Day 17
Traffic analysis I Tawt I Taw A C2 Tat!
Learning Objectives
Gain knowledge of the network traffic data format
Understand the differences between full packet captures and network flows
Learn how to process network flow data
Discover the SiLK tool suite
Gain hands-on experience in network flow analysis with SiLK
This room is again a very straightforward one with all commands and instructions already given. We just need to follow along and run them.
Which version of SiLK is installed on the VM? Submit Hint
[REDACTED]
ubuntu@ip-10-10-191-161:~/Desktop$ silk_config -v
[REDACTD]
* Root of packed data tree: /var/silk/data
* Packing logic: Run-time plug-in
* Timezone support: UTC
* Available compression methods: lzo1x [default], none, zlib
* IPv6 network connections: yes
* IPv6 flow record support: yes
* IPset record compatibility: 3.14.0
* IPFIX/NetFlow9/sFlow collection: ipfix,netflow9,sflow
* Transport encryption: GnuTLS
* PySiLK support: /usr/local/lib/python2.7/site-packages
* Enable assert(): no
Copyright (C) 2001-2020 by Carnegie Mellon University
GNU General Public License (GPL) Rights pursuant to Version 2, June 1991.
Some included library code covered by LGPL 2.1; see source for details.
Government Purpose License Rights (GPLR) pursuant to DFARS 252.227-7013.
Send bug reports, feature requests, and comments to netsa-help@cert.org.
What is the size of the flows in the count records?
[REDACTED]
rwfileinfo suspicious-flows.silk
suspicious-flows.silk:
format(id) FT_RWIPV6ROUTING(0x0c)
version 16
byte-order littleEndian
compression(id) lzo1x(2)
header-length 88
.
.
.
file-size 152366
command-lines
1 rwipfix2silk --silk-output=test.silk
What is the start time (sTime) of the sixth record in the file?
[REDACTED]
ubuntu@ip-10-10-191-161:~/Desktop$ rwcut suspicious-flows.silk --num-recs=6
sIP|dIP|sPort|dPort|pro|packets|bytes|flags|sTime|duration|eTime|sen|
[REDACTED]
What is the destination port of the sixth UDP record?
[REDACTED]
ubuntu@ip-10-10-191-161:~/Desktop$ rwcut suspicious-flows.silk --fields=protocol,sIP,sPort,dIP,dPort --num-recs=6
pro| sIP|sPort| dIP|dPort|
6|175.215.235.223| 80|175.215.236.223| 3222|
6|175.215.235.223| 80|175.215.236.223| 3220|
6|175.215.235.223| 80|175.215.236.223| 3219|
6|175.215.235.223| 80|175.215.236.223| 3218|
6|175.215.235.223| 80|175.215.236.223| 3221|
[REDACTED]
What is the record value (%) of the dport 53?
[REDACTED]
rwstats suspicious-flows.silk --fields=dPort --values=records,packets,bytes,sIP-Distinct,dIP-Distinct --count=10
INPUT: 11774 Records for 5713 Bins and 11774 Total Records
OUTPUT: Top 10 Bins by Records
[REDACTED]
What is the number of bytes transmitted by the top talker on the network?
[REDACTED]
buntu@ip-10-10-191-161:~/Desktop$ rwstats suspicious-flows.silk --fields=sIP --values=bytes --count=10 --top
INPUT: 11774 Records for 8 Bins and 1412597 Total Bytes
OUTPUT: Top 10 Bins by Bytes
[REDACTED]
What is the sTime value of the first DNS record going to port 53?
[REDACTED]
ubuntu@ip-10-10-191-161:~/Desktop$ rwfilter suspicious-flows.silk --saddress=175.175.173.221 --dport=53 --pass=stdout | rwcut --fields=sIP,dIP,stime | head -10
INPUT: 11774 Records for 9 Bins and 11774 Total Records
OUTPUT: Top 10 Bins by Records
[REDACTED]
What is the IP address of the host that the C2 potentially controls? (In defanged format: 123[.]456[.]789[.]0 )
[REDACTED]
Which IP address is suspected to be the flood attacker? (In defanged format: 123[.]456[.]789[.]0 )
[REDACTED]
What is the sent SYN packet's number of records?
[REDACTED]
ubuntu@ip-10-10-191-161:~/Desktop$ rwfilter suspicious-flows.silk --saddress=175.215.236.223 --pass=stdout | rwstats --fields=sIP,flag,dIP --count=10
[REDACTED]
Last updated