SlideShare a Scribd company logo
1 of 30
Detecting Reconnaissance
Through Packet Forensics
Shashank Nigam
Target Audience
 Network Analysts
 Network Admins
 Security Engg.
 Security Researchers and Enthusiasts
 Anyone who is interested
• S3cu4ity Enthusi@astic and S3cu4ity C0n5ult@nt for Security
Compass
• Love to Expl0r3 the W0rld of s3cu4ity
• Have a Blog of my 0wn
• http://securityissuesrevealed.blogspot.in/
• Contact me:
• https://www.linkedin.com/pub/shashank-nigam/21/30/3bb
• Email: shasha.nigam@gmail.com
shashank@securitycompass.com
• What is Reconnaissance ???
• Network Packet Analysis
• Analyzing network packets for detecting various
Reconnaissance activity in your network ; example TCP /UDP
Port scan , Application Fingerprinting, OS fingerprinting, trace
route .
• Detecting unusual traffic into your cabling system
• Identifying packets in depth
• How Does TCP IP Communication Occurs ????????
• Windows Box (win7 or win xp)
• A Linux or attacker’s machine with nmap
• KF Sensor (A honeypot running on Windows Box)
• Wireshark ( network protocol Analyzer on windows box)
• Other recommended Tools
 Xprobe
 Hping
 Nmap
• Some virus or worm trying to establish a remote shell
• Clear text information travelling across the cabling system
• Some unusual port activity (Dynamic ports )
• No spoofed Address
• No scan activity like port scan , OS scan etc.
• Examples: BLASTER WORM, TCP/UDP PORTSCAN, Connectivity
tests etc.
Analyzing Blaster worm:
• Blaster is worm that exploits DCOM RPC vulnerability
discovered in August 2003
• It download msblast.exe file to %WinDir%system32 and
executes it.
• uses cmd.exe to create hidden remote shell process which
listens on TCP port 4444.
• This allows an attacker to send commands on an infected
machine.
Some more unusual traffic:
• Character generator traffic (port 19)
• Data sent to chargen port (19), we can find data echoing back
with some sequence of random character
• Basically performed for some connectivity test
• Such traffic should not be present on cabling system unless
chargen is purposefully used.
• Reconnaissance is a way to gather information about target
before actually planning for an attack
• Success of an attack depends largely upon the reconnaissance
made
• TCP or UDP port scan
• Application fingerprinting
• OS fingerprinting
• Illegally formed scans etc.
• TCP three way handshake involves TCP SYN, SYN ACK AND ACK
packets exchanged between client and server.
• For a TCP port scan system send a TCP SYN packet to
destination port.
• If server supports the service it replies with SYN ACK packet ,
otherwise TCP RST packet is send across cabling system
If we see a lot of RST packets on the network and don’t
find a DATA exchange between two nodes , it signifies
a PORT Scan.
• For a UDP Scan client sends a UDP packet over a destination
port.
• If server does not supports particular service requested in
packet it replies back with ICMP type3/code3 packet.
• This ICMP Type3/code3 packet is unusual to find on network
traffic.
• Code 3 signifies Destination Unreachable/Port unreachable
If we find a lot of ICMP type3/code3 packets in traffic it
signifies UDP port scan is going ahead and requires
attention.
• Sometimes identifying packets is difficult task.
• TCP flags comes to rescue .
• Basically six types of TCP flags can be found in the packet.
 URGENT (URG)
 ACKNOWLEDGEMENT (ACK)
 PUSH (PSH)
 RESET (RST)
 SYNCHRONIZE (SYN)
 FINISH (FIN)
• Some uncommon and absurd combination of these flags in the
packet reveals an illegally formed packet
• IP Scan is usually done to find key services and protocols that
sits after IP header.
• It involves various routing protocols.
• In IP scan process scanner will alter the protocol values to
check for various supporting protocols on target system.
• What is Reconnaissance Process
• Analyzed TCP Port scan (3-way handshake and RST packets)
• Analyzed UDP Port scan (ICMP type 3 code 3 packet)
• Unusual Blaster and chargen traffic used for connectivity test
• Illegally formed scan packets with combinations of different
FLAG bits
• IP scan process looking for various routing Protocols.
• Usually a process of identifying the services running on port
• Does not merely works by identifying ports but send commands
to services.
• Useful where services running on custom ports.
• It identifies the banner or response from the service to identify
the services
• Try to analyze the packet for commands sent and data
transferred across network like application response , banner etc.
• Very important protocol for network Analyst
• RFC 792 at www.ietf.org
• ICMP packet can be used to perform OS fingerprinting and
connectivity test on you network.
• ICMP packet has three constant fields
 ICMP Type
 ICMP code
 Checksum
• Details of ICMP type and code refer to www.iana.org
Type 0 Echo reply
Type 3 Destination Unreachable
Type8 Echo Request
Type 11 Time Exceeded //Trace route
Type 13 Timestamp request
Type14 Time Stamp reply
Type 15 Information Request
Type 16 Information reply packet
Type 17 Address mask request
Type 18 Address mask reply
Reference : www.iana.org
OS fingerprinting
• ICMP based connectivity test
• Works with ICMP ECHO REQUEST packet (Type8) and ICMP
ECHO REPLY packet (Type 0)
• Trace route uses ping process
• Client A send Echo request packet (ping packet) with TTL 1
• Trace Route illustrated
Client A
Client B
1
TTL=1
12
TTL=2
3
TTL=3
Time Exceeded
in Transit
Time Exceeded
in Transit
R1
R2
R3
TTL=4
4
Echo
Reply
• To identify the remote platform or Operating system
• Active Fingerprinting
 TCP Stack Querying (ICMP, SNMP, TCP etc)
 Banner grabbing (FTP, TELNT , HTTP)
 Port Probing ( 135, 137, 445, 524)
• Key ICMP packets seen over Active OS fingerprinting are
 ICMP Type 13 Timestamp
 ICMP Type 17 Address mask
(These packets specific to Xprobe2)
• Key ICMP packets seen over Active
OS fingerprinting are
 ICMP Type 13 Timestamp
 ICMP type 15 Information
 ICMP Type 17 Address mask
• Together these three type of
packet signifies OS fingerprinting
• Order of packet is important to
identify the tool used to OS
fingerprint .
• Type13
• Type17
• Type 15
Xprobe tool
• Nmap is network scanning tool
• OS fingerprinting is module loaded with –A switch for OS
identification
• Nmap sends a series of Six packets to a known open ports.
• All these packets have
 Timestamp value of (Tsval) of 4294967295
 Tsecr value of 0
• All packet except 3rd packet have selective ACK (SACK)
permitted
• Packet #1: Window scale (10) , NOP, MSS, (1460), windows field:1
• Packet #2: MSS (1400), Windows Scale(0), Windows field(63).
• Packet#3: NOP, NOP, Windows scale (5) , NOP, MSS (640). Windows
field:4
• Packet#4: Windows Scale (10) . Windows field (4).
• Packet #5: MSS (536), Windows scale (10), Windows field: 16.
• Packet #6: MSS (265) , windows field: 512
 Reply packets undergo a large variety of additional tests
 Test for ISN , Sequence counter rate , Sequence predictability
• Application fingerprinting
• Various ICMP packet type and codes
• How a trace route operation works (Echo Request and Reply )
• ICMP Based OS Fingerprinting (Type 13 and type 17 packets )
• SYN packet based OS fingerprinting ( nmap )
• Wireshark University Course on Network security and
Forensics
• http://iana.org
• http://ietf.org
• http://keyfocus.net
• TCP IP fingerprinting supported by Nmap
• http://wiki.wireshark.org/
• Familiarize and study more about these topics
• Can analyze the packet logs of your switch and router.
• Research about various different attack fingerprints
• Start with network forensics course.
• Research and study about various other packets types and
structures i.e. DNS, SMTP, FTP, NETBIOS etc.
Detecting Reconnaissance Through Packet Forensics by Shashank Nigam

