File: vsftp.pcap | Date: October 26, 2023
The tcpdump output reveals a clear attempt at unauthorized access and potential exploitation of the target system. The attacker (172.17.0.1) is attempting to gain access via FTP and is actively probing for information.
Commands issued include:
cat /etc/passwdcat /etc/shadowThe successful retrieval of /etc/shadow is a critical security breach, as this file contains hashed passwords. This indicates a compromised system or a successful brute-force/credential stuffing attack.
| Role | IP Address | MAC Address |
|---|---|---|
| Attacker | 172.17.0.1 | 8e:de:56:b4:41:2b |
| Victim | 172.17.0.2 | da:4d:73:6b:0f:cc |
USER pVOE:)PASS 2pwhoami (Privilege Check)cat /etc/passwd (User enumeration)cat /etc/shadow (Password hash theft)exit/etc/shadow./etc/shadow.The following signatures can be deployed to detect this specific attack pattern.
alert ftp any any -> any 21 (msg:"FTP Command - Attempt to read /etc/passwd"; content:"cat /etc/passwd"; sid:1000001; rev:1;)
alert ftp any any -> any 21 (msg:"FTP Command - Attempt to read /etc/shadow"; content:"cat /etc/shadow"; sid:1000002; rev:1;)
alert ftp $HOME_NET any -> any 21 (msg:"FTP Command - Suspicious command execution"; content:"|whoami|"; sid:1000003; rev:1;)
alert ftp $HOME_NET any -> any 21 (msg:"FTP Command - Potential credential theft"; content:"cat /etc/"; sid:1000004; rev:1;)
alert tcp $HOME_NET any -> any 21 (msg:"FTP - Possible Brute Force"; flow:established,to_server; content:"USER "; depth:5; nocase; sid:1000005; rev:1;)
Test your understanding of the analysis report.