Skip to content

Instantly share code, notes, and snippets.

@mshardey
Last active September 20, 2024 00:04
Show Gist options
  • Select an option

  • Save mshardey/8d854a722cdd5982c19c73767ff27902 to your computer and use it in GitHub Desktop.

Select an option

Save mshardey/8d854a722cdd5982c19c73767ff27902 to your computer and use it in GitHub Desktop.
Website Security Incident Report: Investigation, resolution, and prevention.

Conducted a thorough investigation into a website security incident, leveraging tcpdump and DNS/HTTP traffic log analysis. Successfully identified the attack vector, documented the incident timeline, and recommended a security enhancement to prevent future brute-force attacks.

Security Incident Report

Part 1: The network protocol involved in the incident
The network protocol implicated in the incident is the Hypertext Transfer Protocol (HTTP). Through the utilisation of tcpdump, coupled with an investigation into the yummyrecipesforme.com website to pinpoint and capture the problematic elements, the protocol, and traffic activities were meticulously logged in a dedicated DNS & HTTP traffic file. This comprehensive analysis yielded the conclusive evidence necessary to determine that the malevolent file was being conveyed to users' computers via the HTTP protocol at the application layer.
Part 2: Documentation of the incident
Numerous clients reported to the website owner that upon visiting the site, they encountered a prompt to download and execute a file, ostensibly for updating their browsers. Subsequently, their personal computers exhibited a noticeable slowdown in performance. Alarmed by this, the website owner attempted to log into the web server, only to discover they were locked out of their account.

To investigate and address this issue, the cybersecurity analyst employed a sandbox environment, ensuring a secure testing space isolated from the company network. Employing tcpdump, the analyst captured network and protocol traffic packets generated during interactions with the website. Initiating the download of a file purportedly for browser updating, the analyst executed it, leading to a redirection within the browser to a counterfeit website (greatrecipesforme.com) mirroring the original (yummyrecipesforme.com).

Upon scrutinising the tcpdump log, it became evident that the browser initially sought the IP address for the yummyrecipesforme.com site. Following the establishment of the connection over the HTTP protocol, the analyst recalled downloading and executing the file, leading to a distinct shift in network traffic. The browser then requested a new IP resolution for the greatrecipesforme.com URL, redirecting the traffic to the new IP address associated with the counterfeit website.

The senior cybersecurity professional conducted a comprehensive analysis of the source code for both websites and the downloaded file. The investigation revealed that an attacker had manipulated the website, introducing code that coerced users into downloading a malicious file disguised as a browser update. Given the website owner's account lockout, it is suspected that the attacker employed a brute force attack to gain unauthorised access and alter the admin password. The execution of the malicious file, in turn, compromised the end users' computers.
Part 3: Recommended remediation for brute force attacks
As a robust countermeasure against potential brute force attacks, the proposed security enhancement involves the implementation of a Multi-Factor Authentication (MFA) framework. This MFA strategy encompasses an augmented authentication process, wherein users are mandated to verify their identity by validating a one-time password (OTP) dispatched to either their registered email address or mobile phone. The user's access to the system will only be granted upon successful confirmation of both their login credentials and the OTP.

This fortified authentication protocol ensures that malicious actors attempting a brute force attack are significantly thwarted, as they would be compelled to bypass an additional layer of authorisation beyond traditional login credentials. The integration of Multi-Factor Authentication not only fortifies the security posture of the system but also bolsters its resilience against unauthorised access attempts.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment