Tryhackme-Linux Server Forensics

Linux Server Forensics

  • Username - ‘fred’
  • Password - ‘FredRules!’

task1 Deploy the first VM

Q1 Deploy the machine and log in to the VM using the provided credentials.

image-20210723141434730

task2 Apache Log Analysis I

1.Navigate to /var/log/apache2

2.How many different tools made requests to the server?

2

image-20210729171228671

image-20210723134948979

3.Name a path requested by Nmap.

/nmaplowercheck1618912425

image-20210723141341138

task3 Web Server Analysis

1.What page allows users to upload files?

contact.php

image-20210723144334870

2.What IP uploaded files to the server?

192.168.56.24

3.Who left an exposed security notice on the server?

Fred

image-20210723145007563

image-20210723145106392

image-20210723145212664

task4 Persistence Mechanisms I

  1. cron
  2. Services/systemd
  3. bashrc
  4. Kernel modules
  5. SSH keys

What command and option did the attacker use to establish a backdoor?

sh -i

image-20210723161240880

task5 User Accounts

What is the password of the second root account?

mrcake

image-20210723161400277

image-20210723161326261

提权原因:

image-20210723163554156

提权方法:

echo “root3:Vh7tgs3zHGuMA:0:0:root:root:/bin/bash” >> /etc/passwd

image-20210723164005734

task6 Deploy the second VM

Deploy the second machine and log in to the VM using the provided credentials.

image-20210725162507818

task7 Apache Log Analysis II

1.Name one of the non-standard HTTP Requests.

GXWR

image-20210725163032265

2.At what time was the Nmap scan performed? (format: HH:MM:SS)

13:30:15

image-20210802141624665

task8 Persistence Mechanisms II

What username and hostname combination can be found in one of the authorized_keys files? (format: username@hostname)

kali@kali

image-20210725171534839

.ssh文件在攻击发生日志被修改

image-20210802143715810

task9 Program Execution History

What is the first command present in root’s bash_history file?

nano /etc/passwd

image-20210725171742256

1.bash_history - bash中运行的命令的记录

2.auth.log - /var/log/auth.log 使用sudo运行的命令的历史记录

3.history.log - /var/log/apt/history.log 使用apt执行的所有任务的历史记录

task10 Deploy The Final VM

Deploy the final machine and log in to the VM using the provided credentials.

task11 Persistence Mechanisms III

Figure out what’s going on and find the flag.

gh0st_1n_the_machine

systemctl --type=service --state=active

image-20210725180141385

systemctl status IpManager

image-20210725180231852

image-20210802173343594

ps -aux

image-20210725175432296

image-20210725180307037
如何关闭?
systemctl stop IpManager

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值