Hammered - Log Analysis

Which service did the attackers use to gain access to the system?

auth.log

What is the operating system of the targeted system?

cat kern.log  | grep more

What is the name of the compromised account?

cat auth.log | more

Consider that each unique IP represents a different attacker. How many attackers were able to get access to the system?

cat auth.log | grep "Accepted password"

Which IP address successfully logged into the system the most number of times?

cat auth.log "Accepted password" | uniq
219.150.161.20

How many requests were sent to the Apache Server?

cat www-access.log | wc -l

How many rules have been added to the firewall?

cat auth.log | grep "iptables -A" | wc -l

One of the downloaded files to the target system is a scanning tool. Provide the tool name.

# I think, one of the famous tool is nmap. But it is not answer. Wrong Thinking.
# We need to check installed files on log file. There are so many log files. We can filter our friendly tool nmap.
cat dpkg.log  | grep "nmap"

When was the last login from the attacker with IP 219.150.161.20? Format: MM/DD/YYYY HH:MM:SS AM

The database displayed two warning messages, provide the most important and dangerous one.

Multiple accounts were created on the target system. Which one was created on Apr 26 04:43:15?

Few attackers were using a proxy to run their scans. What is the corresponding user-agent used by this proxy?

Last updated