More Related Content

What's hot

Dcn (transmission control protocol) ppt
Dcn  (transmission control protocol) pptDcn  (transmission control protocol) ppt
Dcn (transmission control protocol) pptVijay Kumar
 
Packet sniffing in switched LANs
Packet sniffing in switched LANsPacket sniffing in switched LANs
Packet sniffing in switched LANsIshraq Al Fataftah
 
Fundamentals of TCP, and dump analysis
Fundamentals of TCP, and dump analysisFundamentals of TCP, and dump analysis
Fundamentals of TCP, and dump analysisNipun Thathsara
 
The art of_firewalking-by-sujay
The art of_firewalking-by-sujayThe art of_firewalking-by-sujay
The art of_firewalking-by-sujayRaghunath G
 
Pertemuan 9 intrusion detection system
Pertemuan 9 intrusion detection systemPertemuan 9 intrusion detection system
Pertemuan 9 intrusion detection systemnewbie2019
 
How to bypass an IDS with netcat and linux
How to bypass an IDS with netcat and linuxHow to bypass an IDS with netcat and linux
How to bypass an IDS with netcat and linuxKirill Shipulin
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wiresharkBasaveswar Kureti
 
Network scanning with nmap
Network scanning with nmapNetwork scanning with nmap
Network scanning with nmapAshish Jha
 
Pcap Headers Description
Pcap Headers DescriptionPcap Headers Description
Pcap Headers DescriptionShravan Kumar
 
SSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wiresharkSSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wiresharkAl Imran, CISA
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with WiresharkJim Gilsinn
 

What's hot (17)

Namp
Namp Namp
Namp
 
Network scan
Network scanNetwork scan
Network scan
 
Dcn (transmission control protocol) ppt
Dcn  (transmission control protocol) pptDcn  (transmission control protocol) ppt
Dcn (transmission control protocol) ppt
 
Packet sniffing in switched LANs
Packet sniffing in switched LANsPacket sniffing in switched LANs
Packet sniffing in switched LANs
 
09 coms 525 tcpip - tcp 2
09   coms 525 tcpip - tcp 209   coms 525 tcpip - tcp 2
09 coms 525 tcpip - tcp 2
 
Fundamentals of TCP, and dump analysis
Fundamentals of TCP, and dump analysisFundamentals of TCP, and dump analysis
Fundamentals of TCP, and dump analysis
 
The art of_firewalking-by-sujay
The art of_firewalking-by-sujayThe art of_firewalking-by-sujay
The art of_firewalking-by-sujay
 
Pertemuan 9 intrusion detection system
Pertemuan 9 intrusion detection systemPertemuan 9 intrusion detection system
Pertemuan 9 intrusion detection system
 
How to bypass an IDS with netcat and linux
How to bypass an IDS with netcat and linuxHow to bypass an IDS with netcat and linux
How to bypass an IDS with netcat and linux
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wireshark
 
C Cpres
C CpresC Cpres
C Cpres
 
Network scanning with nmap
Network scanning with nmapNetwork scanning with nmap
Network scanning with nmap
 
Wireshark ppt
Wireshark pptWireshark ppt
Wireshark ppt
 
Reflexive Access List
Reflexive Access ListReflexive Access List
Reflexive Access List
 
Pcap Headers Description
Pcap Headers DescriptionPcap Headers Description
Pcap Headers Description
 
SSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wiresharkSSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wireshark
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
 

Viewers also liked

Mapping your digital footprint by A K Goel
Mapping your digital footprint by A K GoelMapping your digital footprint by A K Goel
Mapping your digital footprint by A K GoelOWASP Delhi
 
Bitcoins - A Primer on Bitcoins & Digital Currencies by Ankur Vats
Bitcoins - A Primer on Bitcoins & Digital Currencies by Ankur VatsBitcoins - A Primer on Bitcoins & Digital Currencies by Ankur Vats
Bitcoins - A Primer on Bitcoins & Digital Currencies by Ankur VatsOWASP Delhi
 
