Trace File Library 2008
Trace File Library 2008
No.
00029
Name
137port.pcap
Description
It looks like NetBIOS It feels like NetBIOS but it doesn't smell like NetBIOS. Something just feels wrong. Follow TCP Stream on this communication to find out what it really is. Consider using protocol forcing (right-mouse click, Decode As) to make port 137 traffic get decoded as FTP. It's a cat fight! Watch the change of direction in the scan process when one aggressive honeypot gets scanned by another aggressive honeypot. Consider making an IO Graph with two filters: black line: ip.src==24.6.137.85 && tcp.flags == 0x02; red line: ip.src==24.6.138.50 && tcp.flags == 0x02. You may need to adjust the X axis tick interval. Turn on the green graph line without any filter applied. This scan was performed by LANguard Network Security Scanner. Look for the illegal ICMP Echo request packet (Type 8; Code 19) which is the signature for LNSS.
00003
2-specters-fighting.pcap
00005
active-scan.pcap
00163
aida32-connection.pcap
Even though Wireshark doesn't recognize this application, a quick examination of the data being exchanged reveals that this is AIDA32 traffic. If Wireshark doesn't have a dissector for your traffic, examine the payload to look for the name or look up the port on www.iana.org.
Page 1
00162
arp-badpadding.pcap
00161
arp-bootup.pcap
00047
arp-ping.pcap
Page 2
00087
arp-recon.pcap
00135
bittorrent-idle-crap.pcap
We let a BitTorrent client sit idle for an extended period of time (24 hours) and then decided to check in on it to see if it was talking. Look at all the outbound handshakes! And after sending SYN packets to a number of these folks the BitTorrent client performs some DNS PTR queries to resolve their names. We think we were lucky this client didn't make a connection to tracker.bittorrent.com. A BitTorrent tracker is a server that 'assists in the communication between peers.' Thanks, but no thanks. Simply launching BitTorrent causes a connection to the BitTorrent website as well as surveymonkey.com, questionmarket.com and zedo.com (billing itself as Third Generation Technology of Ad Serving). Is this really the traffic you want on the network? The query for 'madonna' took 3.5 seconds not the fastest bolt of lightening. Maybe they should talk to Google.
00134
bittorrent-launch-searchmaddona.pcap
Page 3
00104
bit-torrent-startupbackground.pcap
00046
blaster.pcap
00059
bruteforce.pcap
Page 4
00103
chargen.pcap
00024
clientdying.pcap
00125
dhcp-ack-info.pcap
00124
dhcp-discover-strange.pcap
Something is terribly wrong with this host we need to get it off the network a.s.a.p. Check out the Client MAC Address field in the DHCP packets. How can this be? What are your thoughts on the cause of this unusual traffic?
Page 5
00123
dhcp-offer-info.pcap
00044
dhcp-relay-serverside.pcap
00043
dhcp-renewtorebind.pcap
0802
dhcp_server_discovery2_types.pcap
Page 6
00058
dictionary.pcap
00057
dictionary2.pcap
00019
dns-error-domain.pcap
When a client tries unsuccessfully to get the IP address of www.us.gov, it appends its domain information to the query. This, of course, generates a response of "No Such Name." The client is configured to "Append parent suffixes of the primary domain suffix." Compare the DNS lookups required to access www.winpcap.org, www.msnbc.com and www.espn.com. Check the DNS traffic generated when you connect to your corporate servers. Consider baselining that traffic.
00160
dns-misc.pcap
Page 7
00120
dns-mxlookup.pcap
00119
dns-ptr.pcap
If you see an excess number of DNS PTR queries, look at the source. Make sure it's not your Wireshark system (turn off network name resolution to squelch the DNS PTR traffic from Wireshark). Why are other devices on the network performing these DNS PTR queries - don't they know the network names of the targets? This DNS query for <Root> generates a response with the MNAME (primary master server name) value of A.ROOT.SERVERS.NET. The reply indicates that the responsible authority's mailbox is at Verisign and the receiver can only cache this information for a measly 6 minutes and 19 seconds. DNS server failures [P4] [P17] [P23-P25] don't indicate that the name was not found they indicate that the server couldn't get a positive or negative response. Perhaps the upstream DNS server didn't respond in a timely manner (or at all). Consider building a display filter for dns.flags.rcode==2 to view these DNS server failure responses.
