, , ,

[SOLVED] Cs6035 assignment 3- mitm

$25

File Name: Cs6035_assignment_3__mitm.zip
File Size: 235.5 KB

5/5 - (1 vote)

Flag 1 (5 points)

Your first task is to figure out where the hackers are spending their time and gather some evidence for the Attorney General. This will also give you a good overview of Wireshark filters.
The Attorney General needs some evidence of The Necrocryptors’ associates and where the group meets.
For this, you need to gather the following information:
Task 1.1
• Based on the provided packet capture (pcap) file, identify the server address used by the hackers to communicate.
• Example: irc.someplace.net
• Points: 1
Task 1.2
• Based on the provided packet capture (pcap) file, identify the nicknames of the malicious actors involved in the conversation. List the nicknames in the order they appear in the conversation following the format below:
• Example: firstactor,secondactor,thirdactor
• Points: 1
Task 1.3
• Based on the provided packet capture (pcap) file, identify the channel the malicious actors use to communicate. Remember, channel names always start with #, so include # in your answer.
• Example: #WOW
• Points: 1
https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/MITM/Flag1.html :41
Task 1.4
• Based on the provided packet capture (pcap) file, identify the hash used by the malicious actor to validate its identity.
• Example: a12342342bcde393202013434
• Points: 1
Task 1.5
• Based on the pcap file provided, analyze the network traffic to determine the potential origin country of the last identified malicious actor. Consider the IP addresses, any geolocation data. Provide the name of the country
• Example: Atlantis
• Points: 1

Disclaimer: You are responsible for the information on this website. The content is subject to change at any time.
https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/MITM/Flag1.html :41
Flag 2
Flag 2 (27 points)

Your second task will require you to recover a payload from the conversation. There are multiple ways to do this. You can use Wireshark, pyShark or any other library available.
As part of the evidence gathering, the Attorney General needs concrete evidence of malicious intent. For Task 2, you will need to review the conversation between members of TNC and gather incriminating data from this conversation.
Task 2.1
• Based on the provided pcap file, identify which malicious actor initiated a private chat during the conversation.
• Example:maliciousactor
• Points: 2
Task 2.2
• Based on the provided pcap file, identify the name of the file transferred by one hacker to another via IRC DCC. (Including extension)
• Example:somefile.extension
• Points: 5
Task 2.3
• Based on the provided pcap file, determine the encryption method or algorithm used to encrypt the file transferred between the hackers. (Just the 3-letter name)
• Example:something
• Points: 4
Task 2.4
https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/MITM/Flag2.html

• If you decrypt and run the file, you’ll get a unique hash based on your GTID. What is the hash generated?
• Example:a123242342342342342934234
• Points: 16

Disclaimer: You are responsible for the information on this website. The content is subject to change at any time.
https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/MITM/Flag2.html
Flag 3
Flag 3 (21 points)

The Attorney General lets you know that they think there is a web server in here that is phishy and is spitting out long numbers and letters. The Necrocryptors hacking group is known to play tricks with these values. The Attorney General needs the following information to track the folks operating the website:
Task 3.1
• The site domain name (Record just the site’s domain name and the top-level-domain (TLD) name, with the period. E.G: something.hostname.tld)
• Example: something.something.something
• Points: 2
Task 3.2
• What is the public IP address?
• Example: 192.168.1.10
• Points: 2
Task 3.3
• Example: ns-something-something.something.something
• Points: 6
Task 3.4
https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/MITM/Flag3.html
• Example: abcdef1234567890953453434
• Points: 11

Disclaimer: You are responsible for the information on this website. The content is subject to change at any time.
https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/MITM/Flag3.html

Flag 4
Flag 4 (27 points)

The Attorney General is impressed by you but says they believe the group is also using another server to host a malicious file. It appears that one of the hackers recently accessed this server and downloaded a file from it. As a last minute request, the Attorney General is asking you to investigate what this file is, and where it is hosted.
Task 4.1
• What is the IP address for the server in question?
• Example: 192.168.8.7
• Points:2
Task 4.2
• What is the username used to log in the server?
• Example: something
• Points:4
Task 4.3
• What is the password used to log in the server?
• Example: something
• Points:4
Task 4.4
• One file is downloaded from the server, what is the file name?
• Example: something
• Points:3
https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/MITM/Flag4.html :43
Task 4.5
• What is the programming language used to create this file?
• Example: something
• Points:5
Task 4.6
• If you run this file you’ll get a Combined hash. What is the unique hash for your GTID (i.e
902042)?
• Example: 12123123129413249121249aa
• Points:9

Disclaimer: You are responsible for the information on this website. The content is subject to change at any time.
https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/MITM/Flag4.html :43
Flag 5
Flag 5 (5 points)

Exhausted from the prior exercises, the attorney general has two more exercises for you to prove you belong here and that he shouldn’t fire you despite doing a good job. He mentions to you the hackers are getting smart and they have a website called http://www.didbastionbreak.com that has absolutely nothing to do with Azure Firewalls but everything to do with web application firewalls. Apparently there are some weaknesses integrated into the website which allow you to get to different parts of the website something called a path traversal attack.
Task 5.1
• There is a flag labeled 5.1 that outputs a hash when you input in your GTID. Try to find the page and recover the flag
• Example: tr95843fkdspugr8euyre0gfd
• Points: 2
Task 5.2
• What is the directory name that contains the hint for 5.3?
• Example: something
• Points: 1
Task 5.3
• There is a flag labeled 5.3 that outputs a hash when you input in your GTID. Try to find the page and recover the flag
• Example: 58437594ejgfdiohr8e054309
• Points: 2
Suddenly, your phone rings. You see that the call is coming from Bill’ extension.You were ready to head back home and watch Netflix. Here we go again…
https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/MITM/Flag5.html :44
“Mark, great job so far! I was thinking here. This will not be the last time you will be doing this analysis on pcaps, so why don’t we start building a python class with several methods to automate some of the work for next time?” “When you say we, you are saying, why dont I build this class right?” you say.
“Of course not! I already created some skeleton code to help you out. You just need to build 3 functions now” Bill says.
“Oh, ok. Thank you Boss..”
As you hang up the call, Bill sends you via IM a zip file containing the python class and a attack pcap from a past incident so you can create the functions and test.

Disclaimer: You are responsible for the information on this website. The content is subject to change at any time.
https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/MITM/Flag5.html :44

Flag 6
Flag 6 (15 points)

For this task, you need to use the provided pcapanalysis.py and Flag6.pcap files to create three functions. The snippet below shows where you need to code the functions and the expected output on each variable n. You can create as many functions and variables you need, however the provided functions need to return the expected output.
Function Skeleton
# TODO:
# Task 1: Return n being: # n = Number of ICMP Packets def icmp_count(self):
n = 0
# TODO: Implement me
return n
# TODO:
# Task 2: Return r,a, being: # r = Number of ICMP Echo Requests
# a = ICMP Echo Reply def icmp_request_reply(self):
r = 0 a = 0
# TODO: Implement me
return r,a
# TODO:

To start, make sure that the package pyshark is installed on your system. Please review pyshark Github page to install the package and its dependency (tshark) :

Deliverables:
Task 6.1
• Modify the def icmp_count(self): function so that it returns an integer, n, which represents the number of ICMP packets in the flag6.pcap file.
• Points: 3
Task 6.2
• Modify the def icmp_request_reply(self): function to return r (the number of ICMP Echo Requests as a integer) and a (the number of ICMP Echo Reply as an integer).
• Points: 5
Task 6.3
• Modify the def dest_mac(self): function to return m (the most common destination MAC address as a string) and n (its number of occurrences as an integer).
• Points: 7

Disclaimer: You are responsible for the information on this website. The content is subject to change at any time.

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Shopping Cart
[SOLVED] Cs6035 assignment 3- mitm[SOLVED] Cs6035 assignment 3- mitm
$25