2025-06-13: Traffic analysis exercise: It's a trap!
文章提供了一个网络流量分析的机会,包含一个受感染的Windows客户端的PCAP文件和一些 forensic 分析数据。用户需通过这些数据找出该客户端的IP地址、MAC地址、主机名和用户账号信息。所有文件均为密码保护,需访问网站about页面获取密码。 2025-6-14 05:23:0 Author: www.malware-traffic-analysis.net(查看原文) 阅读量:40 收藏

2025-06-13 - TRAFFIC ANALYSIS EXERCISE: IT'S A TRAP!

ASSOCIATED FILES:

NOTES:

  • Zip files are password-protected.  Of note, this site has a new password scheme.  For the password, see the "about" page of this website.

This is more a "traffic analysis opportunity" instead of a traffic analysis exercise.  I'm just providing the traffic and some forensic analysis.

LAN SEGMENT DETAILS FROM THE PCAP

  • LAN segment range:  10.6.13[.]0/24   (10.6.13[.]0 through 10.6.13[.]255)
  • Domain:  massfriction[.]com
  • Active Directory (AD) domain controller:  10.6.13[.]3 - WIN-DQL4WFWJXQ4
  • AD environment name:  MASSFRICTION
  • LAN segment gateway:  10.6.13[.]1
  • LAN segment broadcast address:  10.6.13[.]255

If you've followed the tutorials I've linked to elsewhere on this blog, you should be able to answer the following:

  • What is the IP address of the infected Windows client?
  • What is the mac address of the infected Windows client?
  • What is the host name of the infected Windows client?
  • What is the user account name from the infected Windows client?

I'm not going to post any answers, so feel free to do what you will with the data.  In the meanwhile, the following images illustrate some possible analysis techiques.

Click here to return to the main page.


文章来源: https://www.malware-traffic-analysis.net/2025/06/13/index.html
如有侵权请联系:admin#unsafe.sh