Post 13 - Pcap Parade

14 Dec 2022

Task 18, Day 13, Packet Analysis Simply having a wonderful pcap time

Ran out of time to do a separate task and post yesterday. Only had enough time to finish off Task 17 from Monday.

Packet analysis is the process of extracting, assessing, and identifying network patterns such as connections, shares, commands, and other network activities, like logins and system failures, from prerecorded traffic files. Identifying and investigating network patterns in depth helps with threat detection and real-time performace troubleshooting. Even encoded/encrypted network data provides value by pointing to an odd, weird, or unexpected patter or situation.

Working With PCAPs

Before conducting packet analysis consider:

Creating “checklists” and “mini playbooks” make the analysis process easier, not shotgun approach. Simple process checklist:

  1. Hypothesis - Have a hypothesis before looking at packets, know what to look for before analyzing.
  2. Packet Statistics - Viewing statistics can show the weight of the traffic in the capture file. Helps analyst see the big picture in terms of protocols, endpoints, and conversations.
  3. Known Services - Services from everyday operations (web browsing, file sharing, emailing) are called known services. Know what protocol goes to what service. Important to know what “normal” looks like in case adversary uses known services to their benefit.
  4. Unknown Services - Potential red flags. Know how to research unknown protocols and services and quickly use them for analysis.
  5. Known Patterns - Known patterns represent analyst’s knowledge and experience. Know the most common and recent case patterns to successfully detect anomalies at first glance.
  6. Environment - Know the nature and dynamics of the working environment. Includes IP address blocks, hostname and username structure, used services, external resources, maintenance schedules, and average traffic load.

The Task

Evaluate the pcap file using Protocol Hierarchy, Conversations, and filtering.

Statistics > Conversations helps identify IP addresses that may not belong, who they were talking to, and how.

Checks to do between Protocol Hierarchy and Conversations:

Questions to answer:

From main window, filter by dns, check information including queries made.

Checks to do:

Questions to answer:

Repeat with http filter.

Checks to do:

Questions to answer:

Can export files via File > Export Objects > HTTP. Once downloaded sha256sum and be run and hash compared with other tools.

Checks to do:

Questions to answer: