Home
Attack
Dataset
Contact Us
Attack
2024 01
T1-24–01–S–N–CL
T2-24–01–S–N–CL
T3-24–01–S–N–CL
T4-24–01–S–E–M
T5-24–01–S–E–LM
T6-24–01–S–E–FH
T7-24–01–M–NE–CLM
T8-24–01–M–NE–CFHL
T9-24–01–M–NE–CLM
2024 02
T1-24–02–S–N–CIKM
T2-24–02–S–N–CL
T3-24–02–S–N–CL
T4-24-02-S-E-M
T5-24-02-S-E-DL
T6-24-02-S-E-DEGN
T7-24-02-M-NE-CDEGLN
T8-24-02-M-NE-CDL
T9-24-02-M-NE-CLH
2025
T1-25–01–S–N–CD
T2-25–01–S–N–CL
T3-25–01–S–N–CD
T4-25-01-S-E-FH
T5-25-01-S-E-CL
T6-25-01-S-E-CL
T7-25-01-M-NE-CDN
T8-25-01-M-NE-CLFH
T9-25-01-M-NE-CDFH
Dataset
Contact Us
T9-25–01–M–NE–CDFH
Apache OFBiz RCE + SU-Bruteforce
This attack is a combination of T3-25-01-S-N-CD and T6-24-01-S-E-FH, and two logs are collected: pcap and log.
1. Attacker identifies a vulnerable server and attempts a remote code execution(RCE) via CVE-2024-38856.
2. After the successful exploitation, the attacker uses RCE to force the target to download payloads from attacker’s host.
3. The attacker executes a remote SU brute-force script on the target and collects the output returned by the target server (attempting to gain root).
The attacker leverages CVE-2024-38856 to download a malicious python script onto the target from an attacker-controlled host, then executes the SU-brute-force attack to attempt privilege excalation to root.
OS
IP
Software
Log collection
time
Program
runtime
Attacker
Windows 11
192.168.56.1
Python
80 sec
200 sec
Victim
Ubuntu 22.04.1
192.168.56.110
Apache OFBiz v18.12.14
Installation
python3 -m venv venv
.\venv\Scripts\Activate.ps1
pip install -r requirements.txt
Usage
Make sure to run Terminal 1 before Terminal 2
[Terminal 1]
python3 -m http.server 8888
[Terminal 2]
python3 run.py
MITRE ATT&CK Framework
Attack Tactic
Reconnaissance
Resource Development
Initial Access
Execution
Persistence
Privilege Escalation
Defense Evasion
Credential
Discovery
Lateral Movement
Collection
Command and Control
Exfiltration
Impact
Logs
./log/2025_01_T9_{time}.log # YYmmdd_HHMMSS
./log/2025_01_T9_{time}.pcap # YYmmdd_HHMMSS
References
[1]
NIST [CVE-2024-38856]
[2]
SecureLayer7 [CVE-2024-38856 – Apache Ofbiz RCE]
[3]
Github – securelayer7 [CVE-2024-38856_Scanner]
[4]
Zscaler Blog [CVE-2024-38856: Pre-Auth RCE Vulnerability in Apache OFBiz]
[5]
MITRE [Brute Force: Password Guessing]
[6]
MITRE [Privilege Escalation]
※ Click on the attack name to see a description and scenario for the attack
2025
T1-25–01–S–N–CD
T2-25–01–S–N–CL
T3-25–01–S–N–CD
T4-25–01–S–E–FH
T5-25–01–S–E–CL
T6-25–01–S–E–CL
T7-25–01–M–NE–CDN
T8-25–01–M–NE–CLFH
T9-25–01–M–NE–CDFH
Copyright(C) 2024, KAIST Cyber Security Reserch Center. All Rights Reserved.