Name: Leendert Pieter van Drimmelen Description: ================================================================================================= Narrative ================================================================================================= Before starting any analysis, we first check the integrity of the evidence06.pcap file: leendert-pieter@lenovo:~/contest6$ md5sum evidence06.pcap efac05c50c0ae92bf0818e98763920bd evidence06.pcap The MD5 matches with the MD5 hash provided on the website. First, let's check what kind of data is in the capture file: leendert-pieter@lenovo:~/contest6$ tshark -r evidence06.pcap -q -n -z io,phs =================================================================== Protocol Hierarchy Statistics Filter: frame frame frames:2554 bytes:2330820 eth frames:2554 bytes:2330820 ip frames:2554 bytes:2330820 tcp frames:2553 bytes:2330577 http frames:3 bytes:967 image-gif frames:1 bytes:201 tcp.segments frames:1 bytes:86 http frames:1 bytes:86 data-text-lines frames:1 bytes:86 data frames:1652 bytes:2269642 udp frames:1 bytes:243 nbdgm frames:1 bytes:243 smb frames:1 bytes:243 mailslot frames:1 bytes:243 browser frames:1 bytes:243 =================================================================== We see that the majority is tcp traffic, including some http and a lot of a to tshark unknown protocol (data). There is also one udp frame. Let's have a look at that: leendert-pieter@lenovo:~/contest6$ tshark -r evidence06.pcap -n -R udp 1243 55.409175 10.10.10.70 -> 10.10.10.255 BROWSER Host Announcement SAUCYDEV, Workstation, Server, NT Workstation Seems likely that the machine at 10.10.10.70 is a Windows based machine, named SAUCYDEV. Now, let's look at the http tracffic: leendert-pieter@lenovo:~/contest6$ tshark -r evidence06.pcap -n -R http 1 0.000000 10.10.10.70 -> 10.10.10.10 HTTP GET /index.php HTTP/1.1 8 0.345929 10.10.10.10 -> 10.10.10.70 HTTP HTTP/1.1 200 OK (text/html) 9 0.462112 10.10.10.70 -> 10.10.10.10 HTTP GET /index.phpmfKSxSANkeTeNrah.gif HTTP/1.1 11 0.567143 10.10.10.10 -> 10.10.10.70 HTTP HTTP/1.1 200 OK (GIF89a) So, there are two successful GET requests from 10.10.10.70 (Vick's computer) to 10.10.10.10. We are of course interested in the complete URI of these requests. We also need to look at the http host header field for this: leendert-pieter@lenovo:~/contest6$ tshark -r evidence06.pcap -n -R http -T fields -e http.host -e http.request.uri 10.10.10.10:8080 /index.php 10.10.10.10:8080 /index.phpmfKSxSANkeTeNrah.gif The second one is at least 'not normal'. I never name pictures like that. Let's also check which http port was used: leendert-pieter@lenovo:~/contest6$ tshark -r evidence06.pcap -n -T fields -e frame.number -e tcp.port http 1 8080 8 1035 9 8080 11 1035 So, the two URI's are: http://10.10.10.10:8080/index.php http://10.10.10.10:8080/index.phpmfKSxSANkeTeNrah.gif Let's look deeper into these two http request and extract the objects from the pcap file: leendert-pieter@lenovo:~/contest6$ tcpxtract -f evidence06.pcap -o tcpxtract-out/ Found file of type "html" in session [10.10.10.10:36895 -> 10.10.10.70:2820], exporting to tcpxtract-out/00000000.html Found file of type "gif" in session [10.10.10.10:36895 -> 10.10.10.70:2820], exporting to tcpxtract-out/00000001.gif Of course, the next thing we do is create a md5sum of these two objects: leendert-pieter@lenovo:~/contest6$ md5sum tcpxtract-out/* a0b6322a2e09183a6a3b2533b6c8dba2 tcpxtract-out/00000000.html df3e567d6f16d040326c7a0ea29a4f41 tcpxtract-out/00000001.gif Looking at the html file, we see some obfuscated java script: