Case 1 – Web Server Intrusion Attempt Against Grav CMS

This case simulates an attacker probing a Linux web server running Grav CMS. The investigation includes attacker activity (Kali), SIEM visibility (Wazuh), and incident response workflow (DFIR‑IRIS).

1. Case Overview

2. Attack Simulation (Kali)

Summary of attacker actions performed from Kali.

2.1. Reconnaissance

Webserver scan and enumeration.

kali_1 kali_2
dirb http://10.10.10.30
kali_3

2.2. Initial Access Attempt

Weak credentials and error generation.

admin:admin
test:test
user:user
etc.
kali_4 kali_5

2.3. Persistence Attempt

Accessing restricted or interesting paths.

kali_6 kali_7

2.4. Defense Evasion Attempts

Mixed navigation and varying patterns.

kali_8

3. Detection and Analysis (Wazuh SIEM)

How Wazuh detected and logged the activity.

3.1. Alerts

wazuh_1 wazuh_2 wazuh_3

3.2. Log Evidence

Access logs and error logs.

wazuh_4
10.10.10.40 - - [03/Feb/2026:13:36:53 +0000] "GET /provoked_error HTTP/1.1" 404 3139 "-" "Mozilla/5.0 (X11; Linux x86_64; rv:140.0 Gecko/20100101 Firefox/140.0")
wazuh_5

3.3. SIEM Correlation

How alerts tie together into a single incident, including mixed navigation.

wazuh_6 wazuh_7

4. Incident Response (DFIR‑IRIS)

How the case was documented and analyzed in DFIR‑IRIS.

4.1. Customer, Template and Case Creation

iris_1 iris_2 iris_3

4.2. Evidence Added

iris_4

4.3. IOCs

iris_5

4.4. Timeline Reconstruction

iris_6

5. MITRE ATT&CK Mapping and Conclusion

iris_7

6. Case Closing

The attacker performed reconnaissance, directory enumeration, admin panel probing, and weak credential attempts. No compromise occurred. Wazuh successfully detected the activity, and DFIR‑IRIS was used to document the investigation.

iris_8

← Back to Home