Inicie a máquina, hackeie o sistema e encontre as flags escondidas para completar este desafio e ganhar pontos!
Inicie sua máquina dedicada para começar a hackear
Este guia explica como hackear o lab e capturar as flags. Para ajuda com as perguntas do Modo de Aprendizado, use o botão Solicitar Dica ao lado de cada pergunta.
Web server log analysis is a critical skill in cybersecurity that involves examining HTTP access logs to:
Start by examining the access.log file structure and identifying different types of requests:
# Count total log entries
wc -l access.log
# View first few entries
head -10 access.log
# Look for unique HTTP status codes
awk '{print $9}' access.log | sort | uniq -c
# Find unique user agents
awk -F'"' '{print $6}' access.log | sort | uniqLook for common indicators of malicious activity:
# Find potential SQL injection attempts
grep -i "union\|select\|drop\|insert" access.log
# Look for XSS attempts
grep -i "script\|alert\|javascript" access.log
# Find scanner/tool requests
grep -E "(wp-admin|phpmyadmin|\.env|backup)" access.log
# Look for successful requests (200 status) from suspicious sources
grep " 200 " access.log | grep -i "scanner\|tool\|bot"The key is to find files that attackers successfully accessed (200 status code). Let's examine suspicious entries more closely:
# Look for successful requests from suspicious user agents
grep " 200 " access.log | grep -E "(Scanner|Tool|Bot)"
# Find requests with suspicious referers
grep "attacker" access.log
# Look for successful access to sensitive files
grep " 200 " access.log | grep -E "(backup|config|admin|debug)"After extensive analysis, you'll find that out of 129 total requests from the attacker (172.16.0.88), only ONE was successful. The key entry revealing successful attacker access:
172.16.0.88 - - [22/Jul/2025:08:32:44 +0000] "GET /backup.txt HTTP/1.1" 200 42 "https://attacker.com/tools" "SecScanner/1.0"This single successful request is hidden among 128 failed attempts (404/403 status codes), making this a realistic example of how attackers conduct reconnaissance scans.
From the log analysis, we discover that the attacker successfully accessed /backup.txt. The request shows:
Since the attacker was able to access this file, we should investigate what it contains:
# Access the file that the attacker found
curl https://target-site.com/backup.txt
# OR download it from the challenge page
wget backup.txtWhen examining the contents of backup.txt, we find:
FLAG: 1e3e1e7c-6b64-4727-b4bb-6e9945edd9b7The flag is: 1e3e1e7c-6b64-4727-b4bb-6e9945edd9b7
The security incident reveals several critical findings:
By analyzing the complete log timeline, we can see the attacker's reconnaissance pattern:
This shows a systematic approach where the attacker found success with a simple backup.txt file.
This incident demonstrates several security issues:
Based on this analysis, recommended actions include:
Crie uma conta gratuita para iniciar seu próprio servidor dedicado, enviar flags e ganhar pontos no ranking.
Começar a Hackear GrátisEscolha como deseja começar
Entre na sua conta