- Hands-On Network Forensics
- Nipun Jaswal
- 295字
- 2021-06-24 16:04:19
Identifying the IP endpoints
Domain names were invented to make it more easy to remember sites with common phrases. Having a list of IP addresses in the previous section would make no sense to us, but having a list that shows the resolution of the IPs into domain names can help us a lot. On clicking the Show address resolution / Resolved Addresses option, we will be presented with the following:

Well, this now makes proper sense, as we have a list of IP addresses with their domain resolutions that can help us eliminate the false positives. We saw in the previous endpoint section that the second-highest number of packets in the endpoints originated from 162.125.34.6. Since we don't have an idea of what IP address this could be, we can easily refer to the address resolutions and figure out that this is dropbox-dns.com, which looks suspicious. Let's search for it on Google using the string client.dropbox-dns.com, and browsing the first result from the search, we have the following result:

We can see from the preceding search result (the official Dropbox website, https://www.dropbox.com/) that the domain is a legitimate Dropbox domain and the traffic originating to and from it is safe (assuming that Dropbox is permitted on the network or if allowed for a select group of users that the traffic is associated with those users only). This resolution not only helps us identify domains, but also speaks a lot about the software running on the target as well. We already identified Dropbox as running on the system. We also identified the following domains from the Resolved Addresses pane in Wireshark:
- A Gmail account being accessed
- A Qihoo 360 antivirus
- An HDFC bank account
- The Grammarly plugin
- The Firefox browser
- Extending Symfony2 Web Application Framework
- 網絡安全意識導論
- 黑客攻防入門秘笈
- Applied Network Security
- CTF競賽權威指南(Pwn篇)
- Digital Forensics with Kali Linux
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 數據安全與流通:技術、架構與實踐
- 信息安全工程與實踐
- VMware vCloud Security
- 隱私計算:推進數據“可用不可見”的關鍵技術
- Practical Internet of Things Security
- 黑客攻防從入門到精通:黑客與反黑客工具篇(第2版)
- 從實踐中學習Web防火墻構建
- Hands-On Web Penetration Testing with Metasploit