Network (Scenario 4)

Attacker Steps:
Attacker is already on machine in DMZ (reposerver)
Attacker gets access on firewall via ssh that is open in DMZ via user and password reuse from step 1
Attacker installs malware that uses portknocking (T1205) on firewall
Knock sequence triggers a script that downloads and executes sliver malware
Attacker connects via sliver malware (T1205)
Attacker modifies iptables so that DMZ host is allowed to connect to a server in the lan (T1599)
Attacker connects to the linux fileshare server in the lan via the DMZ host, user and password reuse from step 1