This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.



Similar documents
Networks and Security Lab. Network Forensics

Networks & Security Course. Web of Trust and Network Forensics

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

Guide to Computer Forensics and Investigations, Second Edition

Network Intrusion Analysis (Hands-on)

Network Forensics Network Traffic Analysis

Exercise 7 Network Forensics

Design & Implementation of Linux based Network Forensic System using Honeynet

Malicious Network Traffic Analysis

When prevention FAILS: Extending IR and Digital Forensics to the corporate network. Ismael Valenzuela

CS 558 Internet Systems and Technologies

Threat Advisory: Accellion File Transfer Appliance Vulnerability

USE HONEYPOTS TO KNOW YOUR ENEMIES

CRYPTUS DIPLOMA IN IT SECURITY

The HoneyNet Project Scan Of The Month Scan 27

UNCLASSIFIED. General Enquiries. Incidents Incidents

Network Packet Analysis and Scapy Introduction

Malware Detection in Android by Network Traffic Analysis

Network Monitoring using MMT:

7. Exercise: Network Forensic

Penetration Testing with Kali Linux

Joomla Security Report

April 11, (Revision 2)

7. Exercise: Network Forensic

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

HACKER INTELLIGENCE INITIATIVE. The Secret Behind CryptoWall s Success

Certified Cyber Security Expert V Web Application Development

Search and Destroy the Unknown FROM MALWARE ANALYSIS TO INDICATIONS OF COMPROMISE

Vulnerability Assessment and Penetration Testing

Intro to Firewalls. Summary

Why use Scapy? Blue Team. Red Team. Test IDS/IPS Test Firewall Learn more about TCP/IP (down and dirty) Application response(fuzzing)


Transformation of honeypot raw data into structured data

SECURITY ADVISORY FROM PATTON ELECTRONICS

Network Connect Performance Logs on MAC OS

Attacking the TCP Reassembly Plane of Network Forensics Tools

WiFi Security Assessments

Storm Worm & Botnet Analysis

Web Application Worms & Browser Insecurity

Network/Internet Forensic and Intrusion Log Analysis

Web-Application Security

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

ONLINE RECONNAISSANCE

EFFECTIVE IMPLEMENTATION OF DYNAMIC CLASSIFICATION FOR NETWORK FORENSIC AND TRAFFIC ANALYSIS

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

Concierge SIEM Reporting Overview

Research Project 2: Metasploit-able Honeypots

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013

CS5008: Internet Computing

Security Intelligence Services. Cybersecurity training.

Second-generation (GenII) honeypots

WHEN THE HUNTER BECOMES THE HUNTED HUNTING DOWN BOTNETS USING NETWORK TRAFFIC ANALYSIS

Honeypots CERT Exercise Toolset

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Integrating Web Application Security into the IT Curriculum

How To Gather Log Files On A Pulse Secure Server On A Pc Or Ipad (For A Free Download) On A Network Or Ipa (For Free) On An Ipa Or Ipv (For An Ubuntu) On Your Pc

Tracking Anti-Malware Protection 2015

Exploiting Local File Inclusion in A Co-Hosting Environment

How To Monitor Network Activity On Palo Alto Network On Pnetorama On A Pcosa.Com (For Free)

Monitor Network Activity

EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL

How To Monitor Attackers On A Network On A Computer Or Network On An Uniden Computer (For Free) (For A Limited Time) (Czechian) (Cybercrime) (Uk) (Cek) (Kolomot

Shellshock. Oz Elisyan & Maxim Zavodchik

Intrusion detection for web applications

Peach Fuzzer Platform

An Analysis of Malfeasant Activity Directed at a VoIP Honeypot

Honeypots & Honeynets Overview. Adli Wahid Security Specialist, APNIC.net adli@apnic.net

Intrusion Detection in AlienVault

University of Wisconsin Platteville SE411. Senior Seminar. Web System Attacks. Maxwell Friederichs. April 18, 2013

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Firewall Firewall August, 2003

Network Forensics. Handbook, Document for teachers. February

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

KEY TRENDS AND DRIVERS OF SECURITY

JOOMLA REFLECTION DDOS-FOR-HIRE

Monitor Network Activity

Shell over what?! Naughty CDN manipulations. Roee Cnaan, Information Security Consultant

Project 2: Web Security Pitfalls

ThreatSTOP Technology Overview


8 steps to protect your Cisco router

Some Tools for Computer Security Incident Response Team (CSIRT)

Operation Liberpy : Keyloggers and information theft in Latin America

Web Application Security

Tespok Kenya icsirt: Enterprise Cyber Threat Attack Targets Report

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Information Security. Training

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario

Figure 1. Wireshark Menu Bar

A Critical Investigation of Botnet

DMZ Network Visibility with Wireshark June 15, 2010

Chapter 14 Analyzing Network Traffic. Ed Crowley

MWR InfoSecurity Security Advisory. pfsense DHCP Script Injection Vulnerability. 25 th July Contents

Transcription:

This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/3.0/ Hugo González @hugo_glez http://atit.upslp.edu.mx/~hugo/

Como resolver rompecabezas Retos forenses de red Hugo González @hugo_glez UPSLP http://creativecommons.org/licenses/by/2.5/mx/

Qué es un reto forense?

