• Home
  • Attack
  • Dataset
  • Contact Us
        • T1-24–01–S–N–CL
        • T2-24–01–S–N–CL
        • T3-24–01–S–N–CL
        • T4-24–01–S–E–M
        • T5-24–01–S–E–LM
        • T6-24–01–S–E–FH
        • T7-24–01–M–NE–CLM
        • T8-24–01–M–NE–CFHL
        • T9-24–01–M–NE–CLM
        • T1-24–02–S–N–CIKM
        • T2-24–02–S–N–CL
        • T3-24–02–S–N–CL
        • T4-24-02-S-E-M
        • T5-24-02-S-E-DL
        • T6-24-02-S-E-DEGN
        • T7-24-02-M-NE-CDEGLN
        • T8-24-02-M-NE-CDL
        • T9-24-02-M-NE-CLH
  • T8-24–01–M–NE–CFHL
  • Apache ActiveMQ + SU-Bruteforce

    This attack is a combination of T3-24-01-S-N-CL and T6-24-01-S-E-FH, and two logs are collected: pcap and log.

    The attacker executes code in Apache(ActiveMQ 5.17.3) remotely using T3-24-01-S-N-CL attack. Files (poc_1.xml, poc_2.xml) will be imported to perform malicious behavior and poc_3.xml's Python file run will execute a bruteforce attack using via su command, which is T6-24-01-S-E-FH.
  •  


  • OS IP Software Log collection
    time
    Program
    runtime
    Attacker Windows 11 192.168.56.1 - 120 sec 150 sec
    Victim Ubuntu 20.04.1 192.168.56.103 (Internal)
    10.0.2.15 (External)
    ActiveMQ 5.17.3

  • Installing
  • python3 -m pip install -r requirements.txt

  • Using
  • You have to run terminal 1 before terminal 2

    [Terminal 1]
    python3 -m http.server 8888

    [Terminal 2]
    python3 run.py

  • MITRE ATT&CK Framework
  • Attack Tactic
    Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion
    Credential Discovery Lateral Movement Collection Command and Control Exfiltration Impact

  • Logs
  • ./log/2024_01_T8_{time}.log # YYmmdd_HHMMSS
    ./log/2024_01_T8_{time}.pcap # YYmmdd_HHMMSS



  • References
  • [1] NIST [CVE-2023-46604]
    [2] Ahnlab ASEC [지속적인 공격 대상이 되고 있는 Apache ActiveMQ 취약점 (CVE-2023-46604)]
    [3] Apache [security-advisories.data]
    [4] MITRE [Brute Force: Password Guessing]
    [5] MITRE [Privilege Escalation]

  • ※ Click on the attack name to see a description and scenario for the attack
    • 2024 01
    • T1-24–01–S–N–CL
    • T2-24–01–S–N–CL
    • T3-24–01–S–N–CL
    • T4-24–01–S–E–M
    • T5-24–01–S–E–LM
    • T6-24–01–S–E–FH
    • T7-24–01–M–NE–CLM
    • T8-24–01–M–NE–CFHL
    • T9-24–01–M–NE–CLM
  • Copyright(C) 2024, KAIST Cyber Security Reserch Center. All Rights Reserved.