Post

Let's Defend: Shellshock Attack

Let's Defend: Shellshock Attack

Challenge Link: https://app.letsdefend.io/challenge/shellshock-attack Log file: /root/Desktop/ChallengeFile/shellshock.pcap

Question 1

What is the server operating system?

I opened the challenge folder and found a .pcap file. Naturally, I opened this with Wireshark to analyze. I quickly found this file was extremely short, only 31 packets total. Due to the short length I just started skimming through the packets individually.

Most of them were encrypted content, but on packet #15 I discovered some clear-text information describing the server setup which would answer the next two questions.

Answer:

Ubuntu

Question 2

What is the application server and version running on the target system?

Answer:

Apache/2.2.22

Question 3

What is the exact command that the attacker wants to run on the target server?

Since I did not see anything related to a command on the previous packet I kept looking around. On packet 11 I discovered what looks like an attempt to use the ping binary to reach out to a specified IP address.

Answer:

/bin/ping -c1 10.246.50.2

This post is licensed under CC BY 4.0 by the author.