00118
dns-root.pcap
00157
dns-serverfailure.pcap
Page 8
00084
dns-ttl-issue.pcap
00117
dnswalk.pcap
00117
dnswalk.pcap
00083
download-bad.pcap
Page 9
00082
download-good.pcap
00102
espn-moved.pcap
00156
ettercapcheckforpoisoner.pcap
Page 10
00133
fin-unhappy-client.pcap
00025
frag-needed.pcap
00081
ftp-crack.pcap
Page 11
00101
ftp-failedupload.pcap
00039
ftp-filesizeproblem.pcap
00192
ftp-fxp-cutoff.pcap
00080
ftp-pasv_scrubbed.pcap
00190
ftp-pasv-fail.pcap
Page 12
00079
ftp-tcp-segment.pcap
00028
ftp-transfer.pcap
This FTP transfer process consists of five TCP connections. Reviewing TCP Conversations information is the best way to see which connection supports the majority of the traffic. There are some problems as indicated in the Expert Info window as well. Trying to upload a file (you can see the PPT file name in the trace), but the connection is lost. Note the retransmissions leading to a whole slew of FIN ACK packets. A background process in an application automatically makes an FTP connection to a server and performs a write check using the MKD and RMD commands. This is the type of background traffic to watch on the network.
00204
ftp-up-disconnect.pcap
00188
ftp-writecheck.pcap
00187
ftp-wrongpwds.pcap
This simple trace file depicts a user who provides the wrong FTP username and password several times. The username IEUser@ has been submitted because the user is performing FTP from inside Internet Explorer.
Page 13
00038
gnutella.pcap
00027
http1.pcap
00132
http-client-refuses.pcap
Page 14
00175
http-fault-post.pcap
00174
http-general.pcap
00050
http-msn.pcap
00115
http-partial-content.pcap
00131
http-pushy-flash-movie.pcap
Page 15
00155
icmp-destinationunreachable.pcap
00077
icmp-lotsostuff.pcap
00154
icmp-payload.pcap
ICMP Echo Request are not supposed to have data in the payload, but that's what we see in these packets. You would want to ensure that the payload doesn't contain data coming off the local system. There is an old exploit called 'Loki' that tunneled traffic inside ICMP Echo packets. When you see ICMP echo request packets on the wire, check the payload to see if you can identify the application sending the data. Try using the following display filter: data contains "from".
00017
icmp-ping-2signatures.pcap
00016
icmp-ping2signaturesagain.pcap
These two pings come from a Windows system (notice the partial alphabet in the padding) and a Network General Sniffer system (try using a data contains "cinco" filter).
Page 16
00152
icmp-routersolicitation.pcap
00006
icmpstrange.pcap
00151
icmp-traceroute-normal.pcap
This is a classic ICMP-based traceroute operation shows the dependency on the ICMP Time to Live Exceeded/Time to Live Exceeded in Transit response that is used to locate routers along a path. One of the routers doesn't generate these responses though. This traceroute client is excruciatingly slow between some of the TTL increment sets. What triggers the ICMP Destination Unreachable/Port Unreachable message sent to the client [P64]? How many hops away is the target?
00037
icmp-tracert-slow.pcap
Page 17
00036
ip-fragments.pcap
00099
irc-channel.pcap
00061
is-pwdxfer.pcap
Invisible Secrets is one of my favorite tools - I use it primarily for steganography, but it also can do secure password transfer. This trace shows the secure password transfer process. Note the cleartext indication that this is an Invisible Secrets 4 communications. Is this really just a TCP scan? It appears so in the beginning. Examine the timing in this trace to see how the flow of the scan changes.
00023
justascan.pcap
Page 18
00126
live-chat.pcap
00076
lost-route.pcap
00075
macof.pcap
00022
madclient.pcap
This client complained that the network wasn't working. A short packet capture reveals the truth. This application, although not recognized by Wireshark, identifies itself in the payload. In addition, it contains an error message that explains why things didn't work as the user hoped.
Page 19
00114
nessus.pcap
00060
nessus2.pcap
00073
nicname.pcap
00072
nicname-packet-level.pcap
This query uses RWHOIS (Referral WHOIS) on port 4321. RWHOIS extends the capabilities of WHOIS in a hierarchical structure. This trace shows a successful RWHOIS query handled by root.rwhois.net.
