Insufficient Logging and Monitoring⚓︎
Difficulty:
Direct link: TryHackMe - OWASP
Objective⚓︎
Task 30
Inspect the logs for clues
Hints⚓︎
Hint 1
Check for common actions in a short sequence of time
Hint 2
Trying combinations of usernames and passwords to gain access to users' accounts.
Solution⚓︎
This task attempts to emphasize the importance of logging for incident responses. After reading through the task, download the log file and read the contents with cat.
| log file | |
|---|---|
1 2 3 4 5 6 7 8 9 10 11 | |
Task 30.1
What IP address is the attacker using?
Attacker
A simple visual inspection can show that there is only one repeating IP address. Put that into the answer field.
Task 30.2
What kind of attack is being carried out?
Type of Attack
Look at the log file, it appears that the attacker is attempting to log in to a different profile every five minutes. Technically, this would be a 'Password Spraying Attack' but since the answer field wont accept that, we can use the more umbrella term: "brute force".
Wrap Up⚓︎
This was the end of the TryHackMe OWASP Top 10 room. One of the biggest takeaways for me is how each of these top 10 vulnerabilities routinely found are, by and large, relatively easy to execute. Some of them are easier with a deeper knowledge of the technology involved, but none of them really required it for a basic representation of the vulnerability. No one is perfect though, and the folks writing code for real are just people, doing their best, who are going to make mistakes.