Feed Normalization with Ember Data 1.0
Feed Normalization with Ember Data 1.0Feed Normalization with Ember Data 1.0
Feed Normalization with Ember Data 1.0Jeremy Gillick
 
Tare semana 05 ciclos biogeoquímicos
Tare semana 05 ciclos biogeoquímicosTare semana 05 ciclos biogeoquímicos
Tare semana 05 ciclos biogeoquímicosjose heredia
 
Theinjurylawnews
TheinjurylawnewsTheinjurylawnews
TheinjurylawnewsJack740
 
2013 AMA Symposium Presentation: Dartmouth Site Redevelopment
2013 AMA Symposium Presentation: Dartmouth Site Redevelopment2013 AMA Symposium Presentation: Dartmouth Site Redevelopment
2013 AMA Symposium Presentation: Dartmouth Site RedevelopmentGene Lewis
 
IMCA Capital
IMCA CapitalIMCA Capital
IMCA Capitalmcomuzzo
 
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CDSoftware Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CDOWASP Delhi
 
Breakaway Service
Breakaway ServiceBreakaway Service
Breakaway Servicepck100
 
Change in the cloud
Change in the cloudChange in the cloud
Change in the cloudpck100
 
Superior home services1
Superior home services1Superior home services1
Superior home services1Jack740
 
سمینار آشنائی Ims
سمینار آشنائی Ims  سمینار آشنائی Ims
سمینار آشنائی Ims Meisam J Moghadam
 
перелік комплексних навчально тематичних екскурсій
перелік комплексних навчально тематичних екскурсійперелік комплексних навчально тематичних екскурсій
перелік комплексних навчально тематичних екскурсійbiblioteka_c
 

Viewers also liked (18)

Mapping your digital footprint by A K Goel
Mapping your digital footprint by A K GoelMapping your digital footprint by A K Goel
Mapping your digital footprint by A K Goel
 
Bitcoins - A Primer on Bitcoins & Digital Currencies by Ankur Vats
Bitcoins - A Primer on Bitcoins & Digital Currencies by Ankur VatsBitcoins - A Primer on Bitcoins & Digital Currencies by Ankur Vats
Bitcoins - A Primer on Bitcoins & Digital Currencies by Ankur Vats
 
Feed Normalization with Ember Data 1.0
Feed Normalization with Ember Data 1.0Feed Normalization with Ember Data 1.0
Feed Normalization with Ember Data 1.0
 
Tare semana 05 ciclos biogeoquímicos
Tare semana 05 ciclos biogeoquímicosTare semana 05 ciclos biogeoquímicos
Tare semana 05 ciclos biogeoquímicos
 
Software Testing
Software TestingSoftware Testing
Software Testing
 
HSE-MS Basic
HSE-MS BasicHSE-MS Basic
HSE-MS Basic
 
Theinjurylawnews
TheinjurylawnewsTheinjurylawnews
Theinjurylawnews
 
2013 AMA Symposium Presentation: Dartmouth Site Redevelopment
2013 AMA Symposium Presentation: Dartmouth Site Redevelopment2013 AMA Symposium Presentation: Dartmouth Site Redevelopment
2013 AMA Symposium Presentation: Dartmouth Site Redevelopment
 
IMCA Capital
IMCA CapitalIMCA Capital
IMCA Capital
 
7dnews
7dnews7dnews
7dnews
 
Software Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CDSoftware Security: In the World of Cloud & CI-CD
Software Security: In the World of Cloud & CI-CD
 
Breakaway Service
Breakaway ServiceBreakaway Service
Breakaway Service
 
Change in the cloud
Change in the cloudChange in the cloud
Change in the cloud
 
Lifestyle holidays vacation club
Lifestyle holidays vacation clubLifestyle holidays vacation club
Lifestyle holidays vacation club
 
Superior home services1
Superior home services1Superior home services1
Superior home services1
 
