What endpoint did the attacker try to use to retrieve files?
/ftp
Stolen data:
Now that the tactics and point of failures are determined, the next step is to determine the scope and impact. To do this, the following questions were asked:
What section of the website did the attacker use to scrape user email addresses?
Product Review
Was their brute-force attack successful? If so, what is the timestamp of the successful login?
The attack was successful and it ended at 11/Apr/2021:09:16:32 +0000 which is when the user was granted access.
11/Apr/2021:09:16:32 +0000
What user information was the attacker able to retrieve from the endpoint vulnerable to SQL injection?
The attacker was able to user SQL injection to dump the email and password of select users:
email, password
What files did they try to download from the vulnerable endpoint? (endpoint from the previous task, question #5)
/coupons_2013.md.bak,/www-data.bak
What service and account name were used to retrieve files from the previous question? (service, username)
ftp, anonymous
What service and username were used to gain shell access to the server? (service, username)