gbermudez2

SOC168 Writeup - LetsDefend

Command Injection Vulnerability

This is a writeup for a Command Injection vulnerability, determining whether it’s a true/false positive. For this case, we are presented with a rule trigger for Command Injection.

image

It’s important to take notes on important details of the case, including possible IoCs:

Researching IP Reputation

I decided to take the Source IP and research its reputation on VirusTotal.

image

Let’s check AbuseIPDB for clarification and user reports:

image

Utilizing a basic search with the source IP:

To look through logs, we can use the source IP from the case information to perform a Log Management search.

image

The search returns 5 logs involving the source IP.

If we look at the log that triggered the security event, we can see the HTTP response info.

image

It’s not easy to tell if these attacks were successful, so I decided to take a look at the following logs:

image image image

Now, based on these commands, we can look at the targeted endpoint, 172.16.17.16, and see if they were executed successfully:

image

image

Case Report

In our report, we have to include the Attacker IP, and the web server that the attacker targeted:

image

image

Success!