سمینار آشنائی Ims
سمینار آشنائی Ims  سمینار آشنائی Ims
سمینار آشنائی Ims
 
Anchor fans
Anchor fansAnchor fans
Anchor fans
 
перелік комплексних навчально тематичних екскурсій
перелік комплексних навчально тематичних екскурсійперелік комплексних навчально тематичних екскурсій
перелік комплексних навчально тематичних екскурсій
 

Similar to Detecting Reconnaissance Through Packet Forensics by Shashank Nigam

Network Scanning Phases and Supporting Tools
Network Scanning Phases and Supporting ToolsNetwork Scanning Phases and Supporting Tools
Network Scanning Phases and Supporting ToolsJoseph Bugeja
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferenceCengage Learning
 
01204427-scanner.ppt
01204427-scanner.ppt01204427-scanner.ppt
01204427-scanner.pptVarunBehere1
 
Scanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxScanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxMahdiHasanSowrav
 
Ismail TCP IP.pdf
Ismail TCP IP.pdfIsmail TCP IP.pdf
Ismail TCP IP.pdfhelloraja
 
Ismail TCP IP.pdf
Ismail TCP IP.pdfIsmail TCP IP.pdf
Ismail TCP IP.pdfhelloraja
 
Introduction to TCP / IP in networking Technology
Introduction to TCP / IP in networking TechnologyIntroduction to TCP / IP in networking Technology
Introduction to TCP / IP in networking Technologyroykousik2020
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptcemporku
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdftehkotak4
 
Node finder presentation
Node finder presentationNode finder presentation
Node finder presentationVarun Varshney
 
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptxVINAYTANWAR18
 
A Practical Guide to (Correctly) Troubleshooting with Traceroute
A Practical Guide to (Correctly) Troubleshooting with TracerouteA Practical Guide to (Correctly) Troubleshooting with Traceroute
A Practical Guide to (Correctly) Troubleshooting with TracerouteRichard Steenbergen
 

Similar to Detecting Reconnaissance Through Packet Forensics by Shashank Nigam (20)

Network Scanning Phases and Supporting Tools
Network Scanning Phases and Supporting ToolsNetwork Scanning Phases and Supporting Tools
Network Scanning Phases and Supporting Tools
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
 
01204427-scanner.ppt
01204427-scanner.ppt01204427-scanner.ppt
01204427-scanner.ppt
 
Scanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxScanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptx
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Ismail TCP IP.pdf
Ismail TCP IP.pdfIsmail TCP IP.pdf
Ismail TCP IP.pdf
 
Ismail TCP IP.pdf
Ismail TCP IP.pdfIsmail TCP IP.pdf
Ismail TCP IP.pdf
 
tcpip.ppt
tcpip.ppttcpip.ppt
tcpip.ppt
 
tcpip.ppt
tcpip.ppttcpip.ppt
tcpip.ppt
 
tcpip.ppt
tcpip.ppttcpip.ppt
tcpip.ppt
 
tcpip.ppt
tcpip.ppttcpip.ppt
tcpip.ppt
 
Introduction to TCP / IP in networking Technology
Introduction to TCP / IP in networking TechnologyIntroduction to TCP / IP in networking Technology
Introduction to TCP / IP in networking Technology
 
tcpip.ppt
tcpip.ppttcpip.ppt
tcpip.ppt
 
QSpiders - Upper layer-protocols
QSpiders - Upper layer-protocolsQSpiders - Upper layer-protocols
QSpiders - Upper layer-protocols
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.ppt
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdf
 
Node finder presentation
Node finder presentationNode finder presentation
Node finder presentation
 
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
 
A Practical Guide to (Correctly) Troubleshooting with Traceroute
A Practical Guide to (Correctly) Troubleshooting with TracerouteA Practical Guide to (Correctly) Troubleshooting with Traceroute
A Practical Guide to (Correctly) Troubleshooting with Traceroute
 
