Difficulty
easy
Average duration
1 hrs
Technologies
PHP
cybersecurity
blue-team
reverse-shell
owasp-a05-security-misconfiguration
threat-hunting
Difficulty
easy
Average duration
1 hrs
Technologies
PHP
cybersecurity
blue-team
reverse-shell
owasp-a05-security-misconfiguration
threat-hunting
This lab tests your observation skills, your command of basic Unix tools, and your judgment in recognizing malicious code.
In this lab you will practice:
find
, grep
, less
, and cat
to search for suspicious artifactsFollow these steps to get started:
1 https://storage.googleapis.com/cybersecurity-machines/web-threats-lab.ova
student:4geeks-lab
, and open the website in your browser if you wish:1 http://<ip_machine>/pwned/
TerraSafe is a cybersecurity consulting firm with international clients. But someone on the team — possibly a disgruntled former employee — has planted malicious code inside the web server.
Your job as a threat hunter is to investigate the site. The malicious code is still active and hidden in plain sight. You must find the exact path to the compromised file and validate it to uncover evidence of the attack.
Once you believe you’ve found the absolute path to the file, run the following command on the virtual machine:
1validate-malicious-path
The script will prompt you to enter the absolute file path. If it’s correct, it will reveal what you're looking for.
💡 Tips
Good luck!
Difficulty
easy
Average duration
1 hrs
Technologies
PHP
cybersecurity
blue-team
reverse-shell
owasp-a05-security-misconfiguration
threat-hunting
Difficulty
easy
Average duration
1 hrs
Technologies
PHP
cybersecurity
blue-team
reverse-shell
owasp-a05-security-misconfiguration
threat-hunting
Difficulty
easy
Average duration
1 hrs
Technologies
PHP
cybersecurity
blue-team
reverse-shell
owasp-a05-security-misconfiguration
threat-hunting
Difficulty
easy
Average duration
1 hrs
Technologies
PHP
cybersecurity
blue-team
reverse-shell
owasp-a05-security-misconfiguration
threat-hunting
Difficulty
easy
Average duration
1 hrs
Technologies
PHP
cybersecurity
blue-team
reverse-shell
owasp-a05-security-misconfiguration
threat-hunting
Difficulty
easy
Average duration
1 hrs
Technologies
PHP
cybersecurity
blue-team
reverse-shell
owasp-a05-security-misconfiguration
threat-hunting