The Cyber Sentinels Club

T

Parse-Zilla: A BlueTeamLabs Writeup

Scenario

DummyCompany has an internal service dummycompany.localhost  with which employees can do a variety of things. The Security Team was alerted for excessive requests from an internal IP and potential access to confidential files on this server due to a authentication/authorization misconfiguration. You have been tasked with analyzing the access logs (in JSON format) and answering the questions to prepare an initial report on this incident.

Based on statistical analysis, which IP address is likely to be the attackers?

What is the name of the reconnaissance tool used by the attacker?

After conducting reconnaissance, it is likely that the attacker manually began to investigate the server. What is the browser user-agent used by the attacker?


"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.3

Based on the UA found in Question 3, what is browser name, version, and operating system used by the attacker?

Some web attacks can utilize the user-agent field to conduct exploitation. What is the vulnerability identifier related to the attempted exploit?

How many unique user-agent strings were observed from the attacker?

What is the name of the exposed directory containing files that the attacker identified?

To find the exposed directory containing files that the attacker identified, you can use a command similar to the one used in previous questions. In this case, you would need to grep for the “RequestPath” field in the log file.

Here’s an example of how you might use the command:

jq '.' ./access.log | grep "RequestPath"

This command will search the entire log file for any instances of “RequestPath” and return the results. You will see a bunch of results, but by looking through the results you will find that the attacker is trying to access the ‘/ftp/’ directory.

So, the name of the exposed directory containing files that the attacker identified is:

/ftp/

Parse-Zilla by Amaterasu Security


github icon