Section 3.1 Network Forensics TRACKING HACKERS THROUGH CYBERSPACE

Slides:



Advertisements
Similar presentations
The Internet.
Advertisements

SHARKFEST '09 | Stanford University | June 15–18, 2009 The Reality of 10G Analysis Presented by: Network Critical Wednesday, June 17 th, :30 pm –
Click to continue Network Protocols. Click to continue Networking Protocols A protocol defines the rules of procedures, which computers must obey when.
Network Fundamentals – Chapter 4 Sandra Coleman, CCNA, CCAI
DSL-2730B, DSL-2740B, DSL-2750B.
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Case study : The curious mr. x
10. UDP/TCP WWW page: Text book: Mastering Networks (Chapter 10) Network IP protocol is routes the data.
Section 3.2 Network Forensics TRACKING HACKERS THROUGH CYBERSPACE CASE STUDY : ANN’S RENDEZVOUS.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Introduction to the Transport.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Section 2.1 Network Forensics TRACKING HACKERS THROUGH CYBERSPACE
OR I know what you downloaded last night! By: GTKlondike.
1 Capturing & Analyzing Network Traffic: tcpdump/tshark and Wireshark EE 122: Intro to Communication Networks Vern Paxson / Jorge Ortiz / Dilip Anthony.
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
© 2006, The Technology Firm Ethereal The Technology Firm.
Hands-on: Capturing an Image with AccessData FTK Imager
Process-to-Process Delivery:
1 Lab 3 Transport Layer T.A. Youngjoo Han. 2 Transport Layer  Providing logical communication b/w application processes running on different hosts 
Forensic and Investigative Accounting
Computer Networks  Network - A system of computers interconnected in order to share information.  Data transmission - consists of sending and receiving.
Section 2.2 Network Forensics TRACKING HACKERS THROUGH CYBERSPACE
How to Create Shapefiles For NiJel Using QGIS: Before you start creating shapefiles make sure you have OpenOffice install, QGIS, and File Transfer Protocol.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
JavaScript, Fourth Edition
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Forensic and Investigative Accounting Chapter 14 Digital Forensics Analysis © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Transmission Control Protocol
Phishing Lab. Lab 9: Phishing ● Step 1: Acquire Some Data ● Open the Phishing_Evidence document. This is the original in its initial format as.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
Presented by Rebecca Meinhold But How Does the Internet Work?
Practice 4 – traffic filtering, traffic analysis
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
Sniffer, tcpdump, Ethereal, ntop
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Dynamic Host Configuration Protocol (DHCP)
Network Analyzer :- Introduction to Wireshark. What is Wireshark ? Ethereal Formerly known as Ethereal GUINetwork Protocol Analyzer Wireshark is a GUI.
Networks Part 3: Packet Paths + Wireshark NYU-Poly: HSWP Instructor: Mandy Galante.
Computer Networking.  The basic tool for observing the messages exchanged between executing protocol entities  Captures (“sniffs”) messages being sent/received.
COMP2322 Lab 1 Introduction to Wireshark Weichao Li Jan. 22, 2016.
UDP: User Datagram Protocol Chapter 12. Introduction Multiple application programs can execute simultaneously on a given computer and can send and receive.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
COMP2322 Lab 4 Socket Programming Toby Lam March 2, 2016.
INF3190 – Home Exam 2. Goal The goal of this exercise is to provide network layer reliability for the monitoring/administration tool presented in “home.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
February 2016 Meeting. Web Defacement and Spear Phishing.
PORT CONNECTION STATUS CT Lab#4. TCP packet UDP packet Ports Background.
Network Analyzer :- Introduction to Ethereal Computer Networking (Graduate Class)
Case study : Ann’s rendezvous
Traffic Analysis– Traffic Forensic Example
Networks Problem Set 3 Due Nov 10 Bonus Date Nov 9
Lab 2: Packet Capture & Traffic Analysis with Wireshark
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Networks Problem Set 3 Due Oct 29 Bonus Date Oct 26
Understand the OSI Model Part 2
Networking for Home and Small Businesses – Chapter 6
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Networking for Home and Small Businesses – Chapter 6
Packetizing Error Detection
Packetizing Error Detection
Process-to-Process Delivery:
Traffic Analysis– Traffic Forensic Example
Network Analyzer :- Introduction to Wireshark
Packetizing Error Detection
Network Analyzer :- Introduction to Wireshark
Networking for Home and Small Businesses – Chapter 6
Process-to-Process Delivery: UDP, TCP
Transport Layer 9/22/2019.
Presentation transcript:

Section 3.1 Network Forensics TRACKING HACKERS THROUGH CYBERSPACE Case study : Ann Section 3.1 Network Forensics TRACKING HACKERS THROUGH CYBERSPACE

