🌟
Noel's Cyberkshetra Blogspace
LinkedIn ProfileGithub ProfilePersonal Blogspot
  • Welcome to my Gitbooks Page
  • 💽Let's Defend Blue Team Walkthroughs
    • SOC164 - Suspicious Mshta Behavior Alert
    • SOC147 - SSH Scan Activity Alert
    • SOC146  -  Phishing Mail Detected Alert
    • SOC145 - Ransomware Detected Alert
    • SOC144  -  New scheduled task created Alert
    • SOC143 - Password Stealer Detected Alert
    • SOC141  -  Phishing URL Detected Alert
    • SOC141 - Phishing URL Detected Alert
    • SOC137 — Malicious File/Script Download Attempt: A Walkthrough
    • SOC109  -  Emotet Malware Detected Alert
    • SOC104 - Malware Detected Alert
    • SOC101  -  Phishing Mail Detected Alert
    • HTTP Basic Auth: Let's Defend DFIR Challenge
    • ShellShock Attack: Let’s Defend Challenge
    • 2021’s 0-Day MSHTML: Let's Defend Lab
  • 🤺BTLO Walkthroughs
    • BTLO: Network Analysis-Web Shell Challenge
    • BTLO: Suspicious USB Stick Challenge
  • 💒WiCYS CyberStart
    • Chapter 1 - Amsterdam A Running Start
      • WiCYS CyberStart (Amsterdam) Challenge 1
      • WiCYS CyberStart (Amsterdam) Challenge 2
      • WiCYS CyberStart (Amsterdam) Challenge 3
      • WiCYS CyberStart (Amsterdam) Challenge 4
    • Chapter 2 - Tokyo Patterns of Behaviour
      • WiCYS CyberStart (Tokyo) Challenge 1
      • WiCYS CyberStart (Tokyo) Challenge 2
      • WiCYS CyberStart (Tokyo) Challenge 3
      • WiCYS CyberStart (Tokyo) Challenge 4
    • Chapter 3 - Barcelona In the thick of it
      • WiCYS CyberStart (Barcelona) Challenge 1
      • WiCYS CyberStart (Barcelona) Challenge 2
      • WiCYS Cyberstart (Barcelona) Challenge 3
      • WiCYS CyberStart (Barcelona) Challenge 4
  • 📕Technical Cyber articles
    • An in-depth analysis of an Intrusion Prevention System
    • DevSecOps-Making a difference from traditional DevOps
    • CVE - 2020–1472 (Zerologon Vulnerability)-Exploitation & Remediation
    • Computer Forensics Acquisition
    • Cyber Hygiene Tips
    • Hack your System - Linux Edition
    • Markovian Parallax Denigrate-Breaking the cipher
    • SIEM-Incorporating Incident Response into Network Security
    • Social Engineering-A leading cause for vulnerability occurrence
    • Report Writing in Digital & Multimedia Forensics
    • Zero-Day Vulnerabilities: A short overview
    • Zero Trust Network Access-A solution to Network Security
  • 🧑‍💻Hack The Box : Starting Point Machines
    • Meow
    • Fawn
    • Dancing
    • Redeemer
Powered by GitBook
On this page
  • Gist of Challenge
  • Challenge Questions
  • Conclusion
  • Your opinion matters
  1. Let's Defend Blue Team Walkthroughs

HTTP Basic Auth: Let's Defend DFIR Challenge

Some HTTP packet sniffing.....

PreviousSOC101  -  Phishing Mail Detected AlertNextShellShock Attack: Let’s Defend Challenge

Last updated 3 years ago

Hello, blue teamers! Welcome to this latest blog post, as I document my methodology of solving the challenge on Let’s Defend. Let’s go hunting after this .pcap file

NOTE: Always remember to investigate challenges from Let's Defend, on a VM

Gist of Challenge

We got some log indicates the attacker, can you gathering information from pcap file?

Challenge Questions

Q) How many HTTP GET requests are in pcap?

You can solve this question in two ways

Navigate to Statistics ->HTTP ->Requests,where we can find:-

or

Enter the following query on the search tab — http.request.method==”GET”

Where we find the following GET request packets

A) 5

Q) What is the server operating system?

When analyzing one of the HTTP GET request packets, from the .pcap file, we can find the following information:-

Web Server version OpenSSL Version Server Distro Name

A) FreeBSD

Q) What is the name and version of the web server software?

It is visible from the User-Agent section of the packet

A) Apache/2.2.15

Q) What is the version of OpenSSL running on the server?

A) OpenSSL/0.9.8n

Q) What is the client’s user-agent information?

A) Lynx/2.8.7rel.1 libwww-FM/2.14 SSL-MM/1.4.1 OpenSSL/0.9.8n

Q) What is the username used for Basic Authentication?

Hunting through the GET requests, we find this username and password entered for authentication purposes

A) webadmin

Q) What is the user password used for Basic Authentication?

A) W3b4Dm1n

Conclusion

This challenge was a breeze!

Thank you for reading this entry. Stay tuned, as I go hunting behind some pcap files out there....

Your opinion matters

My audience has a voice. Feel free to reach out to me, on my socials (links are on the side of this page) for any queries to be addressed. Dropping a sweet message would make my day

Let your opinion about this write-up be known, selecting any one of the emojis below!

Log file: Pass: 321

💽
https://app.letsdefend.io/download/downloadfile/webserver.em0.zip
HTTP Basic Auth