"Anatolia": compromised server
Scenario: "Anatolia": compromised server
Level: Hard
Type: Fix
Tags: hack
Access: Email
Description: This web server has been compromised and is not serving the home page anymore, those troubleshooting skills you have as DevOps are urgently needed to solve the mystery of the missed home page and restore the integrity of the server.
Note: The default configuration files under /etc/apache2 are not the problem.
This scenario is based on a real server that was "hacked". Ideally you'd recover from infrastrucrure as code playbooks and clean data backups on a new server with the vulnerabilities fixed. Instead, in this exercise you are asked to clean manually the compromised server, restore it to a working condition and ideally, find how the server was broken into. The solution test only checks that the web service is working.
Root (sudo) Access: True
Test: curl localhost must return SadServer - Anatolia
The "Check My Solution" button runs the script /home/admin/agent/check.sh, which you can see and execute.
Time to Solve: 20 minutes.