Wireshark and Recognizing Exploits, HakTip 138

Поделиться
HTML-код
  • Опубликовано: 11 мар 2015
  • Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:
    ____________________________________________
    This week on HakTip, Shannon pinpoints an exploitation using Wireshark.
    Working on the shoulders of last week's episode, this week we'll discuss what exploits look like in Wireshark. The example I'm sharing is from Practical Packet Analysis, a book by Chris Sanders about Wireshark.
    Our example packet shows what happens when a user visits a malicious site using a bad version of IE. This is called spear phishing. First, we have HTTP traffic on port 80. We notice there is a 302 moved response from the malicious site and the location is all sorts of weird. Then a bunch of data gets transferred from the new site to the user. Click Follow TCP Stream. If you scroll down, you see some weird gibberish that doesn't make sense and an iframe script. In this case, it's the exploit being sent to the user.
    Scroll down to packet 21 and take a look at the .gif GET request. Lastly, Follow packet 25's TCP Stream. This shows us a windows command shell, and the attacker gaining admin priveledges to view our user's files. FREAKY. But now a network admin could use their intrusion detection system to set up a new alarm whenever an attack of this nature is seen.
    If someone is trying to do a MITM attack on a user, it might look like our next example packet. 54 and 55 are just ARP packets being sent back and forth, but in packet 56 the attacker sends another ARP packet with a different MAC address for the router, thereby sending the user's data to the attacker then to the router. Compare 57 to 40, and you see the same IP address, but different macs for the destination. This is ARP cache Poisoning.
    Let me know what you think. Send me a comment below or email us at tips@hak5.org. And be sure to check out our sister show, Hak5 for more great stuff just like this. I'll be there, reminding you to trust your technolust.
    ~-~~-~~~-~~-~
    Please watch: "Bash Bunny Primer - Hak5 2225"
    • Bash Bunny Primer - Ha...
    ~-~~-~~~-~~-~
    ____________________________________________
    Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community - where all hackers belong.
  • НаукаНаука

Комментарии • 34

  • @LM-wi4dn
    @LM-wi4dn 9 лет назад +7

    All these words are just hitting me in the Face. Ms. Snubs, you continue to motivate me to continue learning new things. Especially Networking, which I have tried to avoid for so long. Thank you and keep up the great work.

  • @thetechfirm
    @thetechfirm 9 лет назад +1

    Great job folks. Love sharing your Wireshark videos with my subscribers

  • @barilocker297
    @barilocker297 3 дня назад

    super nice video (as away) tks Shannon!

  • @email16v
    @email16v 5 лет назад

    So much to learn still. Thanks!

  • @CyberiadPhoenix
    @CyberiadPhoenix 9 лет назад +1

    My college appears to have come under some sort of attack not that long ago as all of the IP addresses on the network were reading as having the same MAC address, which is not the normal network behaviour

  • @chuxxsss
    @chuxxsss 9 лет назад

    Shannon Morse what was that book you mentioned?

  • @zephyfoxy
    @zephyfoxy 6 лет назад +6

    I recognized the shellcode immediately. Pays to be a pentester in training.

  • @prasanthkumar6808
    @prasanthkumar6808 2 года назад

    Please mention the link of the wireshark file you analysed

  • @ChrisFromFloriduh
    @ChrisFromFloriduh 5 лет назад

    There is a good version of IE??

  • @dayshagreenawalt3964
    @dayshagreenawalt3964 Год назад

    hi i am hacked into and have dos attacks daily, these poeple get my cameas down then break in my home, trhis past weekend at 3am this was done and i heard them in my home and found my cat dead lying on the floor 2nd cat in 1 month dead like this out of nowhere when cameras are down from hackers, i can see th routers logs from the attacks of course how can i track who this is for proof of who it is? thanks

  • @burtpanzer
    @burtpanzer 2 года назад +1

    I'm guessing the explanation is far too lengthy and complex for me to expect an answer but, isn't our router or browser or the firewall supposed to block these kind of things? Now I have to do MS's job and learn to recognize and block malicious packets?

  • @troller4jesus
    @troller4jesus 9 лет назад +2

    what size green screen you use where can I get one

  • @paulmorrey733
    @paulmorrey733 5 лет назад

    Thanks

  • @jouananusralla9543
    @jouananusralla9543 5 лет назад

    thanks!

  • @youtuberocks8397
    @youtuberocks8397 6 лет назад +1

    Hi wow, thanks, I think my computer is being hacked quite often id like to know if Wireshark captures the hackers information so I have the evidence?

  • @andypratama100
    @andypratama100 2 года назад

    If our router get this attack, how we protect ourself from this kind attack?

  • @terryd.smithiimba9442
    @terryd.smithiimba9442 6 лет назад +4

    Port 80 is no longer normal.

  • @S.C.D.
    @S.C.D. 9 лет назад

    Only DoS attacks that just turn me into a bot cause I'm too lazy too automate. And feel I shouldn't have to.

  • @harjotsaini1038
    @harjotsaini1038 4 года назад +3

    i start loving cats 😂😂

  • @eakzit3181
    @eakzit3181 5 лет назад

    Unfortunatelly u can get even near any access with that windows shell :)

  • @clinsen8576
    @clinsen8576 3 года назад +1

    It is so entertaining to watch even tho i don't understand almost anything she says xD

  • @blackneos940
    @blackneos940 5 лет назад

    "Using a bad version of Internet Explorer."

    • @nickvandenberg4244
      @nickvandenberg4244 3 года назад +1

      "every IE version ever" ~ Full Stack Sofware, App, Web Developer

    • @blackneos940
      @blackneos940 3 года назад

      @@nickvandenberg4244 European name, Programmer... Name checks out. My only qualifier is that I has Autism. It sucks here in America right now.... But, you are correct about IE. It could have been so much more.

    • @nickvandenberg4244
      @nickvandenberg4244 3 года назад +1

      @@blackneos940 we know, hope Biden will fix the dipshit system and polarisation in the US, should use trias politica and destroy cancel culture I also do qualify for DSM-IV

    • @blackneos940
      @blackneos940 3 года назад

      @@nickvandenberg4244 Well, now it seems like Biden's son had business deals with China or something. But, worse than that, it seems the Program used to calculate the votes had "glitches/a glitch". I kinda' like Trump, but it would be a whole lot better if there wasn't so much shadiness with the possible glitches/glitch purposefully put into the Code, and if there was no question of fraud. Now the U.S. Supreme Court is involved with the allegations. Lovely. Meanwhile, people are getting beaten senselessly for either being Trump supporters or for some other reason. Mostly it seems to be ANTIFA, who claim to be against fascism. America is probably going to die off, due to all this division over politics. Oh, you said you might have Autism, right? What traits do you have? Mine are repetitive behavior, intense interest in something like Programming or video games, and fidgeting.

  • @I3uzzzzzz
    @I3uzzzzzz 3 года назад

    i'd let u ddos my life support machine