Copy of Experiment 3 Module 1
Copy of Experiment 3 Module 1
Wireshark can be used in two ways one is to perform local capture and other is to
analyze packet captures already available. There are many sites that provide pcap
for analysis. we have used pcap from Traffic analysis exercise Pizza Bender.
Direct HTTP request data: directly comes from HTTP request messages
(HTTP request headers).
Network level and server generated data associated with HTTP requests:
not part of an HTTP request, but it is required for successful request
transmissions - for example, IP address of a requester.
Application-level data sent with HTTP requests: generated and
processed by application-level programs (such as JavaScript, PHP, and
ASP.Net), including session and referrals. These are usually captured by
internal logs rather than public web analytics services.
External data: can be combined with on-site data to help augment the
website behavior data described above and interpret web usage. For
example, IP addresses are usually associated with Geographic regions
and internet service providers, e-mail open and click-through rates, direct
mail campaign data, sales and lead history, or other data types as
needed. For Collecting hash of infected file following steps has been
followed
(i) apply filter http.request in Wireshark .
(ii) from the results of step(i) get the affected files from http objects.
(iii) Save the affected file (.in this example found file is a .php file).
(iv) Get Hash of the file saved.
By applying filter http.request a file and its hash can be found in(I). In next step it
has to be checked whether the file is malicious or not. For this obtained file hashes
has been checked at virustotal.com. VirusTotal is a website created by the
Spanish security company Hispasec Sistemas. Launched in June 2004. VirusTotal
aggregates many antivirus products and online scan engines to check for
viruses
that the user's own antivirus may have missed, or to verify against any false
positives. Files up to 650 MB can be uploaded to the website, or sent via email (max.
32MB).
Anti-virus software vendors can receive copies of files that were flagged by other
scans but passed by their own engine, to help improve their software and, by
extension, VirusTotal's own capability. Suspected URL‟s can be scanned and search
through the VirusTotal dataset. VirusTotal for dynamic analysis of malware uses the
Cuckoo sandbox.
After scanning obtained file hashes on virustotal it has been found that file hashes
are infected results are depicted in fig2.
(III) Finding the host name, Domain name, IPaddress and MAC address:
Any host generating traffic within the network should have three identifiers: a MAC
address, an IP address, and a hostname. In most cases, alerts for suspicious
activity are based on IP addresses. If the access is available to full packet capture of
the network traffic, a pcap retrieved on an internal IP address should reveal an
associated MAC address and hostname. Host information can be found using
Wireshark by applying filter on two types of activities: Dynamic Host Configuration
Protocol (DHCP) or NetBIOS Name Service (NBNS).
DHCP traffic can help identify hosts for almost any type of computer connected to the
network. DHCP provides an automated way to distribute and update IP addresses
and other configuration information on a network [11]. NBNS traffic is generated
primarily by computers running Microsoft Windows or Apple hosts running MacOS.
Depending on how frequently a DHCP lease is renewed, DHCP traffic might not be
there in pcap. Fortunately, in this case NBNS traffic can be used to identify
hostnames for computers running Microsoft Windows or Apple hosts running MacOS.
In experiment presented in this paper host details have been found from NBNS
traffic steps for obtaining host name, domain name, IP address and MAC address
are as follows
In section 3 procedure for finding answer for following questions using Wireshark
has been explained
The first part infected file hashes can be blocked inside network using virus guard.
Access to the infected sites and their addresses can be blocked. Investigation on
infected PC whose MAC address can be made. infected files can be cleaned. In this
way Wireshark can be used to protect System.
Millions of new virus signatures are released yearly, and an antivirus can only detect
viruses for known valid signatures and the unknown signatures escape the detection.
Today’s networks are facing threats more than virus, such as malware, denial of
service, port scanning covert channels, and information theft. however, antivirus
software can only take very limited action on these various threats. Hackers can also
target the antivirus software running on a machine, leading to multiple vulnerabilities
of the system without the awareness of the user.
For these different reasons, network traffic analysis at the packet level is necessary,
and it can identify many different threats and attacks that could remain unnoticed by
antivirus software. In the past, packet analyzers were very expensive and patented.
Wireshark has changed all that. Wireshark is one of the best opensource packet
analyzers available today, and it displays packet data as detailed as possible.