Traffic Analysis– Traffic Forensic Example

Slides:



Advertisements
Similar presentations
Section 3.1 Network Forensics TRACKING HACKERS THROUGH CYBERSPACE
Advertisements

PPPoE Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Section 3.2 Network Forensics TRACKING HACKERS THROUGH CYBERSPACE CASE STUDY : ANN’S RENDEZVOUS.
Section 2.1 Network Forensics TRACKING HACKERS THROUGH CYBERSPACE
OR I know what you downloaded last night! By: GTKlondike.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
CAP6135: Malware and Software Vulnerability Analysis Network Traffic Monitoring Using Wireshark Cliff Zou Spring 2013.
Hands-on: Capturing an Image with AccessData FTK Imager
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
Forensic and Investigative Accounting
CPSC 441 Tutorial TA: Fang Wang The content of these slides are taken from CPSC 526 TUTORIAL by Nashd Safa (Extended and partially modified)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
Section 2.2 Network Forensics TRACKING HACKERS THROUGH CYBERSPACE
Characteristics of Communication Systems
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Forensic and Investigative Accounting Chapter 14 Digital Forensics Analysis © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Practice 4 – traffic filtering, traffic analysis
Sniffer, tcpdump, Ethereal, ntop
Networks Part 3: Packet Paths + Wireshark NYU-Poly: HSWP Instructor: Mandy Galante.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
COMP2322 Lab 1 Introduction to Wireshark Weichao Li Jan. 22, 2016.
February 2016 Meeting. Web Defacement and Spear Phishing.
Final Project: Advanced Security Blade IPS and DLP blades.
Network Analyzer :- Introduction to Ethereal Computer Networking (Graduate Class)
Case study : Ann’s rendezvous
Traffic Analysis– Wireshark
Traffic Analysis– Traffic Forensic Example
Penetration Testing Reconnaissance 2
Traffic Analysis– Wireshark Simple Example
Penetration Testing Scanning
Networks Problem Set 3 Due Nov 10 Bonus Date Nov 9
Internet Business Associate v2.0
CAP6135: Malware and Software Vulnerability Analysis Network Traffic Monitoring Using Wireshark Cliff Zou Spring 2016.
Lab 2: Packet Capture & Traffic Analysis with Wireshark
The Linux Operating System
資料通訊與網路 教授: 吳照輝 助教: 鄺福全.
COMP2322 Lab 1 Wireshark Steven Lee Jan. 25, 2017.
Networks Problem Set 3 Due Oct 29 Bonus Date Oct 26
Layered Architectures
Wireshark Lab#3.
Networks Problem Set 1 Due Oct 3 Bonus Date Oct 2
Networking for Home and Small Businesses – Chapter 6
Working at a Small-to-Medium Business or ISP – Chapter 7
Investigations [ 10 week ] Investigations 2015 second semester.
Networking for Home and Small Businesses – Chapter 6
Working at a Small-to-Medium Business or ISP – Chapter 7
Packet Sniffing.
Topic 5: Communication and the Internet
I. Basic Network Concepts
Working at a Small-to-Medium Business or ISP – Chapter 7
Process-to-Process Delivery:
Using Splunk – A Case Study
Chapter 15 – Part 2 Networks The Internal Operating System
Network Analyzer :- Introduction to Wireshark
Traffic Analysis– Wireshark Simple Example
ICT Word Processing Lesson 5: Revising and Collaborating on Documents
Wireshark(Ethereal).
Acknowledgement Content from the book:
Network Analyzer :- Introduction to Wireshark
Networking for Home and Small Businesses – Chapter 6
By Seferash B Asfa Wossen Strayer University 3rd December 2003
Protocol Application TCP/IP Layer Model
Virtual Machine and VirtualBox
ITECH1102 Networking and Security
Process-to-Process Delivery: UDP, TCP
Chapter 3 Transport Layer
Presentation transcript:

Traffic Analysis– Traffic Forensic Example Incident Response Technologies Dr. Cliff Zou

Acknowledgement http://forensicscontest.com/ Example “Ann’s bad AIM” is from this website Puzzle #1 Solution: Ann’s Bad AIM http://forensicscontest.com/2009/09/25/puzzle-1-anns-bad-aim Puzzle #1 captured file: http://forensicscontest.com/contest01/evidence01.pcap https://malwerewolf.com/2015/03/network-forensics- round-1-anns-bad-aim/ “Network Forensics: tracking hackers through cyberspace”, by Sherri Davidoff and Jonathan Ham, 2012

“Puzzle #1: Ann’s Bad AIM” from Forensicscontest.com Anarchy-R-Us, Inc. suspects that one of their employees, Ann Dercover, is really a secret agent working for their competitor. Ann has access to the company’s prize asset, the secret recipe. Security staff are worried that Ann may try to leak the company’s secret recipe, and monitor her computer’s traffic. Today an unexpected laptop briefly appeared on the company wireless network. Ann’s computer, (192.168.1.158) sent IMs over the wireless network to this computer. 1. What is the name of Ann’s IM buddy? 2. What was the first comment in the captured IM conversation? 3. What is the name of the file Ann transferred? 4. What is the magic number of the file you want to extract (first four bytes)? 5. What was the MD5sum of the file? 6. What is the secret recipe?

