Another Security Blog

A place to show my mad skills

TidBits Walkthroughs Resources Projects View on GitHub
11 May 2025

Sherlock Origins: Very Easy

by C. Casquatch

From HTB website, our scenario “A major incident has recently occurred at Forela. Approximately 20 GB of data were stolen from internal s3 buckets and the attackers are now extorting Forela. During the root cause analysis, an FTP server was suspected to be the source of the attack. It was found that this server was also compromised and some data was stolen, leading to further compromises throughout the environment. You are provided with a minimal PCAP file. Your goal is to find evidence of brute force and data exfiltration.”

Environments and Utilities Used

Make sure to download the Origins.zip to a safe place to analyse.

Tasks

What is the attacker’s IP address?

It’s critical to get more knowledge about the attackers, even if it’s low fidelity. Using the geolocation data of the IP address used by the attackers, what city do they belong to?

Which FTP application was used by the backup server? Enter the full name and version. (Format: Name Version)

The attacker has started a brute force attack on the server. When did this attack start?

What are the correct credentials that gave the attacker access? (Format username:password)

The attacker has exfiltrated files from the server. What is the FTP command used to download the remote files?

Attackers were able to compromise the credentials of a backup SSH server. What is the password for this SSH server?

What is the s3 bucket URL for the data archive from 2023?

The scope of the incident is huge as Forela’s s3 buckets were also compromised and several GB of data were stolen and leaked.

It was also discovered that the attackers used social engineering to gain access to sensitive data and extort it.

What is the internal email address used by the attacker in the phishing email to gain access to sensitive data stored on s3 buckets?


tags: very easy - Origins - sherlock - HTB