Forensic Challenge 2 - Browsers under attack
17 Feb 2010
Challenge 2 - browsers under attack - (provided by Nicolas Collery from the Singapore Chapter and Guillaume Arcas from the French Chapter) is to investigate a network attack but of a different kind.
Skill Level: Intermediate
The Challenge:
A network trace with attack data is provided. (Note that the IP address of the victim has been changed to hide the true location.) Analyze and answer the following questions:
- List the protocols found in the capture. What protocol do you think the attack is/are based on? (2pts)
- List IPs, hosts names / domain names. What can you tell about it - extrapolate? What to deduce from the setup? Does it look like real situations? (4pts)
- List all the web pages. List those visited containing suspect and possibly malicious javascript and who’s is connecting to it? Briefly describe the nature of the malicious web pages (6pts)
- Can you sketch an overview of the general actions performed by the attacker? (2pts)
- What steps are taken to slow the analysis down? (2pts)
- Provide the javascripts from the pages identified in the previous question. Decode/deobfuscate them too. (8pts)
- On the malicious URLs at what do you think the variable ’s’ refers to? List the differences. (2pts)
- Which operating system was targeted by the attacks? Which software? And which vulnerabilities? Could the attacks been prevented? (4pts)
- What actions does the shellcodes perform? Please list the shellcodes (+md5 of the binaries). What’s the difference between them? (8pts)
- Was there malware involved? What is the purpose of the malware(s)? (We are not looking for a detailed malware analysis for this challenge) (4pts)
Sample Solution:
Forensic Challenge 2010_-_Challenge_2_-_Solution.doc - Sha1: d60270743b8aea425bab74041b776d7fef36f0af
This work by Nicolas Collery and Guillaume Arcas is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.
The Winners (all tied for first place):
- Franck Guenichot (France) - Franck’s submission - Sha1: c7786cdf4a166b3051190d752b43aa1daf42ca70
- Mario Pascucci (Italy) - Mario’s subission - Sha1: f931b4e8295d804d8c6a1a17c14b0f0f13e8eba0
- Rani Hod (Israel) - Rani’s subission - Sha1: 8f0dc2cc5785e3e41d3db493338c34190f589e7b
- Vos (Russia)- Vos’s submission - Sha1: 988d675a83ab8a4d6487ef69b16b3cfd41d1c7d6
Attachment | Size |
---|---|
suspicious-time.pcap | 298.73 KB |
[your email]_Forensic Challenge 2010 - Challenge 2 - Submission Template.doc | 70 KB |
[your email]_Forensic Challenge 2010 - Challenge 2 - Submission Template.odt | 20.12 KB |
Franck_Guenichot_Forensic Challenge 2010_-_Challenge-2_-_Submission.pdf | 426.55 KB |
Mario_Pascucci_Forensic_Challenge_2010-Challenge-2_-_Submission.pdf | 217.22 KB |
Rani_Hod_Forensic Challenge 2010_-_Challenge-2_-_Submission.doc | 328 KB |
vos_Forensic Challenge 2010 - Challenge-2_-_Submission.doc | 229 KB |
Forensic Challenge 2010_-_Challenge_2_-_Solution.doc | 1.08 MB |