Open the capture file in Wireshark

Q1: What is the name of Ann’s IM buddy? The puzzle’s name has “AIM”, so Ann must use AOL Instant Messenger First, Filter on Ann’s IP address Display filter: ip.addr == 192.168.1.158

Where is the AIM traffic? There are no packets labeled as “AIM” protocol There are many packets labeled as “SSL” because they use TCP port 443 But, check packet content and you will see they are not encrypted! So they are not really SSL (https) packets! They are just AIM messages using port 443, in order to make sure AIM traffic can go through most firewalls Most firewalls allow HTTP and HTTPS traffic go through Many peer-to-peer, botnet/malware, chatting programs use http or https ports for easy penetrating of firewalls. They use the ports but not the corresponding protocols.

Confirm Ann connects with AOL server? The other IP in those SSL packet is: 64.12.24.50 What is this IP? Use “whois” command in Linux to check Or use online whois webserver to do this check So, the SSL traffic is really AIM traffic

AIM protocol decoding? AOL has its own communication protocol, which is complicated Luckily, Wireshark builds AOL protocol in so it can decode AOL traffic! Right-click an SSL packet, choose “Decode As…” Choose “TCP port” and value of “443”, select “AIM” in Current field, then click “Save” Now Wireshark will decode all those port-443 traffic as AIM traffic!

Q1: what is the name of Ann’s IM buddy? Check Packet 25: “outgoing to : Sec558user1” Check the AIM messaging section in this packet Now we know Ann is messaging with Buddy” Sec558user1

Q2: What was the first comment in the captured IM conversation? Packet#23 is “keep alive”. No real content Packet#25 content: So, the answer is: Here's the secret recipe... I just downloaded it from the file server. Just copy to a thumb drive and you're good to go >:-)

Q3: What is the name of the file Ann transferred? There are many TCP packets with Ann’s computer, might be file transfer? Google search found AIM file transfer use TCP port 5190 New display filter: ip.addr == 192.168.1.158 && tcp.port==5190

Q3: What is the name of the file Ann transferred? Check the first data packet after the three-way handshake (connection setup) packets, it is Packet #112 Look at the binary data section: OFT2 file transfer protocol, file name is: recipe.docx

Q4: What is the magic number of the file you want to extract (first four bytes)?  Most protocols can be identified by well-known sequences of bytes near the zero-offset Almost all file formats have “headers” with a few zero-offset bytes to uniquely identify them These first few bytes are referred as “magic numbers” We need to “carve out” the file ‘recipe.docx’ from packet capture

Carving Out Files – Wireshark Approach We can directly use wireshark to carve out a file But, it is suitable only for small-size file From data transfer packet#112, right click to “follow TCP stream”, The duplex connection flow will show up (both directions) We are interested in the file transferred out from Annn’s computer 192.168.1.158 So only need the half-duplex flow from source IP of 192.168.1.158 (12kBytes) The other half-duplex is protocol and Acknowledgement traffic from the receiver (512 bytes)

Carving Out Files – Wireshark Approach Select the correct traffic direction, and select “save data as Raw”, then “Save as…” to save it to recipe.docx But, this file still contains protocol exchange info/content We need to remove those unrelated stuff

Carving Out Files – Wireshark Approach Use a Hex Editor to edit the saved file You can use any free hex editor I use Be.HexEditor (GUI-based, Free): https://sourceforge.net/projects/hexbox/files/hexbox/Be.HexEditor%201.6.0/ Find the start of the receipt.docx file: Need to know the start magic number of docx Google “docx file signature”, the link: https://en.wikipedia.org/wiki/List_of_file_signatures Show that the start of docx should be “PK..”

Carving Out Files – Wireshark Approach Delete all bytes before the “PK..” (50 4b) Now the file is readable by Word! So the magic number is “50 4b 03 04”

Q5: What was the MD5sum of the file? Go to Kali Linux VM on your machine: Thus the file’s MD5sum is: 8350582774e1d4dbe1d61d64c89e0ea1

Carving Out Files – tcpxtract Extract and reconstruct TCP stream payload data based on file signatures (magic numbers) Kali Linux does not have it, but you can install it

Carving Out Files – tcpxtract Tcpxtract contain file signatures for many file types, including “PK..” .docx actually uses zip format Use tcpxtract to extract all files from trace The firt 00000024.zip file between IP 1.158 and 1.159 should be the recipe.docx

Network Forensic Tool – Networkminer Commercial software, but has a simplified free version http://www.netresec.com/?page=NetworkMiner By loading the trace file, Networkminer extracted the file without any problem But, it only interprets the few protocols it understands