Network scanning
Network scanningNetwork scanning
Network scanning
 

More from OWASP Delhi

Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesOWASP Delhi
 
Securing dns records from subdomain takeover
Securing dns records from subdomain takeoverSecuring dns records from subdomain takeover
Securing dns records from subdomain takeoverOWASP Delhi
 
Effective Cyber Security Report Writing
Effective Cyber Security Report WritingEffective Cyber Security Report Writing
Effective Cyber Security Report WritingOWASP Delhi
 
Data sniffing over Air Gap
Data sniffing over Air GapData sniffing over Air Gap
Data sniffing over Air GapOWASP Delhi
 
Demystifying Container Escapes
Demystifying Container EscapesDemystifying Container Escapes
Demystifying Container EscapesOWASP Delhi
 
Automating WAF using Terraform
Automating WAF using TerraformAutomating WAF using Terraform
Automating WAF using TerraformOWASP Delhi
 
Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat IntelligenceOWASP Delhi
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghOWASP Delhi
 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOWASP Delhi
 
Recon with Nmap
Recon with Nmap Recon with Nmap
Recon with Nmap OWASP Delhi
 
Securing AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriSecuring AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriOWASP Delhi
 
Cloud assessments by :- Aakash Goel
Cloud assessments  by :- Aakash GoelCloud assessments  by :- Aakash Goel
Cloud assessments by :- Aakash GoelOWASP Delhi
 
Pentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang BhatnagarPentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang BhatnagarOWASP Delhi
 
Wireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanWireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanOWASP Delhi
 
IETF's Role and Mandate in Internet Governance by Mohit Batra
IETF's Role and Mandate in Internet Governance by Mohit BatraIETF's Role and Mandate in Internet Governance by Mohit Batra
IETF's Role and Mandate in Internet Governance by Mohit BatraOWASP Delhi
 
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj MishraMalicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj MishraOWASP Delhi
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghOWASP Delhi
 
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
Thwarting The Surveillance in Online Communication by Adhokshaj MishraThwarting The Surveillance in Online Communication by Adhokshaj Mishra
Thwarting The Surveillance in Online Communication by Adhokshaj MishraOWASP Delhi
 

More from OWASP Delhi (20)

Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
 
Securing dns records from subdomain takeover
Securing dns records from subdomain takeoverSecuring dns records from subdomain takeover
Securing dns records from subdomain takeover
 
Effective Cyber Security Report Writing
Effective Cyber Security Report WritingEffective Cyber Security Report Writing
Effective Cyber Security Report Writing
 
Data sniffing over Air Gap
Data sniffing over Air GapData sniffing over Air Gap
Data sniffing over Air Gap
 
UDP Hunter
UDP HunterUDP Hunter
UDP Hunter
 
Demystifying Container Escapes
Demystifying Container EscapesDemystifying Container Escapes
Demystifying Container Escapes
 
Automating WAF using Terraform
Automating WAF using TerraformAutomating WAF using Terraform
Automating WAF using Terraform
 
Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat Intelligence
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilities
 
Recon with Nmap
Recon with Nmap Recon with Nmap
Recon with Nmap
 
Securing AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriSecuring AWS environments by Ankit Giri
Securing AWS environments by Ankit Giri
 
DMARC Overview
DMARC OverviewDMARC Overview
DMARC Overview
 
Cloud assessments by :- Aakash Goel
Cloud assessments  by :- Aakash GoelCloud assessments  by :- Aakash Goel
Cloud assessments by :- Aakash Goel
 
Pentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang BhatnagarPentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang Bhatnagar
 
Wireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanWireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit Ranjan
 
IETF's Role and Mandate in Internet Governance by Mohit Batra
IETF's Role and Mandate in Internet Governance by Mohit BatraIETF's Role and Mandate in Internet Governance by Mohit Batra
IETF's Role and Mandate in Internet Governance by Mohit Batra
 
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj MishraMalicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep Singh
 
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
Thwarting The Surveillance in Online Communication by Adhokshaj MishraThwarting The Surveillance in Online Communication by Adhokshaj Mishra
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Detecting Reconnaissance Through Packet Forensics by Shashank Nigam

