TryHackMe | Linux Server Forensics Walkthrough
Learn about digital forensics artefacts found on Linux servers by analysing a compromised server
Link:- https://tryhackme.com/room/linuxserverforensics
Deploy the first VM
Login using ssh and navigate to /var/log/apache2
![](https://cdn-images-1.medium.com/max/1000/1*y1Uf2lAlUJvmK7JnBM76VQ.png)
![](https://cdn-images-1.medium.com/max/1000/1*N5CRAwhI8pU2hVtlkmHyPA.png)
How many different tools made requests to the server?
Run the below command
![](https://cdn-images-1.medium.com/max/1000/1*m6ypeH1JYuwpS096TJJtOA.png)
Answer is 2
Name a path requested by Nmap.
Run below command
![](https://cdn-images-1.medium.com/max/1000/1*5SJFXV7sJka4gmcqKSPt0Q.png)
Answer is /nmaplowercheck1618912425
What page allows users to upload files?
Navigate to the website
![](https://cdn-images-1.medium.com/max/1000/1*Jj-zEetV_lBdM4woz5Onlg.png)
Answer is contact.php
What IP uploaded files to the server?
Run below command to find
![](https://cdn-images-1.medium.com/max/1000/1*ZTCzHriEku6lqHVXUfcnzQ.png)
![](https://cdn-images-1.medium.com/max/1000/1*20DkKpcXtDtOVBOF_b39Qw.png)
Answer is 192.168.56.24
Who left an exposed security notice on the server?
Run below command to find
![](https://cdn-images-1.medium.com/max/1000/1*FfmPRrYB7x60WFtqy5BkOQ.png)
![](https://cdn-images-1.medium.com/max/1000/1*c-RSioTKLQeNI6UofQZ1lA.png)
Go to the location mentioned above and open the security.md file
![](https://cdn-images-1.medium.com/max/1000/1*DoJRQErScDE77Z-tsaLh2g.png)
Answer is Fred
What command and option did the attacker use to establish a backdoor?
Run below command to find backdoor
![](https://cdn-images-1.medium.com/max/1000/1*M9R-cUZmFNoi_LfFvVPPQA.png)
Answer is sh -i
What is the password of the second root account?
Search passwd
![](https://cdn-images-1.medium.com/max/1000/1*BNJGmAjD8PpfqsO_IDCCUg.png)
Google search xxx from root2 :xxx to find password
Deploy the second VM
Login and navigate to logs
![](https://cdn-images-1.medium.com/max/1000/1*g4ceHSFRa2GOeL08-bkLbQ.png)
Name one of the non-standard HTTP Requests.
Run below command
![](https://cdn-images-1.medium.com/max/1000/1*WERJFUIKRolPtjIhAi4odQ.png)
Answer is gxwr
At what time was the Nmap scan performed? (format: HH:MM:SS)
Non standard method gxwr -nmap
Answer is 13:30:15
What username and hostname combination can be found in one of the authorized_keys files? (format: username@hostname)
![](https://cdn-images-1.medium.com/max/1000/1*Rni_NjsiC4173znl7qjJ2Q.png)
Answer is kali@kali
What is the first command present in root’s bash_history file?
![](https://cdn-images-1.medium.com/max/1000/1*fRVKrWgiKau7uhCShiuvxw.png)
nano /etc/passwd
Deploy The Final VM
Login
![](https://cdn-images-1.medium.com/max/1000/1*euZL2pVS91FhuYAhLbRqsw.png)
Run below command
![](https://cdn-images-1.medium.com/max/1000/1*sZ4CuM7mnaQ5L4nz0_S3rA.png)
![](https://cdn-images-1.medium.com/max/1000/1*C5R6I6g_oPuuwi8oxutzgA.png)
Figure out what’s going on and find the flag.
Run systemctl status IpManager.service
![](https://cdn-images-1.medium.com/max/1000/1*5r6iOOQ3387w-uDPYaMJwA.png)
Open the file /etc/network /ZGtsam5hZG1ua2Fu.sh
This will show the flag
![](https://cdn-images-1.medium.com/max/1000/1*7DpNXfkxDzXBWCMPUYkz0w.png)
That’s it! See you in the next room :)
Comments
Post a Comment