Review Web Application Root Cause and Exposure Window
Post-Incident ReviewP275 min
Perform a web-app-specific post-incident review focused on the exploited weakness, the exposure window, and which telemetry would have shortened time-to-detect.
Actions
- 1.Reconstruct the full exploit path from reconnaissance through shell or code execution, including the first vulnerable request, post-exploitation access, and any lateral movement from the web tier.
- 2.Document the code, infrastructure, and deployment weaknesses that enabled exploitation: missing patches, insecure upload paths, weak secrets handling, or over-privileged service accounts.
- 3.Review WAF, load balancer, and web-server coverage to identify where visibility or blocking should have occurred but did not.
- 4.Define remediation tasks for application validation, deployment hardening, secret rotation, and web-shell detection coverage.
Queries
AzureDiagnostics | where TimeGenerated > ago(30d) | where ResourceType has "APPLICATIONGATEWAYS" or Category has "ApplicationGatewayFirewallLog" | summarize count() by RuleId, clientIP_s, requestUri_s
index=web earliest=-30d (uri_query="*../*" OR uri_query="*union select*" OR uri_query="*cmd*" OR uri_path="*.php" OR uri_path="*.aspx") | stats count by uri_path, clientip
Notes
- A web-app post-incident review is incomplete if it ends at the web shell. The team needs the exploit chain and the exposure window.
- Secret rotation should include deployment credentials, service principals, and any application secrets reachable from the compromised tier.
Where to Go Next
Related Artifacts
Web Server Access & Error Logs
/var/log/apache2/access.log, /var/log/nginx/access.log, /var/log/httpd/access_log (and corresponding error logs)
Systemd Journal (Persistent Binary Logs)
/var/log/journal/<machine-id>/*.journal
Load Balancer Access Logs
Load balancer logs (F5 BIG-IP, AWS ALB/NLB, Azure Application Gateway, HAProxy, Nginx)
Web Application Firewall (WAF) Logs
WAF console or logs (AWS WAF, Azure WAF, Cloudflare, Akamai, Imperva, F5 ASM, ModSecurity)