Ethernet, FTP, Telnet, HTTP, Bluetooth - the basics of traffic analysis. Solving problems on a network with r0ot-mi. Part 1

image






In this article, the first 5 tasks, we learn the basics of traffic analysis of various network protocols.



Organizational Information
Especially for those who want to learn something new and develop in any of the areas of information and computer security, I will write and talk about the following categories:



  • PWN;
  • cryptography (Crypto);
  • network technologies (Network);
  • reverse (Reverse Engineering);
  • steganography (Stegano);
  • search and exploitation of WEB vulnerabilities.


In addition to this, I will share my experience in computer forensics, analysis of malware and firmware, attacks on wireless networks and local area networks, conducting pentests and writing exploits.



So that you can find out about new articles, software and other information, I created a channel in Telegram and a group to discuss any issues in the field of ICD. Also, I will personally consider your personal requests, questions, suggestions and recommendations personally and will answer everyone .



All information is provided for educational purposes only. The author of this document does not bear any responsibility for any damage caused to anyone as a result of using knowledge and methods obtained as a result of studying this document.



FTP authentication



image



In this task, we are offered to find authentication data from a traffic dump. At the same time they say that this is FTP. Open the PCAP file in wireshark.



image



First we filter the data, since we only need the FTP protocol.



image



Now we will display traffic on flows. To do this, after right-clicking, select Follow TCP Stream.



image



We see the username and password of the user.



image



Telnet authentication



image



The task is similar to the previous one.



image



We pick up the username and password.



image



Ethernet frame



image



We are given a Hex presentation of an Ethernet protocol packet and are asked to find sensitive data. The fact is that the protocols are encapsulated one into another. That is, the IP protocol is located in the data area of ​​the ethernet protocol, in the data area of ​​which the TCP protocol is located, in it is HTTP, where the data is located. That is, we only need to decode characters from the hex form.



image



The HTTP header contains Basis authentication data. Decode them from Base64.



image



Twitter authentication



image



We are asked to find a password to log into twitter from a traffic dump.



image



There is only one package. Open it by double-clicking.



image



And again we see the Basic authentication data.



image



We find the username and password.



image



Bluetooth Unknow file



image



They tell a story and ask to find the name and MAC address of the phone. Open the file in wireshark. Find the line Remote Name Request Complete.



image



Let's look at the fields of this package, where the MAC address and phone name are displayed.



image



We take the hash and hand it over.



image



image



On this task, we finish the analysis of easy tasks on the topic of networks (more for beginners). Further more and more complicated ... You can join us on Telegram . There you can propose your own topics and vote on the choice of topics for the following articles.



All Articles