Тёмный

Wireshark and Recognizing Exploits, HakTip 138 

Hak5
Подписаться 935 тыс.
Просмотров 85 тыс.
50% 1

Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:
____________________________________________
This week on HakTip, Shannon pinpoints an exploitation using Wireshark.
Working on the shoulders of last week's episode, this week we'll discuss what exploits look like in Wireshark. The example I'm sharing is from Practical Packet Analysis, a book by Chris Sanders about Wireshark.
Our example packet shows what happens when a user visits a malicious site using a bad version of IE. This is called spear phishing. First, we have HTTP traffic on port 80. We notice there is a 302 moved response from the malicious site and the location is all sorts of weird. Then a bunch of data gets transferred from the new site to the user. Click Follow TCP Stream. If you scroll down, you see some weird gibberish that doesn't make sense and an iframe script. In this case, it's the exploit being sent to the user.
Scroll down to packet 21 and take a look at the .gif GET request. Lastly, Follow packet 25's TCP Stream. This shows us a windows command shell, and the attacker gaining admin priveledges to view our user's files. FREAKY. But now a network admin could use their intrusion detection system to set up a new alarm whenever an attack of this nature is seen.
If someone is trying to do a MITM attack on a user, it might look like our next example packet. 54 and 55 are just ARP packets being sent back and forth, but in packet 56 the attacker sends another ARP packet with a different MAC address for the router, thereby sending the user's data to the attacker then to the router. Compare 57 to 40, and you see the same IP address, but different macs for the destination. This is ARP cache Poisoning.
Let me know what you think. Send me a comment below or email us at tips@hak5.org. And be sure to check out our sister show, Hak5 for more great stuff just like this. I'll be there, reminding you to trust your technolust.
~-~~-~~~-~~-~
Please watch: "Bash Bunny Primer - Hak5 2225"
• Bash Bunny Primer - Ha...
~-~~-~~~-~~-~
____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community - where all hackers belong.

Опубликовано:

 

6 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 34   
@LM-wi4dn
@LM-wi4dn 9 лет назад
All these words are just hitting me in the Face. Ms. Snubs, you continue to motivate me to continue learning new things. Especially Networking, which I have tried to avoid for so long. Thank you and keep up the great work.
@N3st0r_Jh0ns0n
@N3st0r_Jh0ns0n 3 месяца назад
super nice video (as away) tks Shannon!
@thetechfirm
@thetechfirm 9 лет назад
Great job folks. Love sharing your Wireshark videos with my subscribers
@CyberiadPhoenix
@CyberiadPhoenix 9 лет назад
My college appears to have come under some sort of attack not that long ago as all of the IP addresses on the network were reading as having the same MAC address, which is not the normal network behaviour
@zephyfoxy
@zephyfoxy 6 лет назад
I recognized the shellcode immediately. Pays to be a pentester in training.
@email16v
@email16v 5 лет назад
So much to learn still. Thanks!
@burtpanzer
@burtpanzer 2 года назад
I'm guessing the explanation is far too lengthy and complex for me to expect an answer but, isn't our router or browser or the firewall supposed to block these kind of things? Now I have to do MS's job and learn to recognize and block malicious packets?
@dayshagreenawalt3964
@dayshagreenawalt3964 2 года назад
hi i am hacked into and have dos attacks daily, these poeple get my cameas down then break in my home, trhis past weekend at 3am this was done and i heard them in my home and found my cat dead lying on the floor 2nd cat in 1 month dead like this out of nowhere when cameras are down from hackers, i can see th routers logs from the attacks of course how can i track who this is for proof of who it is? thanks
@clinsen8576
@clinsen8576 3 года назад
It is so entertaining to watch even tho i don't understand almost anything she says xD
@andypratama100
@andypratama100 2 года назад
If our router get this attack, how we protect ourself from this kind attack?
@prasanthkumar6808
@prasanthkumar6808 2 года назад
Please mention the link of the wireshark file you analysed
@paulmorrey733
@paulmorrey733 5 лет назад
Thanks
@terryd.smithiimba9442
@terryd.smithiimba9442 6 лет назад
Port 80 is no longer normal.
@S.C.D.
@S.C.D. 9 лет назад
Only DoS attacks that just turn me into a bot cause I'm too lazy too automate. And feel I shouldn't have to.
@jouananusralla9543
@jouananusralla9543 5 лет назад
thanks!
@troller4jesus
@troller4jesus 9 лет назад
what size green screen you use where can I get one
@tacticalkyuubi8147
@tacticalkyuubi8147 4 года назад
Green paint on a wall or Amazon
@youtuberocks8397
@youtuberocks8397 6 лет назад
Hi wow, thanks, I think my computer is being hacked quite often id like to know if Wireshark captures the hackers information so I have the evidence?
@harjotsaini1038
@harjotsaini1038 4 года назад
i start loving cats 😂😂
@chuxxsss
@chuxxsss 9 лет назад
Shannon Morse what was that book you mentioned?
@eakzit3181
@eakzit3181 5 лет назад
Unfortunatelly u can get even near any access with that windows shell :)
@ChrisFromFloriduh
@ChrisFromFloriduh 5 лет назад
There is a good version of IE??
@blackneos940
@blackneos940 5 лет назад
"Using a bad version of Internet Explorer."
@nickvandenberg4244
@nickvandenberg4244 3 года назад
"every IE version ever" ~ Full Stack Sofware, App, Web Developer
@blackneos940
@blackneos940 3 года назад
@@nickvandenberg4244 European name, Programmer... Name checks out. My only qualifier is that I has Autism. It sucks here in America right now.... But, you are correct about IE. It could have been so much more.
@nickvandenberg4244
@nickvandenberg4244 3 года назад
@@blackneos940 we know, hope Biden will fix the dipshit system and polarisation in the US, should use trias politica and destroy cancel culture I also do qualify for DSM-IV
@blackneos940
@blackneos940 3 года назад
@@nickvandenberg4244 Well, now it seems like Biden's son had business deals with China or something. But, worse than that, it seems the Program used to calculate the votes had "glitches/a glitch". I kinda' like Trump, but it would be a whole lot better if there wasn't so much shadiness with the possible glitches/glitch purposefully put into the Code, and if there was no question of fraud. Now the U.S. Supreme Court is involved with the allegations. Lovely. Meanwhile, people are getting beaten senselessly for either being Trump supporters or for some other reason. Mostly it seems to be ANTIFA, who claim to be against fascism. America is probably going to die off, due to all this division over politics. Oh, you said you might have Autism, right? What traits do you have? Mine are repetitive behavior, intense interest in something like Programming or video games, and fidgeting.
@I3uzzzzzz
@I3uzzzzzz 3 года назад
i'd let u ddos my life support machine
Далее
Identifying Open Ports in Wireshark, HakTip 137
7:06
A Minecraft Movie | Teaser
01:20
Просмотров 27 млн
Wireshark 101: TCP Streams and Objects, HakTip 120
8:11
Observing a TCP conversation in Wireshark
6:49
Просмотров 109 тыс.
Learn Network Attacks Using Wireshark
10:07
Просмотров 49 тыс.
Wireshark - Malware traffic Analysis
16:01
Просмотров 198 тыс.
Analyzing DNS with Wireshark
4:52
Просмотров 154 тыс.
Wireshark 101: How to Wireshark, Haktip 115
10:41
Просмотров 172 тыс.