Page 20
00071
nmap-fragscan.pcap
This trace file depicts a system sending an IP fragment scan. If you examine the IP header, the protocol field indicates that TCP follows. You can manually decode the TCP header to identify the purpose of the TCP packets. Do you see the follow up fragments? This is the kind of traffic you never want to see on your network someone is doing an IP scan... not a UDP scan... not a TCP scan. This person wants to know what services are supported directly on top of the IP header. Examples include EGP, IDRP, ICMP and encapsulated IPv6. Sort the Info column heading to see all the protocols queried for. This trace depicts an Nmap scan. Open the Statistics > Conversation window and examine the TCP conversations. Do you see any common port number used by Nmap to perform this scan? Did Nmap hit any ports more than once?
00137
nmap-ipscan.pcap
00054
nmapscan.pcap
00053
nmap-see-short-ping.pcap
There are some strange ICMP Echo requests in this Nmap scan [P1] [P8]. What data is supposed to be echoed back? What is the payload in the other ICMP Echo requests? There are also some unusual scans on port 1 which trigger ICMP Destination Unreachable/Port Unreachable responses.
Page 21
00015
nst-axfr-refused.pcap
00014
nst-nslookup-mx.pcap
Someone is looking up the name service entry for the mail exchange server (MX). This type of query isn't normal to have on the network and should send up a red flag!
00049
nstpro-automatic-recon.pcap
NetScanTools Pro (NSTPro) is a great multi-function tool. This trace shows the automated reconnaissance process on the wire. As part of the process, NSTPro performs a realtime blacklist check, a WHOIS query, name server lookup, traceroute [filter on ip.ttl < 10]. Also build a filter to look for successful FTP connections using the following filter: (ip.dst==67.169.189.113) && (tcp.flags == 0x12). When analyzing a one-half of a redundant link between switches, we learned that the switches were not load-balancing. They had created two one-way paths. Data was being lost download - we could tell by the retransmissions (we had to assume the server received duplicate ACKs that triggered the retransmissions).
00113
one-way-drops.pcap
Page 22
00070
password-setting.pcap
00069
ping-routerequest.pcap
This is a really interesting trace. The sender is attempting to use the IP header option Record Route. Expand the IP header option subtree to see the format. Was it successful?
00184
pop3problem.pcap
The POP email application gives no indication as to why it is taking so long to pick up mail. In this trace we can clearly see the problem lies with the email server that is sending back an '-ERR-' response [P5]. Users can't get their email. It appears that their email programs just hang when they try to send/receive. In truth, we can see that there are spam messages with large attachments (.pif) that take a long time to download. Users need to be patient and the company needs to consider filtering this spam before it gets to the client systems. Follow TCP Stream on any POP packet to view the spam messages.
00182
pop-spamclog.pcap
Page 23
00172
portscan.pcap
Setting your Time Display Format to Seconds Since Previous Packet reveals a subtle change between the beginning and the end of this TCP port scan. Notice the open ports on the target system [P14] [P19].
00068
proxy-problem.pcap
The client can't get off the network because of errors getting through the proxy server. You can read the proxy response in clear text - Follow TCP Stream. Also note the slow handshake response time. Not a good day for this user.
00111
rbl-check.pcap
It's interesting to see how a Realtime Blacklist (RBL) check works. Using DNS, the investigator sends numerous DNS queries out with the IP address and the domain name of the blacklist servers. Although most of the responses come back negative, it looks like the target IP address has been found on two of the blacklist servers, blackholes.five-ten.sg.com [P16] and dnsbl.sorbs.net [P26]. Somone is looking for a system that supports PCAnywhere running on port 5632. One target did not respond with an ICMP Destination Unreachable/Port Unreachable message [P21]. This may indicate that the system does have a service running on port 5632.
00033
scan-pcanywhere.pcap
Page 24
00136
sick-client.pcap
00128
skype-call-connectdisconnect.pcap
00011
smtp-fault.pcap
00181
smtp-normal.pcap
Page 25
00179
smtp-vrfy-bad.pcap
Someone is running the SMTP VRFY command against the SMTP server. Although the server doesn't support the VRFY command, its responses to MAIL FROM: [P17] and RCPT TO: [P20] can be used to verify the email address in question. This trace includes a simple SNMP queryresponse pair of communications. Are they all looking for the same information? Perform some Internet research to locate .1.3.6.1.2.1.25.3.2.1.5.1 (or search for SNMP MIB-2.25.3.2.1.5.1). You'll notice the response code of INTEGER 5 indicates that the stated of the device is 'down.' After performing an SQL connection test to port 1433 ms-sql-s), the attacker makes a login attempt with the client name SYD-S21-ESXI and username sa. The response indicates an error because the login for user sa failed. Filter on the SQL Error Number 18456 by using the following syntax: frame[65:4]==18:48:00:00. During the establishment of this SSL connection (HTTPS) there appears to be communication problems causing retransmissions. What on Earth is the scanner doing? Look at the TCP Flag settings in the scan packets. What is triggering the "TCP ACKed lost segment" expert notfication in Wireshark?
