🛡️ Challenge 02 • Web Server Attack Detection

Offline Level 2 Web Application Security
💡 Next Hint: 30s

Mission Brief

Your web application firewall (WAF) triggered multiple alerts from your production web server (api.blueteam-corp.com) at 10:34 UTC on November 28, 2025. Initial triage suggests a web shell upload attempt. Your mission is to analyze web server logs to determine if the attacker successfully compromised the application.

⚠️ SYNTHETIC SCENARIO
All log data, IP addresses, URLs, and payloads in this challenge are synthetically generated for training purposes. No real systems, vulnerabilities, or incidents are represented.

Available Artifacts

  • /var/log/nginx/access.log – HTTP requests and responses
  • /var/log/nginx/error.log – Application errors and PHP warnings
  • Interactive Terminal – Run grep/awk commands to analyze logs

Learning Objectives

  • Identify malicious HTTP request patterns
  • Detect file upload attacks and web shells
  • Analyze HTTP status codes for successful exploitation
  • Correlate access logs with error logs for complete attack chain
  • Understand OWASP Top 10 attack vectors