A monitoring alert flagged unusual authentication activity on a Linux web server (web-prod-03) at 14:13 UTC on November 28, 2025. Your task is to analyze the provided logs and determine whether an attacker successfully compromised the system via SSH brute-force.
Before diving into the investigation, understanding log structure and importance is crucial for effective incident response.
Purpose: Records all authentication-related events including login attempts, sudo usage, SSH sessions, and privilege escalation.
Why It's Critical: This log is your first line of defense for detecting unauthorized access, brute-force attacks, credential abuse, and lateral movement. Without it, you'd be blind to who is accessing your systems and how.
Purpose: General system activity log capturing kernel messages, service starts/stops, hardware events, and daemon activity.
Why It's Critical: Provides context around authentication events. If auth.log shows a successful login, syslog can confirm service restarts, network changes, or system modifications that occurred during that session. Essential for timeline reconstruction and correlation.
đĄ Pro Tip: Always correlate auth.log findings with network logs (firewall, IDS), application logs, and endpoint detection tools. A successful SSH login might be legitimate, but if followed by suspicious process creation or data exfiltration, it's part of a larger attack chain.
Run bash commands to analyze the logs. Available: cat, grep, wc, awk, sort, uniq, clear, help
grep "Failed password" auth.log to see all failed attempts and identify the repeating IP address.
grep "Failed password" auth.log | grep "203.0.113.77" | wc -l
This section auto-fills once all tasks are completed correctly.
Complete all tasks to reveal the key log line.
The attacker successfully compromised the root account because:
1. Password authentication was enabled for the root user
2. The password was weak enough to be guessed in a dictionary attack
3. No rate limiting or account lockout was in place
4. SSH was exposed to the public internet without IP whitelisting