Scenario: Ann’s Bad AIM Anarchy-R-Us, Inc. suspects that one of their employees, Ann Dercover, is really a secret agent working for their competitor. Ann has access to the company’s prize asset, the secret recipe. Security staff are worried that Ann may try to leak the company’s secret recipe. Security staff have been monitoring Ann’s activity for some time, but haven’t found anything suspicious– until now. Today an unexpected laptop briefly appeared on the company wireless network. Staff hypothesize it may have been someone in the parking lot, because no strangers were seen in the building. Ann’s computer, (192.168.1.158) sent IMs over the wireless network to this computer. The rogue laptop disappeared shortly thereafter. “We have a packet capture of the activity,” said security staff, “but we can’t figure out what’s going on. Can you help?” http://forensicscontest.com/2009/09/25/puzzle-1-anns-bad-aim

Mission You are the forensic investigator. Your mission is to figure out who Ann was IM-ing, what she sent, and recover evidence including: 1. What is the name of Ann’s IM buddy? 2. What was the first comment in the captured IM conversation? 3. What is the name of the file Ann transferred? 4. What is the magic number of the file you want to extract (first four bytes)? 5. What was the MD5sum of the file? 6. What is the secret recipe?

What protocol is being used? Remember that the count byte offset is 0. Look for bits that are commonly associated with a protocol. Example: 0x0045 -> beginning of an IPv4 packet Tcpdump from Ann’s Bad AIM packet capture

Wireshark - TCP IP protocol details displayed within Wireshark. Notice that the IP packet contains information about the encapsulated protocol (in this case, 0x06, or TCP). Pg 85

TCp / udp port numbers http://www.iana.org/assignments/port-numbers /etc/services Example chunk of file:

UDP port association “UDP Protocol Details displayed within Wireshark. Notice that Wireshark automatically associates the UDP port, 123, with its IANA-assigned default service, NTP.” Pg 86

Wireshark is not always correct “TCP packet details displayed within Wireshark. Notice that Wireshark automatically associates TCP port 443 with its IANA-assigned default service, HTTPS. However, this interpretation is INCORRECT (as evidenced by the fact that the packet contents are not encrypted, and no protocol details are displayed under the heading “Secure Socket Layer”).” Pg. 87

Find out about the mystery ip A simple whois lookup can provide a lot of information. Below is only a snippet of the data provided about IP address 64.12.24.50

Make a reasonable hypothesis Facts: AOL provides services including: HTTP and instant messaging Packet 112 source is port 5190, which Wireshark associates with AOL Packet begins with 0x4F465432, or “OFT2” in ASCII which matches OSCAR protocol

OSCAR Protocol Byte 6 and 7 indicate type 0x0101 of packet 112 specifies the “Prompt” value Sender is ready to transmit file

Protocol decoding Message becomes clear when the protocol is decoded

Exporting fields Easy to do in Wireshark – File > “Export Selected Packet Bytes” Saves contents of selected fields for further study Tshark will print out any or all fields defined within the protocol Examples of command line instructions $ tshark -r evidence.pcap -X lua_script:oft -tsk.lua -R "oft" -n -R frame. number ==112 -V $ tshark -r evidence01.pcap -X lua_script:oft -tsk.lua -R "oft" -n -R frame. number ==112 -T pdml

Packet analysis Dirty word search using ngrep

Parsing Protocol fields Use tshark to extract all of the AIM message data from the package capture

Packet filtering Filtering with BPF Resulting file

Find the file transfer Use Wireshark display filters to search for channel 2 ICBM packet sent to AOL server

Flow analysis List conversations List TCP flow

Export TCP flow Once you have identified the flow most likely to contain the file, export it using a BPF filter Tcpflow will automatically extract flows, also using BPF filter Notice that tcpflow extracted two half-duplex flows

Export tcp flow continued Manually export using Wireshark Warning! Does not scale well, not good for large projects! Select Frame #109 > Right click > click on “Follow TCP Stream” Save in raw format

File and data carving Open full duplex saved dump file in hex editor First 4 bytes are “OFT2” Bytes 6-7 (Type) are 0x0101 Bytes 28 – 31 (Total Size) are 0x00002EE8 12,008 bytes File name begins at Byte 192 0xc0 Padded with null to 64 bytes Byte 256 new header 0x0202 = acknowledge

File and data carving continued Look for magic number for beginning of .docx file 0x504B or PK in ASCII Byte 512 (0x200) To find the end of the file add the file size to the starting byte 0x0200 + 0x2EE8 = 0x30E8 Byte 0x30E8 shows Type 0x0204 = done Size of transfer Byte 0x3108 = 0x2EE8 which is a match to the file size

File and data carving continued again Use Bless cut tool to carve out the file Select extra data at the end of the file and click cut Select extra data at the beginning of the file and click cut Save file as “recipe.docx” Get cryptographic hashes of file Double check file size Verify the file type

Carved file Open a copy of the file to verify the contents

Extract file automatically Use tcpextract Uses 0x504B0304 by default to mark the beginning of a file Try saving the first instance “00000023.zip” as “recipe-tcpxtract.docx” and open a copy in document editor Do not forget to take the cryptographic hashes

networkMiner All of the work is done for us in NetworkMiner

Disclaimer: All information and data pulled directly from this book. Pages 88 - 134 Works Cited Davidoff, S., & Ham, J. (2012). Network Forensics Tracking Hackers Through Cyberspace. Boston: Prentice Hall.