You are working as a Security Engineer for X-CORP, supporting the SOC infrastructure. The SOC analysts have noticed some discrepancies with alerting in the Kibana system and the manager has asked the Security Engineering team to investigate.
You will monitor live traffic on the wire to detect any abnormalities that aren't reflected in the alerting system. You are to report back all your findings to both the SOC manager and the Engineering Manager with appropriate analysis.
The Security team requested this analysis because they have evidence that people are misusing the network. Specifically, they've received tips about:
- "Time thieves" spotted watching YouTube during work hours.
- At least one Windows host infected with a virus.
- Illegal downloads.
A number of machines from foreign subnets are sending traffic to this network. Your task is to collect evidence confirming the Security team's intelligence.
At least two users on the network have been wasting time on YouTube. Usually, IT wouldn't pay much mind to this behavior, but it seems these people have created their own web server on the corporate network. So far, Security knows the following about these time thieves:
- They have set up an Active Directory network.
- They are constantly watching videos on YouTube.
- Their IP addresses are somewhere in the range
10.6.12.0/24.
Following Wireshark Filters were Used:
- Domain of the custom site:
ip.addr == 10.6.12.0/24 - Traffic Inspection:
ip.addr == 10.6.12.12 - Other Traffic Inspection:
ip.addr == 10.6.12.203 - Malware Name:
ip.addr == 10.6.12.203 and http.request.method == GET
You must inspect your traffic capture to answer the following questions:
- What is the domain name of the users' custom site?
- What is the IP address of the Domain Controller (DC) of the AD network?
- What is the name of the malware downloaded to the
10.6.12.203machine? - Upload the file to VirusTotal.com.
- Exporting file to
Kali:- Open File Tab
- Export Objects
- Select HTTP
- Filter “*.dll”
- Save june.dll
- Upload to VirusTotal.com
- Exporting file to
- What kind of malware is this classified as?
The Security team received reports of an infected Windows host on the network. They know the following:
- Machines in the network live in the range
172.16.4.0/24. - The domain mind-hammer.net is associated with the infected computer.
- The DC for this network lives at
172.16.4.4and is named Mind-Hammer-DC. - The network has standard gateway and broadcast addresses.
Following Wireshark Filters were Used:
- Host Name, IP Address, MAC Address:
ip.addr == 172.16.4.0/24 - Traffic Inspection:
ip.src == 172.16.4.4 && kerberos.CNameString - Username:
ip.src == 172.16.4.205 && kerberos.CNameString - Malicious Traffic:
ip.addr == 172.16.4.205 && ip.addr == 185.243.115.84
Inspect your traffic to answer the following questions in your network report:
- Find the following information about the infected Windows machine:
- What is the username of the Windows user whose computer is infected?
- What are the IP addresses used in the actual infection traffic?
- As a bonus, retrieve the desktop background of the Windows host.

IT was informed that some users are torrenting on the network. The Security team does not forbid the use of torrents for legitimate purposes, such as downloading operating systems. However, they have a strict policy against copyright infringement.
IT shared the following about the torrent activity:
- The machines using torrents live in the range
10.0.0.0/24and are clients of an AD domain. - The DC of this domain lives at
10.0.0.2and is named DogOfTheYear-DC. - The DC is associated with the domain dogoftheyear.net.
Following Wireshark Filters were Used:
- MAC Address:
ip.addr == 10.0.0.201 && dhcp - Username:
ip.src == 10.0.0.201 && kerberos.CNameString - Operating System:
ip.addr == 10.0.0.201 && http.request - Torrent Download:
ip.addr == 10.0.0.201 && http.request.method == "GET"
Your task is to isolate torrent traffic and answer the following questions in your Network Report:
- Find the following information about the machine with IP address
10.0.0.201:- MAC address:
00:16:17:18:66:c8 - Windows username:
elmer.blanco - OS version:
BLANCO-DESKTOP Windows NT 10.0 - Wireshark Filter for MAC Address:
ip.addr == 10.0.0.201 && dhcp - Wireshark Filter for Username:
ip.addr == 10.0.0.201 && kerberos.CNameString
- Wireshark Filter for OS Type and Version:
ip.addr == 10.0.0.201 && http.request
- MAC address:
- Which torrent file did the user download?
- There were few that were downloaded, but below clip was show with the name:
- Betty_Boop_Rhythm_on_the_Reservation.avi.torrent
- Wireshark Filter:
ip.addr == 10.0.0.201 && http.request.method == "GET" - Finding the torrent:
- Apply the Wireshark Filter above.
- Sort the packets by the Destination files.publicdomaintorrents.com (
168.215.194.14). - Look for Download requests.
Movie Downloaded was Betty Boop Rhythm on the Reservation.avi

- Wireshark Filter:
હરે કૃષ્ણ હરે કૃષ્ણ, કૃષ્ણ કૃષ્ણ હરે હરે | Hare Krishna Hare Krishna, Krishna Krishna Hare Hare |
હરે રામ હરે રામ, રામ રામ હરે હરે || Hare Ram Hare Ram, Ram Ram Hare Hare ||

