Cyberdefenders - WireDive
WireDive
Info
- Category : Digital Forensics
- SHA1SUM : a2aa9ad4831057e17df585bdac84efc05ec0413d
- Published : Oct. 7, 2020
- Authors : Johannes Weber and Champlain College
- Size : 26M
- Tags : Wireshark PCAP SMB Network
Uncompress the challenge (pass: cyberdefenders.org)
Scenario
WireDive is a combo traffic analysis exercise that contains various traces to help you understand how different protocols look on the wire. Challenge Files :
- dhcp.pcapng
- dns.pcapng
- https.pcapng
- network.pcapng
- secret_sauce.txt
- shell.pcapng
- smb.pcapng
Tools
- BrimSecurity
- WireShark
Questions
1 - File: dhcp.pcapng - What IP address is requested by the client ?
search: dhcp
Look at the query DHCP Request > Requested IP Address (192.168.2.244)
Answer: 192.168.2.244
2 - File: dhcp.pcapng - What is the transaction ID for the DHCP release?
search: dhcp
Look at the DHCP release > Transaction ID
request
Answer: 0x9f8fa557
3 - File: dhcp.pcapng - What is the MAC address of the client?
search: dhcp
Look at the request DHCP request > Client MAC address
Answer: 00:0c:29:82:f5:94
4 - File dns.pcapng - What is the response for the lookup for flag.fruitinc.xyz?
Answer: ACOOLDNSFLAG
5 - File: dns.pcapng - Which root server responds to the query? Hostname.
search: DNS
We look at the first DNS query, the response contains a list of DNS Root. The second query is for the DNS Root IP.
Just do an nslookup on 192.203.230.10
|
|
Answer: e.root-servers.net
6 - File smb.pcapng - What is the path of the file that is opened?
search: smb2.create.action
There are requests Create Response File: …
Answer: HelloWorld\TradeSecrets.txt
7 - File smb.pcapng - What is the hex status code when the user SAMBA\jtomato logs in?
search: smb2 && ntlmssp.auth.username == jtomato || tcp.stream
We notice the request Session Setup Request, NTLMSSP_AUTH, User: SAMBA\jtomato
as well as its response Session Setup Response, Error: STATUS_LOGON_FAILURE
. The status code can be found in the response to the request SMB2 > SMB2 Header > NT Status: STATUS_LOGON_FAILURE (0xc000006d)
Response: 0xc000006d
8 - File smb.pcapng - What is the tree that is being browsed?
search: smb2.tree
We notice the request Tree Connect Request Tree: \\192.168.2.10\public
Answer: \192.168.2.10\public
9 - File smb.pcapng - What is the flag in the file?
File > export object > smb
: export HelloWorldTradeSecrets.txt
CTRL+F, flag: flag
Answer: OneSuperDuperSecret
10 - File shell.pcapng - What port is the shell listening on?
search: tcp
We look at the destination port of the first packet
Answer: 4444
11 - File shell.pcapng - What is the port for the second shell ?
search: tcp && ip.src == 192.168.2.5 && ip.dst == 192.168.2.244 && tcp.port != 4444
We look at the destination port of the first packet
Answer: 9999
12 - File shell.pcapng - What version of netcat is installed?
search: tcp
We look at the first request and Follow > TCP stream
.
The attacker install netcat on the victim machine, we can see the installed version
|
|
Answer: 1.10-41.1
13 - File shell.pcapng - What file is added to the second shell
search: tcp.stream eq 0
We look at the first request and Follow > TCP stream
.
|
|
Answer: /etc/passwd
14 - File shell.pcapng - What password is used to elevate the shell?
search: tcp.stream eq 0
We look at the first request and Follow > TCP stream
.
|
|
*Answer: umR@Q%4V&RC
15 - File shell.pcapng - What is the OS version of the target system?
search: tcp.stream eq 0
We look at the first request and Follow > TCP stream
.
|
|
Answer: bionic
16 - File shell.pcapng - How many users are on the target system?
search: tcp
In the last stream (tcp.stream eq 6
), we see the content of /etc/passwd
|
|
Answer : 31
17 - File network.pcapng - What is the IPv6 NTP server IP ?
search: ntp
There is only 1 packet pair in IPv6. The destination IPv6 is that of the NTP server
Answer: 2003:51:6012:110::dcf7:123
18 - File network.pcapng - What is the first IP address that is requested by the DHCP client?
search: dhcp
Look at the first DHCP Request: DHCP Request > Requested IP Address (192.168.20.11)
Answer: 192.168.20.11
19 - File network.pcapng - What is the first authoritative name server for the domain that is being queried?
search: dns
We look at the first query DNS 152 Standard query response 0xb4ca A blog.webernetz.net A 5.35.226.136 NS ns2.hans.hosteurope.de NS ns1.hans.hosteurope.de
Answer: ns1.hans.hosteurope.de
20 - File network.pcapng - What is the number of the first VLAN to have a topology change occur?
search: stp.flags.tc == 1
(=Spanning Tree Protocol > BPDU flags > 1 = Topology Change: yes
)
We look at the first request Spanning Tree Protocol > Originating VLAN (PVID): 20
Answer: 20
21 - File network.pcapng - What is the port for CDP for CCNP-LAB-S2?
