Endpoint
CC2024
Last updated
CC2024
Last updated
Preguntas Endpoint CC2024
De acuerdo al archivo access.log se tienen que responder las siguientes preguntas, el archivo es un extracto de registros de un servidor web. Para hacer la resolución de este reto se necesitan conocimientos del protocolo HTTP.
Most frequent - Which domain is most frequently accessed?
example.com
HTTP Method - What was the most frequently used HTTP method to access the web server on that particular day?
GET
Important question - Based on the access log, can you determine if there was a security incident?Yes
IP Address - What is the IP address being used by the adversaries or threat actor?
192.168.100.4
MITRE - Based on the access log, what type of technique is being used by the adversaries, as per https://attack.mitre.org/?
T1087
First step - According to the logs, could you specify the exact time at which the first attack commenced? (format HH:MM:SS)
10:38:39
User agent - Using the user agent from the access log, please go to https://gchq.github.io/CyberChef/#recipe=Parse_User_Agent() and determine the web browser being used by the threat actor.
Firefox
Operative System . Using the CyberChef tool mentioned earlier, please determine the name of the operating system being used by the threat actor. (Please provide the name only, without the version)
Windows
Username - Based on the access log, What username that the threat actor is attempting to log in with?
admin
Clock In - Based on the logs, at what exact time (in the format DD/MM/YYYY:HH:MM:SS) was the threat actor able to gain access to a user account in the system? Expected Flag Format: DD/MM/YYYY:HH:MM:SS (only numerical)
31/07/2023:10:43:40
The password - What is the user admin password
password