Slingshot

Can you retrace an attacker's steps after they enumerate and compromise a web server?

By investigating and answering the questions below, we can create a timeline of events to lead the incident response activity. This will also allow us to present concise and confident findings that answer questions such as:

  • What vulnerabilities did the attacker exploit on the web server?

  • What user accounts were compromised?

  • What data was exfiltrated from the server?

After Everything is booted up, Navigate to http://target IP

Enter Elastic Credentials : Username : elastic Password : raCK0W**BLlW66oNlKAk

After logging in to elastic with the given credentials. Head to Discover. Set the date to July 26, 2023 as it was when the suspicious activity started (Mentioned in the task) and add below mentioned Fields.

  1. response.status

  2. http.url

  3. request.headers.User-Agent

  4. transactions.remote_address

Answer the questions below

Last updated

Was this helpful?