PacketMaze
Last updated
Last updated
Always open malware in a secure environment like a VM.
We will be using the REMnux distribution which is specifically made for reverse engineering.
Q1. What is the FTP password?
We can set the filter such that it filters out FTP packets.
Following the TCP stream via Follow > TCP Stream
, we can see the password.
Q2. What is the IPv6 address of the DNS server used by 192.168.1.26? (####::####:####:####:####)
We can filter the DNS packets using the following filter:
On analyzing the packet, we can see the source MAC address.
We can create a second filter as follows:
Let's look at the first packet.
We can see the IPv6 address of the DNS server in the Destination Address
field.
Q3. What domain is the user looking up in packet 15174?
Let's filter out the relevant packet.
The domain is specified in the Queries
filed of the DNS message.
Q4. How many UDP packets were sent from 192.168.1.26 to 24.39.217.246?
We can filter the relevant packets using the following filter:
We can see that there are 10 packets that fit the description.
Q5. What is the MAC address of the system being investigated in the PCAP?”
We already found the answer to this while researching for a previous question.
Q6. What was the camera model name used to take picture 20210429_152157.jpg ?
Since the image is a file, we can filter out for FTP-Data.
We can see the file being moved. On following the TCP stream we can see the contents of the file.
There's the camera model name. However there is a better way to do this.
Let's save the image in Raw
format.
Using exiftool
we can view the metadata of the image.
Q7. What is the server certificate public key that was used in TLS session: da4a0000342e4b73459d7360b4bea971cc303ac18d29b99067e46d16cc07f4ff?
We can filter the packet based on the session ID the we have been provided with.
In the Server key Exchange
field we can find the Pubkey
.
Q8. What is the first TLS 1.3 client random that was used to establish a connection with protonmail.com?
We have to first set a filter.
Let's look at the first packet. In the Random
field we can find the answer to our question.
Q9. What country is the MAC address of the FTP server registered in? (two words, one space in between)
On filtering for ftp
traffic, we can find the source MAC address.
We can then search this MAC address on DNSChecker.
Alternatively, we can also use macaddress.io.
Q10. What time was a non-standard folder created on the FTP server on the 20th of April? (hh:mm)
We need to first filter for FTP-Data.
On following the TCP stream, we can see a list of folders.
Out of all the folders in the list the ftp
folder is the non-standard one.
Q11. What domain was the user connected to in packet 27300?
We have to first set a filter.
We can see the destination address of the packet.
Now let's go to Statistics > Resolved Addresses
in order to see if this IP address has been resolved or not.