Skip to content

spider-107124046-1/basic_computer-networking

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 

Repository files navigation

Computer Networking

Analysis Questions

1. What types of traffic are present?

image

  • Hypertext Transfer Protocol (HTTP, over TCP)
  • Domain Name System (DNS, over UDP)
  • Multicast Domain Name System (mDNS, over UDP)
  • TCP Handshakes

2. How many DNS queries were made in total?

dns.flags.response == 0 yields 358 results, one of which is an mDNS query. 357 DNS queries + 1 mDNS query = 358 queries

3. What types of DNS queries were made?

  • A (hostname -> IPv4 Address)
  • AAAA (hostname -> IPv6 Address)
  • HTTPS (service binding)
  • PTR (IPv4 Address -> allowed hostnames)

4. What is a Loopback Interface?

  • Interface? A network interface is the point of interconnection between the device and the network. Network interfaces can be physical (hardware based, like Ethernet NIC cards and Wi-Fi adapters), or virtual (software, created for purposes such as internally isolating networks)

image

  • Loopback? Loopback interface is a virtual interface created by the OS's networking stack, on the subnet 127.0.0.0/8. Any communications with this interface is routed to the device itself. The most common address for referring to the device itself on the loopback interface is 127.0.0.1. systemd-resolved, a service in Linux-based operating systems that use systemd as their init daemon (basically, a system manager), that provides network name resolution to local applications, has address 127.0.0.53. DNS queries of applications are routed to 127.0.0.53, which are then resolved by systemd-resolved (by forwarding the DNS query to the actual DNS server configured for usage in the network).

5. How many .txt files were requested? List their names.

image

Three. decoy2.txt, encoded.txt, decoy1.txt

6. One .txt file contains base64-encoded content. Identify and decode it. What does it contain?

image

Contents of encoded.txt: RkxBR3tzcGlkM3JfbmV0d29ya19tYXN0ZXJ9Cg==

Decodes to: FLAG{spid3r_network_master}

7. Was any attempt made to distract the analyst using decoy files? Explain.

Yes, using two other text files (decoy1.txt, decoy2.txt) to attempt to mask the encoded text file (encoded.txt) being requested. It was not effective.

8. Are there any known ports being used for uncommon services?

  • Known ports? Well-known ports are ports reserved in the range 0-1023 by the Internet Assigned Numbers Authority (IANA) for well-known (common and widely used) network services. Some most notable well-known ports:
    • SSH - 22
    • DNS - 53
    • HTTP - 80
    • HTTPS (SSL/TLS) - 443

tcp.port <= 1024 || udp.port <= 1024 yields only DNS queries and responses, so no well-known ports are being used for uncommon services. However, the HTTP Server: SimpleHTTP/0.6 Python/3.12.3 is running on port 8000, instead of the well-known port 80.

9. How many HTTP GET requests are visible in the capture?

Three.

10. What User-Agent was used to make the HTTP requests?

image

curl/8.5.0


Time Pass: Recreating the setup

Server:

asciicast

Client:

asciicast

Server Log:

image

About

Analysis of given PCAP file

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors