading toy company, suspected malicious activity on its e-commerce web server and enlisted the help of a SOC Analyst to investigate. This writeup documents the steps taken to uncover the attack timeline, identify vulnerabilities exploited, and reveal the attacker's actions.

Challenge Overview

Question 1: What was the attacker's IP?

Answer 1

10.0.2.15

Question 2: What was the first scanner that the attacker ran against the web server?

Answer 2

nmap scripting engine

Question 3: What was the User Agent of the directory enumeration tool that the attacker used on the web server?

Question 4: In total, how many requested resources on the web server did the attacker fail to find?

Answer 3

Mozilla/5.0 (Gobuster)

Answer 4

1867

Question 5: What is the flag under the interesting directory the attacker found?

Answer 5

a76637b62ea99acda12f5859313f539a

Question 6: What login page did the attacker discover using the directory enumeration tool?

Answer 6

/admin-login.php

Question 7: What was the user agent of the brute-force tool that the attacker used on the admin panel?


Question 8: What username:password combination did the attacker use to gain access to the admin page?


Answer 7

Mozilla/4.0 (Hydra)

Answer 8

admin:thx1138

Question 9: What flag was included in the file that the attacker uploaded from the admin directory?

Answer 9

THM{ecb012e53a58818cbd17a924769ec447}

Question 10: What was the first command the attacker ran on the web shell?

Answer 10

whoami

Question 11: What file location on the web server did the attacker extract database credentials from using Local File Inclusion?

Question 12: What directory did the attacker use to access the database manager?


Answer 11

/etc/phpmyadmin/config-db.py

Answer 12

/phpmyadmin

Question 13: What was the name of the database that the attacker exported?

Answer 13

customer_credit_cards

Question 14: What flag does the attacker insert into the database?

Answer 14

c6aa3215a7d519eeb40a660f3b76e64c

Congratulations on successfully completing the challenge! Remember, each challenge is an opportunity to enhance your expertise and contribute to a safer digital environment. Keep up the great work, and may you continue to excel in your cybersecurity journey!