Donde encontrarlos Sans?!?! http://forensicscontest.com/ The Honeynet Project http://honeynet.org/challenges Google http://www.google.com/search? q=network+forensics+challenge

Por qué resolverlos?

Tips Las preguntas sirven como guía Las preguntas son tips de que buscar Tener herramientas disponibles Python!!!

Forensics Contest Puzzle # 6 Ann's Aurora

Descripción The contest is a client-side attack based on Operation Aurora. This packet capture contains a full recording of a real Windows system getting exploited via the same mechanism that was used to exploit Google. Ann spear-phishes a developer, who clicks on a link and connects to her malicious web server. Then she configures the victim to make outbound persistent connection attempts to her server so that she can retain access and reconnect in the future.

1 What was the full URI of Vick Timmes original web request? (Please include the port in your URI.) http://10.10.10.10:8080/index.php 2 In response, the malicious web server sent back obfuscated JavaScript. Near the beginning of this code, the attacker created an array with 1300 elements labeled COMMENT, then filled their data element with a string. What was the value of this string? vei

3 Vick s computer made a second HTTP request for an object. 1. What was the filename of the object that was requested? index.phpmfksxsanketenrah.gif 2. What is the MD5sum of the object that was returned? df3e567d6f16d040326c7a0ea29a4f41

4 When was the TCP session on port 4444 opened? (Provide the number of seconds since the beginning of the packet capture, rounded to tenths of a second. ie, 49.5 seconds) 1.2 5 When was the TCP session on port 4444 closed? (Provide the number of seconds since the beginning of the packet capture, rounded to tenths of a second. ie, 49.5 seconds) 87.5

6 In packet 17, the malicious server sent a file to the client. a What type of file was it? Choose one: * Windows executable ****** * GIF image * PHP script * Zip file * Encrypted data b What was the MD5sum of the file? b062cb8344cd3e296d8868fbef289c7c

7Vick s computer repeatedly tried to connect back to the malicious server on port 4445, even after the original connection on port 4444 was closed. With respect to these repeated failed connection attempts: a How often does the TCP initial sequence number (ISN) change? (Choose one.) * Every packet * Every third packet **** * Every 10-15 seconds * Every 30-35 seconds * Every 60 seconds

B How often does the IP ID change? (Choose one.) * Every packet *** * Every third packet * Every 10-15 seconds * Every 30-35 seconds * Every 60 seconds

C How often does the source port change? (Choose one.) * Every packet * Every third packet * Every 10-15 seconds **** * Every 30-35 seconds * Every 60 seconds

8 Eventually, the malicious server responded and opened a new connection. When was the TCP connection on port 4445 first successfully completed? (Provide the number of seconds since the beginning of the packet capture, rounded to tenths of a second. ie, 49.5 seconds) 123.6

9 Subsequently, the malicious server sent an executable file to the client on port 4445. What was the MD5 sum of this executable file? 10 When was the TCP connection on port 4445 closed? (Provide the number of seconds since the beginning of the packet capture, rounded to tenths of a second. ie, 49.5 seconds) 198.4

Herramientas a utilizar: Cerebro!! Wireshark Tcpdump Editor hexadecimal python

Manos a la obra!!!

Challenge #1 2010 Pcap attack trace By Tillmann Werner

A network trace with attack data is provided. (Note that the IP address of the victim has been changed to hide the true location.) Analyze and answer the following questions:

1 Which systems (i.e. IP addresses) are involved? (2pts) 2 What can you find out about the attacking host (e.g., where is it located)? (2pts) 3 How many TCP sessions are contained in the dump file? (2pts)

4 How long did it take to perform the attack? (2pts) 5 Which operating system was targeted by the attack? And which service? Which vulnerability? (6pts) 6 Can you sketch an overview of the general actions performed by the attacker? (6pts)

7 What specific vulnerability was attacked? (2pts) 8 What actions does the shellcode perform? Pls list the shellcode. (8pts) 9 Do you think a Honeypot was used to pose as a vulnerable victim? Why? (6pts)

10 Was there malware involved? Whats the name of the malware? (We are not looking for a detailed malware analysis for this challenge) (2pts) 11 Do you think this is a manual or an automated attack? Why? (2pts)

Manos a la obra!!!

Preguntas, comentarios. hugo.glez@gmail.com @hugo_glez

Tools Xplico Networkminer Honeysnap Ngrep Argus Sancp Cxtracker

Fuzzing Taof Gpf Peach Minifuzz Comraider Danzier Scapy