Sitemap

Cyberdefenders Writeup:Openfire Lab

4 min readNov 29, 2024

Hey folks! Today, I will write about solving the Openfire lab. It’s my first write-up, so I hope you find it useful.

First, here is the scenario for the lab:

As a cybersecurity analyst, you are tasked with investigating a data breach targeting your organization’s Openfire messaging server. Attackers have exploited a vulnerability in the server, compromising sensitive communications and potentially exposing critical data. Your task is to analyze the provided network capture files using Wireshark. Identify evidence of the exploitation, trace the attacker’s actions, and uncover indicators of compromise.

The first thing I did was look at the lab questions. I found one important thing to search for: CVE Openfire. After searching and opening many pages, I found a helpful write-up about Openfire CVE called “Path Traversal in Openfire Leads to RCE.” It helped me understand what Openfire is and what the Vulnerability is.
Then, I decided to start with the last question.

Q9: What is the CVE of the vulnerability exploited?:CVE-2023–32315

Then, I opened the machine and the PCAP file, but I was a bit confused. The first question was:
Q1: What is the CSRF token value for the first login request?

So, I thought about the GET and POST methods. I used the following filter in Wireshark:

http.request.method == GET or http.request.method == POST

This showed me both GET and POST requests. I then looked at the first login request with the POST method, checked it and Found what i need

So The Answer is : tmJU6J9uym8oIOD
and also the answer of second question is

Q2:What is the password of the first user who logged in?Admin@Passw0rd#@#

Let’s jump to the third question:

Q3: What is the 1st username that was created by the attacker?

What I did was scroll down until I found “user-create” and looked at the line. There, I found the username: 3536rr

Q4 :What is the username that the attacker used to login to the admin panel?

It asked about the username used in the login. We saw that the attacker created three users. So, I will check the first POST request and look for the username.

So the Answer is :a7zo4l

Q5:What is the name of the plugin that the attacker uploaded?

Okay, then I will scroll down and look for the POST method and check the line that has the upload also

Yes the Filename of plugin is :openfire-plugin.jar

Q6:What is the first command that the user executed?

It asked about the command. So, I will search for the line that has the POST method and the command, and also look in the HTML form.

So Answer is :whoami

Q7:Which tool did the attacker use to get a reverse shell?

Okay, I looked at the last POST method that had the command, and I found nc. So, the answer is: Netcat.

Q8:Which command did the attacker execute on the server to check for network interfaces?

I picked the last line, opened the TCP stream, and scrolled until I found all the commands that were executed. I found that the command was :ifconfig.

CONGRATULATIONS! It’s done.
See you in the next write-up!

--

--

Responses (1)