Elastic-Case
An attacker was able to trick an employee into downloading a suspicious file and running it. The attacker compromised the system, along with that, The Security Team did not update most systems....
Q1 Who downloads the malicious file which has a double extension?

Q2 What is the hostname he was using?
Q3 What is the name of the malicious file?
Q4 What is the attacker's IP address?

Q5 Another user with high privilege runs the same malicious file. What is the username?
Q6 The attacker was able to upload a DLL file of size 8704. What is the file name?

Q7 What parent process name spawns cmd with NT AUTHORITY privilege and pid 10716?

Q8 The previous process was able to access a registry. What is the full path of the registry?

Q9 PowerShell process with pid 8836 changed a file in the system. What was that filename?

Q10 PowerShell process with pid 11676 created files with the ps1 extension. What is the first file that has been created?

Q11 What is the machine's IP address that is in the same LAN as a windows machine?


Q12 The attacker login to the Ubuntu machine after a brute force attack. What is the username he was successfully login with?


Q13 After that attacker downloaded the exploit from the GitHub repo using wget. What is the full URL of the repo?

Q14 After The attacker runs the exploit, which spawns a new process called pkexec, what is the process's md5 hash?

Q15 Then attacker gets an interactive shell by running a specific command on the process id 3011 with the root user. What is the command?

Q16 What is the hostname which alert signal.rule.name: "Netcat Network Activity"?

Q18 What is the parent process name of netcat?

Q19 If you focus on nc process, you can get the entire command that the attacker ran to get a reverse shell. Write the full command?

Q20 From the previous three questions, you may remember a famous java vulnerability. What is it?
Q21 What is the entire log file path of the "solr" application?

Q22 What is the path that is vulnerable to log4j?

Q23 What is the GET request parameter used to deliver log4j payload?


Q24 What is the JNDI payload that is connected to the LDAP port?
Last updated
