Skip to main content

SOC170 – Passwd Found in Requested URL – Possible LFI Attack

 

By: Tanner Adler

Introduction

This post walks through my investigation of a “High” severity alert in the LetsDefend SOC platform. The case centers around EventID: 120 (Rule: SOC170 – Passwd Found in Requested URL – Possible LFI Attack), which at first glance appears suspicious since the requested URL contains directory traversal into the /etc/passwd/ file on a Web Server.


Alert Overview

The alert triggered on March 01, 2022, at 10:10 AM, when the SIEM detected the string passwd in a requested URL

https://172.16.17.13/?file=../../../../etc/passwd

This path is a classic indicator of a Local File Inclusion (LFI) attack, where an attacker attempts to access sensitive files by manipulating input parameters.

  • EventID: 120

  • Rule: SOC170 – Passwd Found in Requested URL – Possible LFI Attack

  • Level: Security Analyst

  • Hostname: WebServer1006

  • Destination IP Address: 172.16.17.13 (letsdefend.io)

  • Source IP Address: 106.55.45.162 (Internet)

  • Request Method: GET

  • User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.1.4322)


Event & Endpoint Details

Raw Log Evidence

  • Request URL:
    https://172.16.17.13/?file=../../../../etc/passwd

  • User-Agent:
    Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.1.4322)

  • HTTP Method: GET

  • Device Action: Permitted

  • HTTP Response: 500 (0 bytes)

Log Management View

Filtering by destination IP confirms the event:

Endpoint Security View

  • No direct endpoint match for the source IP (attacker) was found within the company network.


Analysis Steps

A. Understanding Why the Alert Triggered

  • The rule is designed to catch attempts to access sensitive files like /etc/passwd through directory traversal (LFI) attacks.

  • The attacker tried a classic payload by injecting the following into the URL.  ../../../../etc/passwd

B. Collect Data

  • Source IP: 106.55.45.162 (Attacker, external)

  • Destination IP: 172.16.17.13 (Web Server, internal)

  • Direction: Internet → Company Network

C. Examine HTTP Traffic

  • The HTTP request was made from the external IP to the internal web server, targeting a sensitive Linux file.

  • Response status was 500 with 0 bytes, suggesting the attack was not successful (the web server likely crashed or timed out rather than serving the file).


Investigation Results

Was the Traffic Malicious?

Yes – The traffic matched the signature of an LFI attack, targeting sensitive files.

Attack Type

  • LFI (Local File Inclusion)

  • The goal was to retrieve sensitive contents from the web server’s file system

Was This a Planned Test?

  • No –there was no evidence of a planned test

Direction of Traffic

  • Internet → Company Network

Was the Attack Successful?

No – The web server responded with a 500 status code and did not return any data.

Artifacts

  • Attacker IP: 106.55.45.162

  • Target IP: 172.16.17.13


Escalation Decision

Because the attack was unsuccessful (no sensitive data was exfiltrated), Tier 2 escalation was not required.


Analyst Note

The attacker’s IP is 106.55.45.162, which attempted an LFI attack on the Web Server 172.16.17.13, but was unsuccessful because the web server timed out. HTTP Response =  500 with 0 bytes.


Close Alert

The alert was closed as a True Positive (malicious activity detected), but due to the server’s configuration and timely error response, no harm was done. Escalation was not needed as there was no evidence of compromise.


Lessons Learned

  • Directory traversal and LFI attacks remain common techniques for probing web servers.

  • Even unsuccessful attacks provide valuable information about adversary behavior.

  • Properly handling errors and input validation on web applications is essential to prevent exploitation.