We are on the final question for Linux this week in the Magnet Weekly CTF Challenge. Next month's challenge will be memory analysis based so go ahead and download the memory image here. Now on to the solves!
Part 1
What package(s) were installed by the threat actor? Select the most correct answer!
This question was a little hard initially due to 'threat actor'. I was trying to see what a potentially malicious actor would do on the box, and kept rummaging through the .bash_history
logs for hadoop and root account on all three boxes but could not find anything damning. There was a little ELF file in the hadoop user's home directory that appeared malicious in nature but I could not figure out how it got there, or which installed package was responsible for it.
Eventually I decided to try installed packages from /var/log/dpkg.log
that didn't look like they belonged in a standard Hadoop setup and got lucky.
Answer: PHP
Part 2
Why?
- hosting a database
- serving a webpage
- to run a php webshell
- create a fake systemd service
We were only given two attempts for this question so it was important to make it count. I had discounted the first two options as it didn't seem likely that a threat actor would install PHP just for hosting a database or serving a webpage, plus I did not see any indications of database packages being installed.
Looking around in the /etc/systemd/system
directory, I noted that the cluster.service
starts PHP and had a look at the PHP file referenced within.
Seeing keywords such as socket_bind
and shell_exec
, I immediately jumped on the third option: 'to run a php webshell' but it turned out wrong. I then backtracked a step and tried the fourth option and thankfully that turned out to be the right answer.
Answer: create a fake systemd service
No comments:
Post a Comment