type
status
date
slug
summary
tags
category
icon
password
Catagory
Materials
Retired
Retired
Due date
Jul 9, 2024 12:56 AM
Status
Belong in
Progress

Task 1
We believe our Business Management Platform server has been compromised. Please can you confirm the name of the application running?
Ans:Bonitasoft
Task 2
We believe the attacker may have used a subset of the brute forcing attack category - what is the name of the attack carried out?
Ans:Credential Stuffing
Task 3
Does the vulnerability exploited have a CVE assigned - and if so, which one?
Ans:CVE-2022-25237

Task 4
Which string was appended to the API URL path to bypass the authorization filter by the attacker's exploit?
Ans:i18ntranslation

Task 5
How many combinations of usernames and passwords were used in the credential stuffing attack?
Ans:56

Task 6
Task 7
If any, which text sharing site did the attacker utilise?
Ans:pastes.io




Task 8
Please provide the filename of the public key used by the attacker to gain persistence on our host.

Task 9
Can you confirmed the file modified by the attacker to gain persistence?

Task 10
Can you confirm the MITRE technique ID of this type of persistence mechanism?
Ans:T1098.004


Link to Notes
Reference
- 作者:ji3g4gp
- 連結:https://gpblog.vercel.app//article/HTB-Sharklocks-Meerkat
- 著作權:本文採用 CC BY-NC-SA 4.0 許可協議,轉載請註明出處。