Friday, 15 November 2013

TestBed: Identify Network Attacks for your Forensics --- SNORT + PCAP

In our analysis we deploy below tools on Single Host:
    a. TSHARK
    b. SNORT (loaded with latest rule-set from http://rules.emergingthreats.net/ )
    c. TCPREPLAY

START:
1. Create eth0 interface with PROMISCIOUS flag enabled
       root@n41k# ifconfig eth0 up (waking up eth0 interface)
       root@n41k# ifconfig eth0 promisc (enable promiscuous flag)
       root@n41k# ifconfig eth0 -promisc (After analysis remove promiscuous flag)

Output:
eth0      Link encap:Ethernet  HWaddr 00:aa:b9:c8:d5:6f  
             UP BROADCAST PROMISC MULTICAST  MTU:1500  Metric:1
             RX packets:0 errors:0 dropped:0 overruns:0 frame:0
             TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
              collisions:0 txqueuelen:1000 
             RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)
             Interrupt:45 Base address:0x4000 

2. Analyze Network Traffic Capture with TSHARK
        root@n41k#tshark -R "tcp.port==80" -r /home/n41k/threat/botnet.pcap 
        root@n41k#tshark -R "http.response.code == 200" -r /home/n41k/threat/botnet.pcap 
        root@n41k#tshark -R "http.response.code == 404" -r /home/n41k/threat/botnet.pcap 
        root@n41k#tshark -R 'http.request.method == "GET" || http.request.method == "POST"' -r          /home/n41k/threat/botnet.pcap 

3. Configure SNORT and Verify the process list

4. Inject the packets
     root@n41k# tcpreplay -i eth0 -t /home/n41k/threat/botnet.pcap

5. Monitor SNORT logs.
    root@n41k# tail -f /var/log/snort/snort.alert

6. Further Analysis and Verification of Domain listed
          • http://support.clean-mx.de/clean-mx/viruses.php
          • http://malc0de.com/database/
          • http://www.malwareblacklist.com/showMDL.php
          • http://www.malwaredomainlist.com/mdl.php
          • http://www.malwareurl.com/listing-urls.php

                           

Saturday, 16 February 2013

Discover BaudRate of your Embedded device

It is enriching by finding the baudrate of an unknown hardware without owning any specs...

Tool: baudrate.py
Referencehttps://code.google.com/p/baudrate/source/browse/trunk/src/baudrate.py

Sample Usage:
#  ./baudrate.py -p /dev/ttyS0  (or)
$ sudo ./baudrate.py -p /dev/ttyUSB0

>> Change baudrate manually by pressing UP / DOWN arrow keys



Starting baudrate detection on /dev/ttyUSB0, turn on your serial device now.
Press Ctl+C to quit.


@@@@@@@@@@@@@@@@@@@@@ Baudrate: 115200 @@@@@@@@@@@@@@@@@@@@@
Detected baudrate: 115200

Save minicom configuration as: minicom1
 
Configuration saved. Run minicom now [n/Y]? n