Checklist for Analysing
- Checks to do
- Packet statistics
- Service identification
- IP reputation check
- Questions to answer
- Which IP addresses are in use?
- Has a suspicious IP address been detected?
- Has suspicious port usage been detected?
- Which port numbers and services are in use?
- Is there an abnormal level of traffic on any port or service?
Reference[^1]
How Analyse Captured Traffic
Preparation and Research
- View the overall usage of the ports and services
- “Statistics –> Protocol Hierarchy”
- View the list of IP conversations, to find
- “Statistics –> Conversations”
- On the TCP/UDP Tap from Conversations you can see the Ports used
- Now you have the following informations
- Source and destination IP addresses
- Protocols
- Port numbers
- Services
Starting to Filter
- Looking at the DNS Traffic is always a good way to start
- Export Transmitted Files
- File -> Export Objects -> HTTP
- Checks to do
- Shared files
- File hashes (SHA256)
- Hash reputation check
- Questions to answer
- What are shared files?
- Does the hash reputation marked as suspicious or malicious?
- Which domain hosts the suspicious/malicious file?
enable TLS decryption
- Edit > Preferences > Protocols > SSL (or TLS if present) > (Pre)-Master-Secret log filename.
filter examples
## Filter by IP/MAC
ip.addr == x.x.x.x
ip.src == x.x.x.x
ip.dest == x.x.x.x && ip.src == x.x.x.x
## Filter by mac
eth.addr == x.x.x.x
## filter by port
dst port 135 and tcp port 135
# find http packages with data
http && (media || data-text-lines
References