This repository documents a simulated security breach analysis and remediation process on a Linux server. It walks through every phase of the incident response lifecycle—from detection and attacker analysis to containment, eradication, and system hardening.
- 📌 Executive Summary
- 🔍 Detailed Analysis & Findings
- 🔧 Remediation & System Hardening
- ✅ Conclusion & Recommendations
An attacker from IP 192.168.56.1 successfully breached the server via an SSH brute-force attack. The attacker:
- Installed malware agents and a cryptominer
- Created a rogue user account
- Established a backdoor listener
- Communicated with a hardcoded C2 domain
Logs and antivirus scans confirmed the intrusion. The report details how the breach was contained, artifacts removed, and the system hardened.
- Vector: SSH brute-force
- Attacker IP:
192.168.56.1 - Log Evidence:
/var/log/auth.log/var/ossec/logs/alerts.log
Successful login attempts originated from 192.168.1.14, indicating internal lateral movement.
Malicious Files Identified by ClamAV:
| Filename | Detection Name |
|---|---|
/home/ubuntu/Downloads/ft32 |
Unix.Malware.Agent-6774375-0 |
/home/ubuntu/Downloads/ft64 |
Unix.Malware.Agent-6774336-0 |
/home/ubuntu/Downloads/wipefs |
Unix.Tool.Miner-6443173-0 |
C2 Infrastructure:
- Files:
SSH-T,SSH-One - C2 Domain:
http://darkl0rd.com:7758
- Rogue User:
darklord - Backdoor Listener:
/tmp/remotesec -k -l 56565 - Port Used:
56565
- Tool Used: Greenbone Security Assistant (GSA)
- Findings:
- 18 low-severity
- 2 medium-severity
- CVSS Score: 4.3 (Medium)
- Outdated Apache Version:
Apache/2.4.7 (Ubuntu)
sudo ufw deny from 192.168.56.1 to any port 22# Kill backdoor process
killall remotesec
# Remove malware files
rm /home/ubuntu/Downloads/ft32
rm /home/ubuntu/Downloads/ft64
rm /home/ubuntu/Downloads/wipefs
# Remove C2-related files
rm ~/SSH-T ~/SSH-One
# Delete rogue user
sudo deluser darklordRecommendations:
- 🔐 Enforce key-based authentication only
- 🚫 Disable password authentication:
PasswordAuthentication no
- 🛡️ Install Fail2Ban:
sudo apt install fail2ban
Configuration Updates:
-
✅ Run under a non-privileged user
# /etc/apache2/apache2.conf User apache-user Group apache-group
-
🔒 Hide server version and signature
# /etc/apache2/conf-enabled/security.conf ServerTokens Prod ServerSignature Off
-
📦 Upgrade Apache version
sudo apt update sudo apt install apache2
The server experienced a multi-stage intrusion due to insufficient SSH protection and outdated services. The response followed industry best practices to:
- Contain the breach
- Remove all traces of the attacker
- Harden the system for future resilience
Ongoing Recommendations:
- 🕵️ Continuous monitoring with OSSEC and log analyzers
- 🔁 Regular vulnerability scans and authenticated patching
- 📅 Timely updates to all services
- 🔐 Enforce the principle of least privilege for user and service accounts
📝 This report is part of a cybersecurity simulation project to practice digital forensics and incident response. All attack artifacts were generated in a controlled lab environment.