CDP = Cisco Discovery Protocol
search: cdp
We look at the request Device ID: CCNP-LAB-S2.webernetz.net Port ID: GigabitEthernet0/2
Cisco Discovery Protocol > Port ID
Answer : GigabitEthernet0/2
22 - File network.pcapng - What is the MAC address for the root bridge for VLAN 60 ?
search: stp.pvst.origvlan == 60
We look in any package Spanning Tree Protocol > Root Identifier > Root Bridge System ID
Answer: 00:21:1b:ae:31:80
23 - File network.pcapng - What is the IOS version running on CCNP-LAB-S2?
search: cdp.deviceid == CCNP-LAB-S2.webernetz.net
We look in any package Cisco Discovery Protocol > Software Version > Software version
Answer: 12.1(22)EA14
24 - File network.pcapng - What is the virtual IP address used for hsrp group 121?
search: hsrp
Look in the Cisco Hot Standby Router Protocol > Group State TLV > Group
queries. When the packet matches look at the field Cisco Hot Standby Router Protocol > Group State TLV > Virtual IP Address
Answer: 192.168.121.1
27 - File network.pcapng - How many router solicitations were sent?
search: icmpv6.type == 133
Count the number of packets
Answer: 3
28 - File network.pcapng - What is the management address of CCNP-LAB-S2?
search: cdp.deviceid == CCNP-LAB-S2.webernetz.net
We look in any packet Cisco Discovery Protocol > Management Addresses > IP address
Answer: 192.168.121.20
29 - File network.pcapng - What is the interface being reported on in the first snmp query?
search: snmp
We look at the first request “get-response” get-response 1.3.6.1.2.1...
. Then Simple Network Management Protocol > data: get-response > variable-bindings > 1.3.6.1.2.1.31.1.1.1.1.2: "Fa0/1"
Answer: FA0/1
30 - File network.pcapng - When was the NVRAM config last updated?
Edit > Find a package
: Package size and nvram string
We arrive on the right request Follow > UDP stream
! NVRAM config last updated at 21:02:36 UTC Fri Mar 3 2017 by weberjoh
Answer: 21:02:36 03/03/2017
31 - File network.pcapng - What is the ip of the radius server?
Edit > Find a package
: Package size and string radius
We arrive on the right request Follow > UDP stream
|
|
Answer: 2001:DB8::1812
For further analyses, the HTTPS stream must be decrypted with the file secret_sauce.txt SSL/TLS secrets log file, generated by NSS provided.
In Wireshark Edit > Preferences > Protocols > TLS > (Pre)-Master-Secret log filename
32 - File https.pcapng - What has been added to web interaction with web01.fruitinc.xyz ?
search: http.host == "web01.fruitinc.xyz"
Follow > HTTP stream
|
|
flag: y2*Lg4cHe@Ps
Answer: y2*Lg4cHe@Ps
33 - File https.pcapng - What is the name of the photo that is viewed in slack?
search: http
Edit > Find a package
: Package size and string slack
Follow > HTTP stream
|
|
Answer: get_a_new_phone_today__720.jpg
34 - File https.pcapng - What is the username and password to login to 192.168.2.1? Format: ‘username:password’ without quotes.
search: ip.dst == 192.168.2.1 and urlencoded-form
|
|
Answer: admin:Ac5R4D9iyqD5bSh&
35 - File https.pcapng - What is the certStatus for the certificate with a serial number of 07752cebe5222fcf5c7d2038984c5198?
Edit > Find a package
: Package size and string 07752cebe5222fcf5c7d2038984c5198. Look at the certStatus
Answer: good
36 - File https.pcapng - What is the email of someone who needs to change their password?
Answer: [email protected]
37 - File https.pcapng - A service is assigned to an interface. What is the interface, and what is the service? Format: interface_name:service_name
search: http2 && ip.dst_host == 192.168.2.1
The POST /services_ntpd.php, WINDOW_UPDATE[45]
package
We have the service and for the interface, we will look in the following step HyperText Transfer Protocol 2 > MIME Multipart Media Encampsulation > Encapsulated Multipart Media > Data
lan = 6c616e
(May be in hexadecimal)
Answer: lan:ntp