Home
Attack
Dataset
Contact Us
Attack
2024 01
T1-24–01–S–N–CL
T2-24–01–S–N–CL
T3-24–01–S–N–CL
T4-24–01–S–E–M
T5-24–01–S–E–LM
T6-24–01–S–E–FH
T7-24–01–M–NE–CLM
T8-24–01–M–NE–CFHL
T9-24–01–M–NE–CLM
2024 02
T1-24–02–S–N–CIKM
T2-24–02–S–N–CL
T3-24–02–S–N–CL
T4-24-02-S-E-M
T5-24-02-S-E-DL
T6-24-02-S-E-DEGN
T7-24-02-M-NE-CDEGLN
T8-24-02-M-NE-CDL
T9-24-02-M-NE-CLH
Dataset
Contact Us
T8-24-02-M-NE-CDL
JNDI Injection RCE + Backdoor(with ARCANUS Tool)
This attack is a combination of T2-24–02–S–N–CL and T5-24-02-S-E-DL, and two logs are collected: pcap and log.
1. Attacker runs a JNDI server to deliver malicious responses
2. Forward Idap quries to server that uses a vulnerable version of Apache Kafka software
3. Download and execute Backdoor using RCE vulnerability
4. Establish Reverse Shell and execute commands cause from Backdoor malware
The T2-24-02-S-N-CL attack leverages a JNDI injection vulnerability in the Apache Kafka software to allow attackers to download and execute the Backdoor malware via remote command. The Backdoor malware causes the program to establish a Reverse Shell session and execute arbitrary commands.
OS
IP
Software
Log collection
time
Program
runtime
Attacker
Windows 11
192.168.56.1
-
60 sec
100 sec
Victim
Ubuntu 22.04
192.168.56.120
Apache Druid 25.0.0
Installing
python3 -m pip install -r requirements.txt
Using
python3 run.py
MITRE ATT&CK Framework
Attack Tactic
Reconnaissance
Resource Development
Initial Access
Execution
Persistence
Privilege Escalation
Defense Evasion
Credential
Discovery
Lateral Movement
Collection
Command and Control
Exfiltration
Impact
Logs
./log/2024_02_T8_{time}.pcap # YYmmdd_HHMMSS
./log/2024_02_T8_{time}.xml # YYmmdd_HHMMSS
References
[1]
NIST [CVE-2023-25194]
[2]
Medium - Victor Park [Apache Kafka 보안 업데이트 권고]
[3]
Apache KAFKA [Apache Kafka Security Vulnerabilities]
[4]
Apache Druid 25.0.0 [Download]
[5]
Naver BLOG [칼리 리눅스 아르카누스로 악성코드 만들기]
[6]
Boannews [해커가 사랑하는 마법의 문 ‘백도어’]
[7]
Github - EgeBalci [ARCANUS]
※ Click on the attack name to see a description and scenario for the attack
2024 02
T1-24–02–S–N–CIKM
T2-24–02–S–N–CL
T3-24–02–S–N–CL
T4-24-02-S-E-M
T5-24-02-S-E-DL
T6-24-02-S-E-DEGN
T7-24-02-M-NE-CDEGLN
T8-24-02-M-NE-CDL
T9-24-02-M-NE-CLH
Copyright(C) 2024, KAIST Cyber Security Reserch Center. All Rights Reserved.