New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CCOA Exam - Topic 1 Question 1 Discussion

Actual exam question for Isaca's CCOA exam
Question #: 1
Topic #: 1
[All CCOA Questions]

SIMULATION

The network team has provided a PCAP file with suspicious activity located in the Investigations folder on the Desktop titled, investigation22.pcap.

What is the filename of the webshell used to control the host 10.10.44.200? Your response must include the file extension.

Show Suggested Answer Hide Answer
Suggested Answer: A

To identify the filename of the webshell used to control the host 10.10.44.200 from the provided PCAP file, follow these detailed steps:

Step 1: Access the PCAP File

Log into the Analyst Desktop.

Navigate to the Investigations folder located on the desktop.

Locate the file:

investigation22.pcap

Step 2: Open the PCAP File in Wireshark

Launch Wireshark on the Analyst Desktop.

Open the PCAP file:

mathematica

File > Open > Desktop > Investigations > investigation22.pcap

Click Open to load the file.

Step 3: Filter Traffic Related to the Target Host

Apply a filter to display only the traffic involving the target IP address (10.10.44.200):

ini

ip.addr == 10.10.44.200

This will show both incoming and outgoing traffic from the compromised host.

Step 4: Identify HTTP Traffic

Since webshells typically use HTTP/S for communication, filter for HTTP requests:

http.request and ip.addr == 10.10.44.200

Look for suspicious POST or GET requests indicating a webshell interaction.

Common Indicators:

Unusual URLs: Containing scripts like cmd.php, shell.jsp, upload.asp, etc.

POST Data: Indicating command execution.

Response Status: HTTP 200 (Success) after sending commands.

Step 5: Inspect Suspicious Requests

Right-click on a suspicious HTTP packet and select:

arduino

Follow > HTTP Stream

Examine the HTTP conversation for:

File uploads

Command execution responses

Webshell file names in the URL.

Example:

makefile

POST /uploads/shell.jsp HTTP/1.1

Host: 10.10.44.200

User-Agent: Mozilla/5.0

Content-Type: application/x-www-form-urlencoded

Step 6: Correlate Observations

If you identify a script like shell.jsp, verify it by checking multiple HTTP streams.

Look for:

Commands sent via the script.

Response indicating successful execution or error.

Step 7: Extract and Confirm

To confirm the filename, look for:

Upload requests containing the webshell.

Subsequent requests calling the same filename for command execution.

Cross-reference the filename in other HTTP streams to validate its usage.

Step 8: Example Findings:

After analyzing the HTTP streams and reviewing requests to the host 10.10.44.200, you observe that the webshell file being used is:

shell.jsp

Answe r:

shell.jsp

Step 9: Further Investigation

Extract the Webshell:

Right-click the related packet and choose:

mathematica

Export Objects > HTTP

Save the file shell.jsp for further analysis.

Analyze the Webshell:

Open the file with a text editor to examine its functionality.

Check for hardcoded credentials, IP addresses, or additional payloads.

Step 10: Documentation and Response

Document Findings:

Webshell Filename: shell.jsp

Host Compromised: 10.10.44.200

Indicators: HTTP POST requests, suspicious file upload.

Immediate Actions:

Isolate the host 10.10.44.200.

Remove the webshell from the web server.

Conduct a root cause analysis to determine how it was uploaded.


Contribute your Thoughts:

