Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Slingshot

Premium room

Can you retrace an attacker's steps after they enumerate and compromise a web server?

easy

60 min

10,599

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

Slingway Inc., a leading toy company, has recently detected suspicious activity on its e-commerce web server and potential unauthorized modifications to its database. To investigate the incident, you have been brought in to analyze the available logs and determine the scope and impact of the attack. To aid in your investigation, you've been provided with access to an Elastic Stack instance containing logs from the suspected compromise. Below are the credentials required to access the dashboard. Slingway's IT team noted that the suspicious activity began on July 26, 2023.

Slingshot graphic including the THM logo.

Objectives

By investigating and answering the questions in the next task, you will build a timeline of events to support the incident response process and deliver clear, evidence-based findings. In your investigation, you seek to answer the following questions.

  • What reconnaissance and enumeration techniques were used?
  • What vulnerabilities were exploited on the web server?
  • How did the attacker gain administrative access?
  • What sensitive data was accessed or exfiltrated?

Prerequisites

Some familiarity with the Elastic architecture and query creation will be useful in this challenge room. Check out the rooms below!

Lab Access

Click the Start Machine button below. Please give Elastic 5 minutes to start, then access the dashboard using the link and the following credentials.

Set up your virtual environment

To successfully complete this room, you'll need to set up your virtual environment. This involves starting the Target Machine, ensuring you're equipped with the necessary tools and access to tackle the challenges ahead.
Target machine
Status:Off
Answer the questions below

I understand my duties and am ready to investigate!

Ready to learn Cyber Security?

The Slingshot room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.