SANS Holiday Challenge

1975 Words4 Pages

1. Introduction

The aim of this paper to analyze a packet capture file with various tools and answer the questions provided. SANS have released the Holiday Hacking Challenge packet capture for the last ten years. It's run as a competition for people all around the world. The packet capture is quite challenging and will test the skills of the network analyzer to the limit. The tools that will be used to analyze the packet capture are: Wireshark, Ngrep, Foremost, and Network Miner.

2. Filter by Protocols

The packet capture is quite verbose and can be intimidating to know where to begin, or what methodology to use. The first protocol filtered was POP3 for email communication. The filter revealed a number of email communications between two IP addresses. (See Figure 2.1 below).

Figure 2.1. Filter with POP.

A 'Follow TCP Stream' was run to look at a single packet in more detail. The stream contained an email sent from George Bailey to Don Sawyer. The brief revealed that George Bailey is the head of security of the town, but disclosed no information pertaining to Don Sawyer. George's IP address seems to be 10.16.11.5 which can be filtered to reveal more information.

The stream provides the details of two email addresses: george.bailey@valleyelectr1c.co.nw and don.sawyer@valleyelectric.co.nw. The username name of Don Sawyer is dsawyer and his password is Fashionista. This information may prove useful later. The email sent from George to Don stated.
“Can you monitor the Simatic S7-1200 PLC while I am out today? Just click the link below and keep the window open; if the controller shows "red", then let me know.”
(See Figure 2.2 below).

Figure 2.2.

The link reveals the Simatic webserver. All attempts to open the links...

... middle of paper ...

...initive found.

Q4. What defenses could George have employed to prevent Mr. Potter's power grid attack?

A4. Nothing definitive found.

7. Conclusion

Analyzing a packet capture requires a lot of lateral thinking. There is never one defined method to complete different tasks. A good forensic analyst must be able to recognise crucial information provided. Wireshark is still the go to tool for forensic analysis, but tools like Network Miner group and detail information in an easier way for better understanding. Ngrep is a useful tool to search for key words and phrases. Foremost was a vital tool in this investigation because it carved out vital information. The packet capture was a good examination of my skill set. It also tested my proficiency and knowledge of the tools. The knowledge gained will help with future missions and make better all round forensic analyst.

Open Document