BTJA Wireshark Challenge - PCAP 2 Walkthrough
Peachaya Tanomsup

BTJA Wireshark Challenge - PCAP 2 Walkthrough

Summary:

My walkthrough of analyzing PCAP 2 of the Wireshark Challenge from Security Blue Team’s Blue Team Junior Analyst Pathway

1. What is the WebAdmin password?

  • Edit > Find Packet.

No alt text provided for this image

  • Apply these Find Packet parameters at the top: Packet Details, String, ”WebAdmin”, Find.
  • In the packet details pane, notice a message in this highlighted line of HTML code that includes the text “webadmin”.

No alt text provided for this image


  • Let’s find the password.txt file and find the webadmin password.
  • In the Find Packet options, change the first option to Packet list, and type in the string “password.txt” ,then click Find.
  • An HTTP GET request is highlighted in the packet list which contains the string “password.txt”.

No alt text provided for this image

  • Right-click the packet and Follow the HTTP stream to see the contents of the password.txt file.

No alt text provided for this image

  • The WebAdmin password is “sbt123”

No alt text provided for this image

2. What is the version number of the attacker’s FTP server?

  • Right-click the source IP address in the GET request packet and apply it as a selected filter.
  • Add and ftp to the current display filter to find all ftp traffic from the IP address in question.

No alt text provided for this image

  • In the packet details pane, the FTP info shows version 1.5.5.

No alt text provided for this image

3. Which port was used to gain access to the victim Windows host?

  • Change the display filter so it only shows packets where 192.168.56.1 is the source IP.
  • A series of ACKs indicates an established connection; looks like this starts at the same time we see port 8081 as the destination port.

No alt text provided for this image

4. What is the name of a confidential file on the Windows host?

  • I followed the TCP stream of TCP Retransmission packet 4258 which dropped me in at stream 2079.

No alt text provided for this image

  • I used the arrows at the bottom right of the TCP stream window to move between streams.
  • I eventually found stream 2075 which shows commands being used to list the contents of the desktop. The confidential file is listed below.

No alt text provided for this image
Employee_Information_CONFIDENTIAL.txt

5. What is the name of the log file that was created at 4:51 AM on the Windows host?

  • In stream 2075 the desktop contents also show a LogFile.log file created at 4:51 AM.

No alt text provided for this image

Conclusion:

  • The Find Packet feature was helpful.
  • Following and examining TCP streams was helpful.

Juan Santos

Tech Adventurer | Network Security Enthusiast | Pursuing CCNA & Fortinet Pro Certification | HackMiami Collaborator | Top 7% TryHackMe Rank | Fusing Experience, Learning, & Practical Skills in IT & Network Security

1 年

I followed the TCP stream of TCP Retransmission packet 4258 which dropped me in at stream 2079. what made you choose packet 4258 to investigate?

要查看或添加评论,请登录

Octavious W.的更多文章

  • Internet Browser Forensics with Autopsy

    Internet Browser Forensics with Autopsy

    In this lab we learned how to access web browser history from Windows computers and how to use that data in an…

  • SQL Injection Lab

    SQL Injection Lab

    TOPICS: Basic SQL Commands Querying a database with SQL Deleting data with SQL SQL Injection Techniques Basic SQL…

  • Web Hacking Lab

    Web Hacking Lab

    TOPICS Web Application Vulnerability Scanning With Nikto Burp Suite setup Using Burp Suite to build a site map Brute…

    3 条评论
  • Metasploit Review Lab

    Metasploit Review Lab

    TOPICS: Getting Familiar with Metasploit Vulnerability Scanning with WMAP Configuring Exploits and Payloads Getting…

    5 条评论
  • System Hardening

    System Hardening

    System hardening is the process of making changes to a system or application to make it more secure than it’s default…

    2 条评论
  • I went to Bsides Atlanta!

    I went to Bsides Atlanta!

    I had an amazing experience at BSides Atlanta 2023! Here are my highlights and takeaways of the day! My morning started…

    5 条评论
  • Reconnaissance

    Reconnaissance

    What is Reconnaissance? Reconnaissance is the process hackers use to gather as much information as possible about their…

    7 条评论
  • Logging for Cyber Security

    Logging for Cyber Security

    Here are some notes I took on Logging during my Security+ exam prep. Logs form detailed lists of activities related to…

    6 条评论
  • TryHackMe - New Hire Old Artifacts - Notes

    TryHackMe - New Hire Old Artifacts - Notes

    Scenario Notes: Widget LLC has some concerns with the endpoints in the Finance Dept. Especially an endpoint for a…

  • TryHackMe KAPE Hands-on Challenge

    TryHackMe KAPE Hands-on Challenge

    We will use the forensics tool KAPE to collect and process files from a device Scenario Notes: Organization X’s…

    1 条评论

社区洞察

其他会员也浏览了