A Linux server was possibly compromised and a forensic analysis is required in order to understand what really happened. Hard disk dumps and memory snapshots of the machine are provided in order to solve the challenge.
Challenge Files:
- victoria-v8.kcore.img: memory dump done by dd’ing /proc/kcore.
- victoria-v8.memdump.img: memory dump done with memdump.
- Debian5_26.zip: volatility custom Linux profile
Before starting analyse the memory dump with Volatility, we mount the hard disk for checking the OS logs.
mkdir mount_point
sudo mount -o loop victoria-v8.sda1.img mount_point/
sudo cat mount_point/var/log/auth.log |grep ""
sudo cat ./mount_point/var/log/auth.log |grep "user"
cat ./mount_point/var/log/auth.log | grep "Failed"|wc -l
cat ./mount_point/etc/issue.net
cat ./mount_point/etc/issue.net
vol.py -f victoria-v8.memdump.img --profile=LinuxDebian5_26x86 linux_netstat
vol.py -f victoria-v8.memdump.img --profile=LinuxDebian5_26x86 linux_pslist |grep "nc"
vol.py -f victoria-v8.memdump.img --profile=LinuxDebian5_26x86 linux_psaux
Google Exim4 CVE 2010 and you will find out.
9) During this attack, the attacker downloaded two files to the server. Provide the name of the compressed file.
ls ./mount_point/tmp/
10) Two ports were involved in the process of data exfiltration. Provide the port number of the highest one.
vol.py -f victoria-v8.memdump.img --profile=LinuxDebian5_26x86 linux_netstat
cd mount_point/tmp/
sudo tar xvf rk.tar
cd rk
cat install.sh |grep "port"