T1594
Last updated
Last updated
Adversaries may search websites owned by the victim for information that can be used during targeting. Victim-owned websites may contain a variety of details, including names of departments/divisions, physical locations, and data about key employees such as names, roles, and contact info (ex: Email Addresses). These sites may also have details highlighting business operations and relationships.
Adversaries may search victim-owned websites to gather actionable information. Information from these sources may reveal opportunities for other forms of reconnaissance (ex: Phishing for Information or Search Open Technical Databases), establishing operational resources (ex: Establish Accounts or Compromise Accounts), and/or initial access (ex: Trusted Relationship or Phishing).
We have Zeek logs, and we will use ZUI to investigate this incident.
ZUI (Zeek User Interface) is a web-based interface designed for visualizing and analyzing Zeek (formerly Bro) logs. It provides users with intuitive tools for querying, filtering, and displaying network traffic data, helping analysts to identify patterns, anomalies, and security incidents effectively.
First, let's gather what type of logs we have.
We started to check which IP performed the most requests to the web server shop.cyberdefenders.corp
to begin our investigation.
The IP address with the most requests is 165.18.197.227
, so we will begin the investigation with it.
Upon further investigation, we found that this IP performed directory brute-forcing due to the low time between each request and the different directories accessed.
He managed to access 1,483 pages with a status code of 200.
I checked the User-Agent and the requests to identify the tool he was using, but that didn't yield any results. So, I examined the DNS requests, which revealed that he was using Burp Suite
Burp Suite is a popular integrated platform for performing security testing of web applications. It provides a range of tools, including an intercepting proxy, web crawler, scanner, and intruder, allowing security professionals to analyze web application security vulnerabilities, manipulate requests, and automate attacks. Burp Suite is widely used by penetration testers and security researchers to identify and exploit weaknesses in web applications.
The attacker didn't do much beyond reconnaissance and discovery.
To answer the question about the browser the attacker used, we can check the User-Agent.
To determine how many bytes the attacker sent, we can check the connection logs and look for the sum of orig_bytes.
I hope you enjoyed :)