Slingshot
Can you retrace an attacker's steps after they enumerate and compromise a web server?
By investigating and answering the questions below, we can create a timeline of events to lead the incident response activity. This will also allow us to present concise and confident findings that answer questions such as:
What vulnerabilities did the attacker exploit on the web server?
What user accounts were compromised?
What data was exfiltrated from the server?
After Everything is booted up, Navigate to http://target IP
Enter Elastic Credentials : Username : elastic Password : raCK0W**BLlW66oNlKAk
After logging in to elastic with the given credentials. Head to Discover. Set the date to July 26, 2023 as it was when the suspicious activity started (Mentioned in the task) and add below mentioned Fields.
response.status
http.url
request.headers.User-Agent
transactions.remote_address
Answer the questions below



















Last updated
Was this helpful?