Step 1: Click on the green button to Start the Lab
Step 2: Hack the URL or IP of the lab
Step 3: Use your skills and logic to find the flags!
Web server log analysis is a critical skill in cybersecurity that involves examining HTTP access logs to:
Start by examining the access.log file structure and identifying different types of requests:
# Count total log entries
wc -l access.log
# View first few entries
head -10 access.log
# Look for unique HTTP status codes
awk '{print $9}' access.log | sort | uniq -c
# Find unique user agents
awk -F'"' '{print $6}' access.log | sort | uniq
Look for common indicators of malicious activity:
# Find potential SQL injection attempts
grep -i "union\|select\|drop\|insert" access.log
# Look for XSS attempts
grep -i "script\|alert\|javascript" access.log
# Find scanner/tool requests
grep -E "(wp-admin|phpmyadmin|\.env|backup)" access.log
# Look for successful requests (200 status) from suspicious sources
grep " 200 " access.log | grep -i "scanner\|tool\|bot"
The key is to find files that attackers successfully accessed (200 status code). Let's examine suspicious entries more closely:
# Look for successful requests from suspicious user agents
grep " 200 " access.log | grep -E "(Scanner|Tool|Bot)"
# Find requests with suspicious referers
grep "attacker" access.log
# Look for successful access to sensitive files
grep " 200 " access.log | grep -E "(backup|config|admin|debug)"
After extensive analysis, you'll find that out of 129 total requests from the attacker (172.16.0.88), only ONE was successful. The key entry revealing successful attacker access:
172.16.0.88 - - [22/Jul/2025:08:32:44 +0000] "GET /backup.txt HTTP/1.1" 200 42 "https://attacker.com/tools" "SecScanner/1.0"
This single successful request is hidden among 128 failed attempts (404/403 status codes), making this a realistic example of how attackers conduct reconnaissance scans.
From the log analysis, we discover that the attacker successfully accessed /backup.txt
. The request shows:
Since the attacker was able to access this file, we should investigate what it contains:
# Access the file that the attacker found
curl https://target-site.com/backup.txt
# OR download it from the challenge page
wget backup.txt
When examining the contents of backup.txt
, we find:
FLAG: 1e3e1e7c-6b64-4727-b4bb-6e9945edd9b7
The flag is: 1e3e1e7c-6b64-4727-b4bb-6e9945edd9b7
The security incident reveals several critical findings:
By analyzing the complete log timeline, we can see the attacker's reconnaissance pattern:
This shows a systematic approach where the attacker found success with a simple backup.txt file.
This incident demonstrates several security issues:
Based on this analysis, recommended actions include:
Sign-in to your account to access your hacking courses and cyber security labs.
Access all hacking courses and cyber security labs.