TryHackMe - Juicy Details - Writeup!
Juice Details - Download Task files
Reconnaissance
What tool did the attacker use? (Order by the occurence in the log)
What endpoint was vulnerable to a brute-force attack?
What endpoint was vulenrable to SQL injection?
What parameter was used for the SQL injection?
What endpoint did the attacker try to use to retrive files?
Stolen data
What section of the website did the attacker use to scrape user email addresses?
Was their brute-force attack successful? If so, what is the timestamp of the successful login? (Yay/Nay, 11/Apr/2021:09:xx:xx +0000)
What user information was the attacker able to retrieve from the endpoint vulnerable to SQL injection?
What files did they try to download from the vulnerable endpoint? (endpoint from the previous task, question #5)
What service and account name were used to retrieve files from the previous question? (service, username)
What service and username were used to gain shell access to the server? (service, username)