Link: Openfire Lab
This scenario involves a .pcap file containing network traffic from malicious activity affecting an Openfire server. Wireshark will be my main tool for discovering any IoCs and evidence of attacker actions.
To look for a login request, we have to find a POST request, since a user would have to enter in credentials:
A user attempting to log in as “admin” raises some red flags, though it’s best to investigate further before jumping to conclusions.
I thought at first that the account names would either try to blend in (like “Administrator”), but I found an interesting set of network logs that prove otherwise:
What’s curious is that in the account creation parameters, the value isadmin is set to “on”, which means the attacker used the user-create.jsp file on the server via directory traversal to create an account with admin privileges:
The attacker later logs in with these credentials, which returns a 302 Found response from the server, signifying a successful login (compared to the previous failed 200 OK responses).
Luckily, we don’t have to look far to find out. The attacker seems to have submitted a POST request, uploading a plugin called openfire-plugin.jar to the server.
I opened the details for the first one I saw, and spotted the following form item:
The very next POST request was where the main malicious activity was put into place, with the command “nc” (netcat) being used to form a connection between the server and the attacker, perhaps to perform data exfiltration:
Various commands like uname -a and ifconfig are shown in the Packet bytes.