logo
HomeLearnPracticeChallenge
Pricing
  • For Individuals
  • For Students
  • For Teams
  • Live Chat
  • Help Center
  • Forum
  • Ask a Question
  • Edit Profile
  • My Rewards
  • Subscription
  • Public Profile
  • Logout
  • MonitoringLog ManagementCase ManagementEndpoint SecurityEmail SecurityThreat IntelSandbox
Score
100%
Playbook Success Rate
83%
Investigation Time
7 Minutes
SOC Alert Details
SEVERITYDATERULE NAMEEVENTIDTYPE
HighMar, 01, 2022, 10:10 AMSOC170 - Passwd Found in Requested URL - Possible LFI Attack120Web Attack
EventID :
120
Event Time :
Mar, 01, 2022, 10:10 AM
Rule :
SOC170 - Passwd Found in Requested URL - Possible LFI Attack
Level :
Security Analyst
Hostname :
WebServer1006
Destination IP Address :
172.16.17.13
Source IP Address :
106.55.45.162
HTTP Request Method :
GET
Requested URL :
https://172.16.17.13/?file=../../../../etc/passwd
User-Agent :
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.1.4322)
Alert Trigger Reason :
URL Contains passwd
Device Action :
Allowed
Show Hint
Playbook Answers
Question:Do You Need Tier 2 Escalation?
User answer:No
Question:Was the Attack Successful?
User answer:No
Question:What Is the Direction of Traffic?
User answer:Internet → Company Network
Question:Check If It Is a Planned Test
User answer:Not Planned
Question:What Is The Attack Type?
User answer:Other
Correct Answer:LFI & RFI
Question:Is Traffic Malicious?
User answer:Malicious
Playbook Note
On March 1, 2022, at 10:10 AM, our SIEM detected an attempted Local File Inclusion (LFI) attack (EventID: 120), triggered under rule SOC170. The request originated from IP 106[g]55.45.162, linked to Tencent Cloud in Guangzhou, China, targeting "WebServer1006" (172[g]16.17.13) via a GET request containing the suspicious payload ../../../../etc/passwd. The attempt resulted in an HTTP 500 error response and did not successfully access sensitive files. Given that the attack was unsuccessful, there's no immediate need for containment or escalation to Tier 2 SOC at this time. Continued monitoring is recommended.
Extracted Artifacts
ValueCommentType
https://172[g]16.17.13/?file=../../../../etc/passwdRequested URLE-mail Domain
Guangdong, ChinaCity, CountryE-mail Domain
106[g]55.45.162Malicious IPIP Address
172[g]16.17.13Victim IPIP Address
Alert Answers
Question:Is this alert True Positive or False Positive?
User answer:
Alert Note
On March 1, 2022, at 10:10 AM, our SIEM detected an attempted Local File Inclusion (LFI) attack (EventID: 120), triggered under rule SOC170. The request originated from IP 106[g]55.45.162, linked to Tencent Cloud in Guangzhou, China, targeting "WebServer1006" (172[g]16.17.13) via a GET request containing the suspicious payload ../../../../etc/passwd. The attempt resulted in an HTTP 500 error response and did not successfully access sensitive files. Given that the attack was unsuccessful, there's no immediate need for containment or escalation to Tier 2 SOC at this time. Continued monitoring is recommended.
Lets Defend

Resources

  • Blog
  • MITRE ATT&CK Map
  • Dictionary
  • Use Cases

Community

  • Discord
  • Contribute

Roles

  • SOC Analyst
  • Incident Responder
  • Detection Engineer
  • DFIR
  • Cloud Security Engineer
  • Information Security Specialist

Support

  • Contact us
  • Help Center
  • Forum
  • Walkthroughs
  • Tour

Social

All Rights Reserved ©2025 | Privacy Policy | Terms of Service

footer sub image
Lets Defend

Resources

  • Blog
  • MITRE ATT&CK Map
  • Dictionary
  • Use Cases

Community

  • Discord
  • Contribute

Roles

  • SOC Analyst
  • Incident Responder
  • Detection Engineer
  • DFIR
  • Cloud Security Engineer
  • Information Security Specialist

Support

  • Contact us
  • Help Center
  • Forum
  • Walkthroughs
  • Tour

Social

All Rights Reserved ©2025

Privacy Policy | Terms of Service
footer sub image