Skip to content

Lengthy Logs: Attack Analysis

This lab is a bit different as there is only one check that needs to be completed. The meeting minutes explain that there is a new tab in the menu for filling out a form. Filling out the form with the correct values results in a green check.

The "Incident Response" form fields are:

  • Which system was breached? If multiple, use multiple form submissions.
  • Database
  • Which service was compromised on the breached system?
  • mysql
  • What log file shows evidence of compromise? Please provide the full path.
  • C:\mysql_logs\mysql.log
  • Which user account(s), if any, were tampered with? For multiple, use commas as the delimiter.
  • playerone, admin, gbates, takasaka

Incident Response Form Correctly Submitted

Log into the Database machine and verify log location at C:\mysql_logs\mysql.log

The logs are pretty messy, so I used powershell to reformat them- Select-String -Path C:\mysql_logs\mysql.log -Pattern "Query"

I then looked at the database backup on Backup. It was located at /DatabaseBackup/wordpress.sql. I copied it over to Security-Desk using scp in order to better look at the logs- scp /DatabaseBackup/wordpress.sql playerone@172.16.30.6:~/wordpress.sql. It prompts you to enter in the password for playerone.

On Security-Desk, we can grep through the wordpress.sql file now located in our home directory to see the users in the database before the breach- grep nickname ./wordpress.sql. That gives us the final values to enter in the form and get a green check.