  • 1. Detecting Reconnaissance Through Packet Forensics Shashank Nigam
  • 2. Target Audience  Network Analysts  Network Admins  Security Engg.  Security Researchers and Enthusiasts  Anyone who is interested
  • 3. • S3cu4ity Enthusi@astic and S3cu4ity C0n5ult@nt for Security Compass • Love to Expl0r3 the W0rld of s3cu4ity • Have a Blog of my 0wn • http://securityissuesrevealed.blogspot.in/ • Contact me: • https://www.linkedin.com/pub/shashank-nigam/21/30/3bb • Email: shasha.nigam@gmail.com shashank@securitycompass.com
  • 4. • What is Reconnaissance ??? • Network Packet Analysis • Analyzing network packets for detecting various Reconnaissance activity in your network ; example TCP /UDP Port scan , Application Fingerprinting, OS fingerprinting, trace route . • Detecting unusual traffic into your cabling system • Identifying packets in depth
  • 5. • How Does TCP IP Communication Occurs ????????
  • 6. • Windows Box (win7 or win xp) • A Linux or attacker’s machine with nmap • KF Sensor (A honeypot running on Windows Box) • Wireshark ( network protocol Analyzer on windows box) • Other recommended Tools  Xprobe  Hping  Nmap
  • 7. • Some virus or worm trying to establish a remote shell • Clear text information travelling across the cabling system • Some unusual port activity (Dynamic ports ) • No spoofed Address • No scan activity like port scan , OS scan etc. • Examples: BLASTER WORM, TCP/UDP PORTSCAN, Connectivity tests etc.
  • 8. Analyzing Blaster worm: • Blaster is worm that exploits DCOM RPC vulnerability discovered in August 2003 • It download msblast.exe file to %WinDir%system32 and executes it. • uses cmd.exe to create hidden remote shell process which listens on TCP port 4444. • This allows an attacker to send commands on an infected machine.
  • 9. Some more unusual traffic: • Character generator traffic (port 19) • Data sent to chargen port (19), we can find data echoing back with some sequence of random character • Basically performed for some connectivity test • Such traffic should not be present on cabling system unless chargen is purposefully used.
  • 10. • Reconnaissance is a way to gather information about target before actually planning for an attack • Success of an attack depends largely upon the reconnaissance made • TCP or UDP port scan • Application fingerprinting • OS fingerprinting • Illegally formed scans etc.
  • 11. • TCP three way handshake involves TCP SYN, SYN ACK AND ACK packets exchanged between client and server. • For a TCP port scan system send a TCP SYN packet to destination port. • If server supports the service it replies with SYN ACK packet , otherwise TCP RST packet is send across cabling system If we see a lot of RST packets on the network and don’t find a DATA exchange between two nodes , it signifies a PORT Scan.
  • 12.
  • 13. • For a UDP Scan client sends a UDP packet over a destination port. • If server does not supports particular service requested in packet it replies back with ICMP type3/code3 packet. • This ICMP Type3/code3 packet is unusual to find on network traffic. • Code 3 signifies Destination Unreachable/Port unreachable If we find a lot of ICMP type3/code3 packets in traffic it signifies UDP port scan is going ahead and requires attention.
  • 14. • Sometimes identifying packets is difficult task. • TCP flags comes to rescue . • Basically six types of TCP flags can be found in the packet.  URGENT (URG)  ACKNOWLEDGEMENT (ACK)  PUSH (PSH)  RESET (RST)  SYNCHRONIZE (SYN)  FINISH (FIN) • Some uncommon and absurd combination of these flags in the packet reveals an illegally formed packet
  • 15.
  • 16. • IP Scan is usually done to find key services and protocols that sits after IP header. • It involves various routing protocols. • In IP scan process scanner will alter the protocol values to check for various supporting protocols on target system.