0/2000 characters
Page
2 months ago
Wait, are we sure about that? Seems too obvious.
upvoted 0 times
...
Pearly
2 months ago
I think it’s actually backdoor.php.
upvoted 0 times
...
Marge
3 months ago
I agree, shell.php fits the profile perfectly!
upvoted 0 times
...
Callie
3 months ago
Definitely shell.php, I've seen it before.
upvoted 0 times
...
Miles
3 months ago
The webshell is likely shell.php.
upvoted 0 times
...
Beata
3 months ago
I need to check the HTTP requests in the PCAP; that might help me find the webshell’s filename.
upvoted 0 times
...
Marla
4 months ago
I feel like I’ve seen a webshell filename before, but I can’t quite remember if it was .php or something else.
upvoted 0 times
...
Miss
4 months ago
I think we had a similar question in our last mock exam about identifying malicious files. I hope I can recall the right steps!
upvoted 0 times
...
Audry
4 months ago
I remember we practiced analyzing PCAP files, but I’m not sure how to pinpoint the webshell specifically.
upvoted 0 times
...
Jesusita
4 months ago
Hmm, this is a bit of a challenge. I'm not super familiar with analyzing PCAP files, but I'll give it my best shot. I'll start by looking for any connections to the host 10.10.44.200 and see if I can find any suspicious-looking requests or responses. Hopefully, that will lead me to the webshell filename.
upvoted 0 times
...
Iluminada
4 months ago
Alright, time to put on my detective hat. The key here is to really dig into that PCAP file and see what kind of activity is going on. I bet if I look for any unusual or suspicious-looking HTTP traffic, that might give me a clue about the webshell. Gotta stay focused and not get distracted by irrelevant stuff.
upvoted 0 times
...
Lorrie
5 months ago
This seems like a tricky one. I'm not sure where to start, but I'll need to look through the PCAP file and see if I can find any suspicious traffic or indicators of a webshell. Hopefully, there will be some clear evidence that I can use to identify the filename.
upvoted 0 times
...
Rodolfo
5 months ago
Okay, let's see what we've got here. The network team has provided a PCAP file with suspicious activity, and we need to find the filename of the webshell used to control the host 10.10.44.200. I'll need to carefully analyze the PCAP file to see if I can find any clues about the webshell.
upvoted 0 times
...
Brendan
9 months ago
I think Micheline is correct, the webshell is likely investigation22.php based on the context of the situation.
upvoted 0 times
...
Micheline
9 months ago
But the suspicious activity is related to a PHP file, so it makes more sense for the webshell to be a PHP file.
upvoted 0 times
...
Dorothea
9 months ago
The filename is probably something mundane like 'admin.asp' or 'upload.php'. Gotta keep it simple for the script kiddies, am I right?
upvoted 0 times
Clay
8 months ago
upload.php
upvoted 0 times
...
Lizbeth
8 months ago
admin.asp
upvoted 0 times
...
...
Leah
9 months ago
I disagree, I believe the filename is investigation22.asp.
upvoted 0 times
...
Micheline
9 months ago
I think the filename of the webshell is investigation22.php.
upvoted 0 times
...
Ronald
9 months ago
Haha, I bet the answer is something like 'virus.exe' or 'hacker_tools.zip'. You know those IT guys love to get creative with their filenames!
upvoted 0 times
Hannah
8 months ago
C) investigation22.py
upvoted 0 times
...
Cory
8 months ago
B) investigation22.html
upvoted 0 times
...
Junita
8 months ago
A) investigation22.php
upvoted 0 times
...
...
Marg
10 months ago
Hmm, shell.php sounds plausible, but I'm also considering backdoor.aspx or even something more obscure like web_admin.jsp. Gotta love those sneaky webshells!
upvoted 0 times
Stephen
8 months ago
I'm not sure, but web_admin.jsp could be a possibility
upvoted 0 times
...
Thurman
8 months ago
I'm leaning towards backdoor.aspx
upvoted 0 times
...
Kristal
8 months ago
I think it might be shell.php
upvoted 0 times
...
...
Joseph
10 months ago
I think the webshell file used to control the host 10.10.44.200 is shell.php. That's what I'd put for the answer.
upvoted 0 times
Elfriede
9 months ago
See the solution in Explanation
upvoted 0 times
...
Ezekiel
9 months ago
That's what I'd put for the answer.
upvoted 0 times
...
Breana
9 months ago
I think the webshell file used to control the host 10.10.44.200 is shell.php.
upvoted 0 times
...
...

Save Cancel