AbbySec

My digital playground – where hacking meets learning.

View on GitHub
1 March 2022

SOC170 – Passwd Found in Requested URL – Possible LFI Attempt

by

🧠 Summary

This investigation was triggered by a SOC170 – Passwd Found in Requested URL – Possible LFI Attack alert.

The alert detected a request attempting to access the sensitive Linux file /etc/passwd using directory traversal sequences (../../../../).

Further analysis confirmed this was a malicious Local File Inclusion (LFI) exploitation attempt, but there is no evidence of successful compromise.


🚨 Alert Overview

🔍 Requested URL

https://172.16.17.13/?file=../../../../etc/passwd


🔎 Initial Log Analysis

Raw Log Findings

Interpretation

This strongly suggests the exploitation attempt was unsuccessful.


🛠 Attack Technique Breakdown

📁 What is Being Attempted?

The attacker used:

../../../../etc/passwd

This is a directory traversal payload.

🔁 How Directory Traversal Works

If the web application includes files directly from user input (e.g., include($_GET['file']);), this can allow attackers to read local system files.


📌 Why /etc/passwd?

The /etc/passwd file contains:

While modern systems store password hashes in /etc/shadow, access to /etc/passwd confirms:


🌍 Source IP Investigation

IP Address: 106.55.45.162
ASN: 45090
ISP: Tencent Cloud Computing
Country: China
Service Type: Data Center / Transit

VirusTotal Results

Assessment


🖥 Endpoint & Network Investigation

The following checks were performed:

Check Result
Endpoint CLI activity Clean
Network connections Clean
Web server logs Only single LFI attempt
Email logs No phishing campaign
Lateral movement None detected

No indicators of compromise were identified.


🎯 Was the Attack Successful?

Based on:

Conclusion:

❌ No successful file disclosure
❌ No system compromise
✔ Malicious exploitation attempt detected


📊 Attack Classification

Category Result
Attack Type Local File Inclusion (LFI) Attempt
Directory Traversal Used Yes
Sensitive File Targeted /etc/passwd
Exploitation Successful No
Host Compromised No
Threat Actor Activity Likely Automated Scanner
Alert Classification True Positive (Unsuccessful Attempt)

🛡 MITRE ATT&CK Mapping


🧠 Analyst Conclusion

This alert represents a malicious Local File Inclusion (LFI) exploitation attempt targeting the /etc/passwd file using directory traversal.

Although the web server permitted the request, the HTTP 500 response and zero response size indicate the attack was unsuccessful.

There is no evidence of:

The activity is consistent with automated internet-wide scanning for vulnerable web applications.


🛡 Recommendations


🏁 Final Verdict

This incident is classified as:

True Positive – Unsuccessful LFI Exploitation Attempt

No evidence of compromise was found. Continuous monitoring and web application hardening are recommended.

tags: