# CyberDefender - WebStrike
Challenge: https://cyberdefenders.org/blueteam-ctf-challenges/149
:::spoiler TOC
[TOC]
:::
## Scenario
> An anomaly was discovered within our company's intranet as our Development team found an unusual file on one of our web servers. Suspecting potential malicious activity, the network team has prepared a pcap file with critical network traffic for analysis for the security team, and you have been tasked with analyzing the pcap.
## ==Q1==
> Understanding the geographical origin of the attack aids in geo-blocking measures and threat intelligence analysis. What city did the attack originate from?
### Recon
這一題直覺想法是利用whois的線上工具直接看註冊的ip,有甚麼樣的info,除了地點還有使用人的email之類的
### Exploit
[Detailed Info](https://www.whois.com/whois/117.11.88.124)

:::spoiler Flag
Flag: `Tianjin`
:::
## ==Q2==
> Knowing the attacker's user-agent assists in creating robust filtering rules. What's the attacker's user agent?
### Recon
直接看封包就有了
### Exploit
直接string search就好了,這一題很貼心,它是直接擷取開頭就是attacker和victim之間的conversation,沒有其他額外的protocol,所以比較好找

:::spoiler Flag
Flag: `Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0`
:::
## ==Q3==
> We need to identify if there were potential vulnerabilities exploited. What's the name of the malicious web shell uploaded?
### Recon
直覺就是extract中間所有傳輸的檔案,再看他傳送檔案的packet內容寫的是甚麼
### Exploit
從下圖可以清楚的看到,他上傳檔案名稱是==image.jpg.php==

:::spoiler Flag
Flag: `image.jpg.php`
:::
## ==Q4==
> Knowing the directory where files uploaded are stored is important for reinforcing defenses against unauthorized access. Which directory is used by the website to store the uploaded files?
### Recon
可以翻看dump下來的那一些files,會發現它不只把傳送到victim的payload擷取下來,也擷取到victim回傳回來的結果
### Exploit
從payload和response可以知道存放upload files的path

:::spoiler Flag
Flag: `/reviews/uploads/`
:::
## ==Q5==
> Identifying the port utilized by the web shell helps improve firewall configurations for blocking unauthorized outbound traffic. What port was used by the malicious web shell?
### Recon
我是直接follow tcp的flow,跟到它實際傳送payload的地方就知道Port Number是8080
### Exploit

:::spoiler Flag
Flag: `8080`
:::
## ==Q6==
> Understanding the value of compromised data assists in prioritizing incident response actions. What file was the attacker trying to exfiltrate?
### Recon
呈上上題
### Exploit
:::spoiler Flag
Flag: `passwd`
:::