Chris Sanders 🔎 🧠<p>I chose this scenario because it's one I've encountered in my time as a pen tester and in forensic scenarios. When you're dealing with specialized software, it's helpful to know how an attacker might approach unexpected access to it. So, about that...</p><p>It might not be that often that an attacker actively seeks out a Tomcat server, but if they happen across one that might help them achieve their goals, they'll absolutely try to take advantage of that, particularly if it's as easy as using a default credential.</p><p>A common scenario for an attacker with admin access here is to deploy a web shell that allows them to issue commands to the underlying operating system. If Tomcat is running as an admin, the attacker can usually leverage that into direct interactive access in a number of ways.</p><p>I've gone from this exact scenario to domain admin and seen real attackers do it as well. When you understand how it happens, you can consider the places where those actions might leave evidence.</p><p>During the time users were logged in, were any new applications deployed? Were any new WAR files written to the system? Were any underlying system commands executed? Were there any changes to remote access policies? It's all about furthering access here in most cases.</p><p>Remember, the server could have been setup by a legit user who just neglected to change the credentials. It's worth asking them. Either way, you'll need to differentiate benign from malicious use. There are lots of good ideas for that in folks' replies.</p><p>Speaking of web servers, do you know where they all are in your environment? How would you know if a new one popped up? That’s something to think about... 🚀</p><p><a href="https://infosec.exchange/tags/InvestigationPath" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InvestigationPath</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/SOC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SOC</span></a></p>