Discover How The Attack Happened By WireShark
In this article you will learn how to use wireshark effectively to identify how the attack
happened and what the attacker do on the compromised machine
Discover How The Attack Happened By WireShark:
In this scenario a pcap file generated by cyberlympics <ref-here> in the 2013 competition will be used to answer the following questions to identify how the attacker get in and how he extract the data from the compromised machine.
The questions are:
• What files were transferred to/from the victim?
• What malware/unauthorized programs were installed?
• What directory were files transferred to or from?
• What is the router password?
• What were user passwords changed to?
• We will start by loading the pcap file into wireshark
After while navigating throw the packet we identify interesting packets. Those packets are using FTP
protocol. We will follow the stream to figure out what have been done.
We found really interesting data in the stream
Here we go, a username Administrator with password GMODEOWNZYOU has been logged in to the victim. To identify the victim ip which is the ftp server we will select stream as follow
We will identify that the stream is represent a response command from the ftp server. Therefore the victim IP is 192.168.245.12 and the attacker IP 192.168.245.3
So we need now to identify the attacker stream by select as follow
From the stream we could identify that the attacker use the following ftp commands to retrieve some data from the ftp server
• CWD ftproot: this command used to change the working directory to ftproot
• CWD GMTMP: this command used to change the working directory to GMTMP
• LIST: this command used to list files inside the GMTMP directory
• RETR favicon.ico: this command used to download favicon.ico to the attacker machine
• RETR challenges.zip: this command used to download challenges.zip to the attacker machine
• RETR RPWD.RTF: this command used to download RPWD.RTF to the attacker machine
Currently we know that the attacker IP is 192.168.245.3. We will make a filter on the source IP of the
attacker as follow
We found interesting stream in Figure 9
We will use the same instructions as shown before in Figure 2 and Figure 6 to get the attacker stream
From this stream we could identify that the attacker use the following ftp commands to store file on the ftp server
• TYPE I: this command used to set the type of file to be transferred to binary data or image
• STOR PwDump7.exe: this command used upload pwdump7.exe to the ftp server
• TYPE A: this command used to set the type of file to be transferred to ASCII text
Also here is another stream
From this stream we could identify that the attacker use the following ftp commands to store file on the ftp server
• TYPE I: this command used to set the type of file to be transferred to binary data or image
• STOR sbd.exe,BFK.exe, MSINET.OCX, convert.dll, inetlog.txt, keylog.txt, needtosend.log and sclog.txt: this command used upload files to the ftp server
• TYPE A: this command used to set the type of file to be transferred to ASCII text
• LIST: this command used to list files inside the GMTMP directory
So by the previous techniques you can figure out and answer the previous questions as follow:
What files were transferred to/from the victim?
Using wireshark filter “ftp.request.command==STOR” you find the following applications transferred to the victim 192.168.245.12
• PwDump7.exe
• sbd.exe
• BFK.exe
• MSINET.OCX
• converter.dll
• inetlog.txt
• keylog.txt
• needtosend.log
Using wireshark filter “ftp.request.command==RETR” you find the following applications transferred from the victim 192.168.245.12
• favicon.ico
• challenges.zip
• RPWD.RTF
What malware/unauthorized programs were installed?
According to The Logs and the file transfered to the vivtim The programs are:
• PwDump7.exe
• sbd.exe
• BFK.exe
What directory were files transferred to or from?
• All Files Transferred to a new Directory in C:\Inetpub\ftproot\ with name GMTMP
• Full path C:\Inetpub\ftproot\GMTMP
What is the router password?
• Router Password Found in RPWD.RTF file
• Router Password Encryption Type 7 0139562C753F2E5C067E16
• Router Clear Text Password J0HNTH3GR8
What were user passwords changed to?
Password changed for John, Administrator and nonadmin accounts to be GMODEOWNZYOU
In this article you will learn how to use wireshark effectively to identify how the attack
happened and what the attacker do on the compromised machine
Discover How The Attack Happened By WireShark:
In this scenario a pcap file generated by cyberlympics <ref-here> in the 2013 competition will be used to answer the following questions to identify how the attacker get in and how he extract the data from the compromised machine.
The questions are:
• What files were transferred to/from the victim?
• What malware/unauthorized programs were installed?
• What directory were files transferred to or from?
• What is the router password?
• What were user passwords changed to?
• We will start by loading the pcap file into wireshark
After while navigating throw the packet we identify interesting packets. Those packets are using FTP
protocol. We will follow the stream to figure out what have been done.
We found really interesting data in the stream
Here we go, a username Administrator with password GMODEOWNZYOU has been logged in to the victim. To identify the victim ip which is the ftp server we will select stream as follow
We will identify that the stream is represent a response command from the ftp server. Therefore the victim IP is 192.168.245.12 and the attacker IP 192.168.245.3
So we need now to identify the attacker stream by select as follow
From the stream we could identify that the attacker use the following ftp commands to retrieve some data from the ftp server
• CWD ftproot: this command used to change the working directory to ftproot
• CWD GMTMP: this command used to change the working directory to GMTMP
• LIST: this command used to list files inside the GMTMP directory
• RETR favicon.ico: this command used to download favicon.ico to the attacker machine
• RETR challenges.zip: this command used to download challenges.zip to the attacker machine
• RETR RPWD.RTF: this command used to download RPWD.RTF to the attacker machine
Currently we know that the attacker IP is 192.168.245.3. We will make a filter on the source IP of the
attacker as follow
We found interesting stream in Figure 9
We will use the same instructions as shown before in Figure 2 and Figure 6 to get the attacker stream
From this stream we could identify that the attacker use the following ftp commands to store file on the ftp server
• TYPE I: this command used to set the type of file to be transferred to binary data or image
• STOR PwDump7.exe: this command used upload pwdump7.exe to the ftp server
• TYPE A: this command used to set the type of file to be transferred to ASCII text
Also here is another stream
From this stream we could identify that the attacker use the following ftp commands to store file on the ftp server
• TYPE I: this command used to set the type of file to be transferred to binary data or image
• STOR sbd.exe,BFK.exe, MSINET.OCX, convert.dll, inetlog.txt, keylog.txt, needtosend.log and sclog.txt: this command used upload files to the ftp server
• TYPE A: this command used to set the type of file to be transferred to ASCII text
• LIST: this command used to list files inside the GMTMP directory
So by the previous techniques you can figure out and answer the previous questions as follow:
What files were transferred to/from the victim?
Using wireshark filter “ftp.request.command==STOR” you find the following applications transferred to the victim 192.168.245.12
• PwDump7.exe
• sbd.exe
• BFK.exe
• MSINET.OCX
• converter.dll
• inetlog.txt
• keylog.txt
• needtosend.log
Using wireshark filter “ftp.request.command==RETR” you find the following applications transferred from the victim 192.168.245.12
• favicon.ico
• challenges.zip
• RPWD.RTF
What malware/unauthorized programs were installed?
According to The Logs and the file transfered to the vivtim The programs are:
• PwDump7.exe
• sbd.exe
• BFK.exe
What directory were files transferred to or from?
• All Files Transferred to a new Directory in C:\Inetpub\ftproot\ with name GMTMP
• Full path C:\Inetpub\ftproot\GMTMP
What is the router password?
• Router Password Found in RPWD.RTF file
• Router Password Encryption Type 7 0139562C753F2E5C067E16
• Router Clear Text Password J0HNTH3GR8
What were user passwords changed to?
Password changed for John, Administrator and nonadmin accounts to be GMODEOWNZYOU