  • 17. • What is Reconnaissance Process • Analyzed TCP Port scan (3-way handshake and RST packets) • Analyzed UDP Port scan (ICMP type 3 code 3 packet) • Unusual Blaster and chargen traffic used for connectivity test • Illegally formed scan packets with combinations of different FLAG bits • IP scan process looking for various routing Protocols.
  • 18. • Usually a process of identifying the services running on port • Does not merely works by identifying ports but send commands to services. • Useful where services running on custom ports. • It identifies the banner or response from the service to identify the services • Try to analyze the packet for commands sent and data transferred across network like application response , banner etc.
  • 19. • Very important protocol for network Analyst • RFC 792 at www.ietf.org • ICMP packet can be used to perform OS fingerprinting and connectivity test on you network. • ICMP packet has three constant fields  ICMP Type  ICMP code  Checksum • Details of ICMP type and code refer to www.iana.org
  • 20. Type 0 Echo reply Type 3 Destination Unreachable Type8 Echo Request Type 11 Time Exceeded //Trace route Type 13 Timestamp request Type14 Time Stamp reply Type 15 Information Request Type 16 Information reply packet Type 17 Address mask request Type 18 Address mask reply Reference : www.iana.org OS fingerprinting
  • 21. • ICMP based connectivity test • Works with ICMP ECHO REQUEST packet (Type8) and ICMP ECHO REPLY packet (Type 0) • Trace route uses ping process • Client A send Echo request packet (ping packet) with TTL 1 • Trace Route illustrated
  • 22. Client A Client B 1 TTL=1 12 TTL=2 3 TTL=3 Time Exceeded in Transit Time Exceeded in Transit R1 R2 R3 TTL=4 4 Echo Reply
  • 23. • To identify the remote platform or Operating system • Active Fingerprinting  TCP Stack Querying (ICMP, SNMP, TCP etc)  Banner grabbing (FTP, TELNT , HTTP)  Port Probing ( 135, 137, 445, 524) • Key ICMP packets seen over Active OS fingerprinting are  ICMP Type 13 Timestamp  ICMP Type 17 Address mask (These packets specific to Xprobe2)
  • 24. • Key ICMP packets seen over Active OS fingerprinting are  ICMP Type 13 Timestamp  ICMP type 15 Information  ICMP Type 17 Address mask • Together these three type of packet signifies OS fingerprinting • Order of packet is important to identify the tool used to OS fingerprint . • Type13 • Type17 • Type 15 Xprobe tool
  • 25. • Nmap is network scanning tool • OS fingerprinting is module loaded with –A switch for OS identification • Nmap sends a series of Six packets to a known open ports. • All these packets have  Timestamp value of (Tsval) of 4294967295  Tsecr value of 0 • All packet except 3rd packet have selective ACK (SACK) permitted
  • 26. • Packet #1: Window scale (10) , NOP, MSS, (1460), windows field:1 • Packet #2: MSS (1400), Windows Scale(0), Windows field(63). • Packet#3: NOP, NOP, Windows scale (5) , NOP, MSS (640). Windows field:4 • Packet#4: Windows Scale (10) . Windows field (4). • Packet #5: MSS (536), Windows scale (10), Windows field: 16. • Packet #6: MSS (265) , windows field: 512  Reply packets undergo a large variety of additional tests  Test for ISN , Sequence counter rate , Sequence predictability
  • 27. • Application fingerprinting • Various ICMP packet type and codes • How a trace route operation works (Echo Request and Reply ) • ICMP Based OS Fingerprinting (Type 13 and type 17 packets ) • SYN packet based OS fingerprinting ( nmap )
  • 28. • Wireshark University Course on Network security and Forensics • http://iana.org • http://ietf.org • http://keyfocus.net • TCP IP fingerprinting supported by Nmap • http://wiki.wireshark.org/
  • 29. • Familiarize and study more about these topics • Can analyze the packet logs of your switch and router. • Research about various different attack fingerprints • Start with network forensics course. • Research and study about various other packets types and structures i.e. DNS, SMTP, FTP, NETBIOS etc.