Null-Byte
Would you like to react to this message? Create an account in a few clicks or log in to continue.

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 2 (Network Forensics)

Go down

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 2 (Network Forensics) Empty Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 2 (Network Forensics)

Post by Admin Fri Jun 19, 2015 11:14 am

Welcome back, my hacker apprentices!

I recently began a new series on digital forensics to show aspiring hackers what the forensic investigator can do and see while investigating a cyber attack. This is the second installment in that series and will focus upon network forensics. In other words, what can a network forensic investigator learn about the attacker during an investigation and how.

Step 1: Get Wireshark
Although there are numerous tools to do network analysis and investigations, the most widely used tool, by far, for doing so is Wireshark. It's a free, network analysis tool that's ported for Windows, Unix, OS X and Linux, and you can get it from here. Even better, it's built into our BackTrack, so no need to download anything, if you are using BackTrack.

You can start Wireshark from the BackTrack menu by going to BackTrack -> Information Gathering -> Network Analysis -> Network Traffic Analysis and click on Wireshark.

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 2 (Network Forensics) Hack-like-pro-digital-forensics-for-aspiring-hacker-part-2-network-forensics.w654

Step 2: Grab a Live Capture
Next, we need to start Wireshark, which is capable of doing analysis on pcap and other capture files, as well as a live capture. Let's do a live capture. Click on Capture on the Menu across the top and it will open a window like that below.

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 2 (Network Forensics) Hack-like-pro-digital-forensics-for-aspiring-hacker-part-2-network-forensics.w654

Select the active interface, which in this case is eth0, as I'm running it on a wired connection.

Step 3: Our Problem
Here's the problem we're faced with.

Our client has been complaining that strange things are happening on his computer. His browser keeps changing his home page to a page that keeps telling him that his computer is infected with a virus, while also telling him that he needs to buy an antivirus program. We've all seen this at one time or another.

In addition, his computer is running slowly and various ads keep coming up. Something has infected this system. Let's see what we can decipher about this situation.

Step 4: Live Capture
We start by sniffing the traffic on the network and we can see the live packets go by like that below.

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 2 (Network Forensics) Hack-like-pro-digital-forensics-for-aspiring-hacker-part-2-network-forensics.w654

ote that Wireshark has three windows. The upper windows shows us each packet and some basic information about it. The middle window enables us to see each and every bit and byte of the packet headers. The bottom window shows us the packet contents in hexadecimal and ASCII.

Step 5: Remote Attempts
The far left column enumerates the packets in the order that they arrive. Let's look at packet 147 below. We can see a messenger packet from a device somewhere on the Internet. Let's take a closer look at this packet by clicking on it. When we do, it's details appear in the middle window in white.

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 2 (Network Forensics) Hack-like-pro-digital-forensics-for-aspiring-hacker-part-2-network-forensics.w654

Since the messenger service is disabled on this network, nothing happens. We can verify that by looking at the next packet, which is an ICMP "Destination Unreachable" packet sent back to the IP requesting a messenger connection. This is suspicious activity.

Step 6: Filter the Traffic
With so much traffic going by, we need to filter the traffic so we only see the traffic we are interested in. If we click on traffic between 216.49.88.118, we can see that this address is antivirus update from McAfee (note in the bottom window in the ASCII section a reference to mcafee.com).

Since this traffic is not dangerous, we can remove it from our viewing by filtering it out. In this case, we want to see everything that is not coming from IP address 216.49.88.118. We can put the following filter into the filter window. When the syntax is correct it, the window background will turn green. The proper syntax to exclude an IP address is:

!ip.addr == 216.49.88.118

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 2 (Network Forensics) Hack-like-pro-digital-forensics-for-aspiring-hacker-part-2-network-forensics.w654

Now we have removed any traffic from our view coming from an innocuous address. This helps us focus our attention on the other, potentially malicious traffic.

In the screenshot below, we have successfully filtered out the traffic to and from McAfee.

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 2 (Network Forensics) Hack-like-pro-digital-forensics-for-aspiring-hacker-part-2-network-forensics.w654

Step 7: DNS Query
Now let's look down a few packets. In this screenshot, we can see that our client's computer (216.148.227.68) in the second packet shows a "standard query" with the DNS protocol to virtumonde.com. This is suspicious!

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 2 (Network Forensics) Hack-like-pro-digital-forensics-for-aspiring-hacker-part-2-network-forensics.w654

If we scroll down to packet 386, we can see our client's host goes out to the virtumonde.com server and requests a download. When we click on this packet and expand its HTTP protocol in the middle window, we can see "updates.virtumonde.com\r\n."

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 2 (Network Forensics) Hack-like-pro-digital-forensics-for-aspiring-hacker-part-2-network-forensics.w654

This is VERY suspicious activity and probably indicates that our client's system has been infected with a rootkit or spyware and it's reporting back to its home server.

Keep coming back my aspiring hackers as we keep exploring the finer points of hacking and forensics!
Admin
Admin
Admin

Posts : 34
Join date : 2015-06-18

https://null-byte.board-directory.net

Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum