In this challenge, participants are tasked with analyzing a Linux system log to identify evidence of a brute-force attack and determine the successful credentials used by the attacker. File Name : log_2022-11-16T013005.log Category : Digital Forensics / Log Analysis
Near the end of the log (at approximately Nov 16 01:35:12 ), the following entry appears:
The log contains thousands of entries from a single IP address——attempting to log in via SSH as the user developer . The timestamps show multiple attempts per second, a clear indicator of an automated brute-force script. 3. Finding the Successful Entry
Nov 16 01:35:12 ubuntu sshd[4201]: Accepted password for developer from 192.168.1.15 port 52432 ssh2
In this challenge, participants are tasked with analyzing a Linux system log to identify evidence of a brute-force attack and determine the successful credentials used by the attacker. File Name : log_2022-11-16T013005.log Category : Digital Forensics / Log Analysis
Near the end of the log (at approximately Nov 16 01:35:12 ), the following entry appears:
The log contains thousands of entries from a single IP address——attempting to log in via SSH as the user developer . The timestamps show multiple attempts per second, a clear indicator of an automated brute-force script. 3. Finding the Successful Entry
Nov 16 01:35:12 ubuntu sshd[4201]: Accepted password for developer from 192.168.1.15 port 52432 ssh2