00096
snmp.pcap
00056
sql-attack.pcap
00067
ssl3session.pcap
00066
strangescan.pcap
Page 26
00198
sym-404.pcap
00001
sym-failed.pcap
Filter on http to see what's happening more clearly. This will remove the handshake packets and the ACK responses. Why did this Symantec LiveUpdate process fail? The client renews its subscription for the Symantec product with minimum HTTP 404 response codes. There appears to be a periodic GET request (in 15 second intervals) [P20] [P415] [P431]. Filter on the http.request.uri field in one of these packets to find out how often this query goes out. Are all the replies the same? This Symantec update process doesn't seems to work very well. Consider building a filter for http.response.code == 404 and note the number of "File Not Found" responses. Now compare these two display filters and explain the difference in your results: (1) !http.response.code == 404 and (2) http.response.code !=404. Good lesson! This trace shows SYSLOG traffic traveling over port 514 on the network. If SYSLOG is used to transfer firewall or IDS alerts, imagine what someone can learn about your security system. Eek.
00065
sym-update.pcap
00095
sym-update2.pcap
00110
syslog.pcap
Page 27
00031
tcp-con-up.pcap
00010
tcp-echo.pcap
00009
tcp-fin.pcap
Page 28
00064
tcp-keepalive.pcap
00094
tcp-low-mss.pcap
00055
tcpproblem.pcap
Page 29
00093
tcp-wont-shutup.pcap
00171
telnet.pcap
00170
telnet-batmud.pcap
00169
telnet-funny.pcap
Page 30
00168
00167
telnet-torfree.pcap
00091
tftp.pcap
This TFTP communication raises eyebrows on the network. Why can't you Follow TCP Stream on this communication? Do you see any readable data in the payloads?
00008
timesync.pcap
This trace shows a system performing a DNS query for tock.usno.navy.mil and then running a Network Time Protocol request on port 123. Interesting to plug into the corporate network and find TiVo discovery beacons flying about.
00197
tivoconnect.pcap
Page 31
00090
udp-echo.pcap
00166
udp-general.pcap
00165
udp-pentest.pcap
00052
udptraceroute.pcap
Page 32
00030
uglytrace.pcap
00089
using-time.pcap
Scroll through the entire trace file before making any assumptions on the cause of poor performance for this client. This trace illustrates the importance of paying attention to the time values in trace files. The ugliest communications are not necessarily the cause of poor performance. Identify the most time-consuming fault in this trace. Examine the "If-Modified-Since" lines in the HTTP GET requests from this client. How does that parameter affect the file download process? Are there any 404 response codes in this trace? Is the video stream bursty or steady? This user must have recently browsed to www.packet-level.com based on the high number of HTTP 304 Not Modified responses (39 in all) sent from the server. If the user complained of slow performance in the previous connection and we are troubleshooting the problem, we need to ensure they do not receive any HTTP 304 Not Modified responses they should download all files and not pull them from cache.
00088
video-streaming.pcap
00164
web-browse-ok.pcap
Page 33
00007
weirdscan.pcap
00107
whois-podbooks.pcap
This WHOIS query begins with a DNS lookup for ANY DNS entries related to podbooks.com and progresses to learn the contact email address. Next the researcher contacts the ARIN WHOIS database using port 43 (NICNAME), but the server says there isn't a match. This WHOIS query begins with a DNS lookup for ANY DNS entries related to podbooks.com and progresses to learn the contact email address. Next the researcher contacts the ARIN WHOIS database using port 43 (NICNAME), but the server sais there isn't a match. A window frozen condition can kill file transfer speed. Set the Time Display Format to Seconds Since Beginning of Capture and right click on the first ZeroWindow packet [P30] to Set Time Reference. How much time did this condition waste?
00107
whois-podbooks.pcap
00106
window-frozen.pcap
Page 34
00195
window-scaling-good.pcap
00194
window-scaling-wishful.pcap
0802
wowprop.pcap
00105
wrong-port.pcap
Page 35
00051
xprobe-and-nessus.pcap
00201
zonealarm-update.pcap
Page 36