Hacked
You have been called to analyze a compromised Linux web server. Figure out how the threat actor gained access, what modifications were applied to the system, and what persistent techniques were utiliz
Q1 What is the system timezone?

Q2 Who was the last user to log in to the system?

Q3 What was the source port the user 'mail' connected from?

Q4 How long was the last session for user 'mail'? (Minutes only)

Q5 Which server service did the last user use to log in to the system?

Q6 What type of authentication attack was performed against the target machine?
Q7 How many IP addresses are listed in the '/var/log/lastlog' file?


Q8 How many users have a login shell?

Q9 What is the password of the mail user?
Q10 Which user account was created by the attacker?

Q11 How many user groups exist on the machine?

Q12 How many users have sudo access?
Q13 What is the home directory of the PHP user?

Q14 What command did the attacker use to gain root privilege? (Answer contains two spaces).

Q15 Which file did the user 'root' delete?

Q16 What is the content management system (CMS) installed on the machine?

Q17 What is the version of the CMS installed on the machine?

Q18 Which port was listening to receive the attacker's reverse shell?



Last updated