Тёмный

Recover word document docx from Network Traffic using Wireshark | An investigation into Ann Bad AIM 

CyDig Cyber Security Digital Forensics Education
Подписаться 1,6 тыс.
Просмотров 4,6 тыс.
50% 1

Network Forensic
In this video, I am going to investigate network traffic activities within the PCAP files, using Wireshark.
The Scenario, I am going to use in this demonstration is Puzzle #1: Ann’s Bad AIM.
By the end of this video, you will learn how to decode the traffic, view data within the network traffic, and recover a word document (extract a word document docx) that has been sent via AOL messenger.
The scenario is available to read and download from the Forensic Contest website using the link below.
forensicscontest.com/2009/09/...
forensicscontest.com/contest01...
0:00 - Intro
1:28 - Case Scenario
3:04 - Your Task
3:38 - WireShark and PCAP file
4:15 - WireShark IP address filtering
5:05 - Analysis of the Traffic
6:05- Whois 64.12.24.50 AOL
7:20 - Decode Protocol to AIM
9:30 - Readable format
10:00 - What is the name of Ann’s IM buddy?
11:00 - What was the first comment in the captured IM conversation?
12:07 - What is the name of the file Ann transferred?
13:35 - Keyword search within PCAP WireShark
14:55 - Export the file from PCAP Network Traffic
18:00 - What is the secret recipe?
18:43 - What was the MD5sum and the magic number of the file?

Опубликовано:

 

24 июл 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 16   
@sergioquiroga5795
@sergioquiroga5795 13 дней назад
Thank you
@CyDig
@CyDig 6 дней назад
Welcome!
@solomonolojo3060
@solomonolojo3060 2 месяца назад
Great
@uzeirdalip9499
@uzeirdalip9499 4 месяца назад
Very well explained. Thank you very much.
@CyDig
@CyDig 4 месяца назад
Thanks for your helpful comment.
@LubinLegDisease
@LubinLegDisease Год назад
Best video on this puzzle by far
@CyDig
@CyDig Год назад
Thanks
@mattpras
@mattpras 13 дней назад
helpful
@CyDig
@CyDig 6 дней назад
Glad to hear that
@solomonolojo3060
@solomonolojo3060 2 месяца назад
Must i have a case scenario?
@CyDig
@CyDig 6 дней назад
forensicscontest.com/2009/09/25/puzzle-1-anns-bad-aim
@yourfavoritevln
@yourfavoritevln Год назад
I've followed the steps but the SSL doesn't change to aim, do you know why?
@CyDig
@CyDig Год назад
If the configuration that I have done in the video does not work. Try to make sure to change the Port Value to 443 and keep the field as TCP port and Current AIM.
@nawrasmrabet6065
@nawrasmrabet6065 Год назад
👍👍👍👍👍👍
@CyDig
@CyDig Год назад
Thanks
@Roxo_Vazio
@Roxo_Vazio 10 месяцев назад
thank god for you
Далее
СОБАКИ ГОЛОДАЮТ ИЗ-ЗА ЛЕРЫ 🥲
01:00
Stay on your way 🛤️✨
00:34
Просмотров 6 млн
Troubleshoot TLS Handshake Failures using Wireshark
31:33
Wireshark - Malware traffic Analysis
16:01
Просмотров 196 тыс.
How to Listen to Phone Calls in Wireshark
7:30
Просмотров 137 тыс.
Decrypting HTTPS on Windows in Wireshark
11:28
Просмотров 36 тыс.