An Unusual Sighting
Personal Rating: Medium
We have a bash history, an sshd log and a website that we can connect to with netcat to answer some questions about the incident.
What is the IP Address and Port of the SSH Server (IP:PORT)
100.107.36.130:2221
Can be seen in the sshd log
[2024-01-28 15:24:23] Connection from 100.72.1.95 port 47721 on 100.107.36.130 port 2221 rdomain ""
What time is the first successful Login
2024-02-13 11:29:50
Can be seen in the sshd log
[2024-02-13 11:29:50] Starting session: shell on pts/2 for root from 100.81.51.199 port 63172 id 0
What is the time of the unusual Login
2024-02-19 04:00:14
Can be seen in the sshd log at the first login outside the office hours
[2024-02-19 04:00:14] Starting session: shell on pts/2 for root from 2.67.182.119 port 60071 id 0
What is the Fingerprint of the attacker's public key
OPkBSs6okUKraq8pYo4XwwBg55QSo210F09FCe1-yj4
Can be seen in the sshd log at the logs of the suspicious login
[2024-02-19 04:00:14] Failed publickey for root from 2.67.182.119 port 60071 ssh2: ECDSA SHA256:OPkBSs6okUKraq8pYo4XwwBg55QSo210F09FCe1-yj4
What is the first command the attacker executed after logging in
whoami
Can be seen in the bash history at the time just after the suspicous login
[2024-02-19 04:00:18] whoami
What is the final command the attacker executed before logging out
./setup
Can be seen in the bash history at the last command after a larger time jump in the history
[2024-02-19 04:14:02] ./setup
HTB{B3sT_0f_luck_1n_th3_Fr4y!!}
Last updated