- Hands-On Network Forensics
- Nipun Jaswal
- 465字
- 2021-06-24 16:04:20
Exercise 2 – two too many
Let's analyze another capture file from https://github.com/nipunjaswal/networkforensics/blob/master/Ch1/Two%20to%20Many/twotomany.pcap, that we currently don't know any details about and try reconstructing the chain of events.
We will open the PCAP in Wireshark, as follows:

From the preceding screenshot, we can see that numerous SYN packets are being sent out to the 64.13.134.52 IP address. However, looking closely, we can see that most of the packets are being sent every so often from a single port, which is 36050 and 36051, to almost every port on 64.13.134.52. Yes, you guessed right: this looks like a port scan. Initially the SYN packet is sent out, and on receiving a SYN/ACK, the port is considered open.
We know that the originating IP address, 172.16.0.8, is an internal one and the server being contracted is 64.13.134.52. Can you figure out the following?:
- Scan type
- Open ports
Answering the first question requires a more in-depth understanding of a TCP-oriented communication and its establishment, TCP works on a three-way handshake, which means that on receiving a synchronize (SYN) packet from the source IP address, the destination IP address sends out a synchronize/ acknowledgment (SYN/ACK) packet that is followed by a final acknowledgment (ACK) packet from the source IP address to complete the three-way handshake. However, as we can see from the preceding screenshot, only a SYN/ACK is sent back from port 80, and there hasn't been an ACK packet sent out by the source IP address.
This phenomenon means that the ACK packet was never sent to the destination by the source, which means that only the first two steps of the three-way handshake were completed. This two step half open mechanism causes the destination to use up resources as the port will be help open for a period of time. Meanwhile, this is a popular technique leveraged by a scan type called SYN scan or half-open scan, or sometimes the stealth scan. Tools such as Nmap make use of such techniques to lower the number of network packets on the wire. Therefore, we can conclude that the type of scan we are dealing with is a SYN scan.

Applying the filer ip.src==64.13.134.5, we can see the responses sent by 64.13.134.52. It is evident that we have received the SYN/ACK from ports 53, 80, and 22, which are open ports. We can also see that there has been network loss, and the sender has sent the packets again. Additionally, we can see Reset Acknowledgment Packets (RST) that denote misconfigurations or the application running on the not willing to connect: the reasons for such behavior can differ.
- 白話網(wǎng)絡(luò)安全2:網(wǎng)安戰(zhàn)略篇
- 科技安全:戰(zhàn)略實(shí)踐與展望
- 黑客大曝光:無線網(wǎng)絡(luò)安全(原書第3版)
- 計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù)(第6版·慕課版)
- 計(jì)算機(jī)病毒原理與防范(第2版)
- Spring Security(Third Edition)
- 學(xué)電腦安全與病毒防范
- Instant Java Password and Authentication Security
- 情報(bào)驅(qū)動(dòng)應(yīng)急響應(yīng)
- 信息安全等級保護(hù)測評與整改指導(dǎo)手冊
- 數(shù)據(jù)安全與流通:技術(shù)、架構(gòu)與實(shí)踐
- 黑客攻防從入門到精通
- 實(shí)用黑客攻防技術(shù)
- Cybersecurity Threats,Malware Trends,and Strategies
- 云計(jì)算安全技術(shù)與應(yīng)用