Wireshark investigation: Wireshark Strikes Back


In this investigation I am acting as a Security Engineer for mock company called X-CORP, supporting the SOC infrastructure. During this investigation we will be going through several mini investigations Time Thieves, Vulnerable Windows Machine, Illegal Downloads. I encourage you to investigate your self. By following along by filling out this document as you progress through the investigation:


The SOC analysts at X-CORP have noticed some discrepancies with alerting in the Kibana system and the manager has asked the Security Engineering team to investigate.

Yesterday, your team confirmed that newly created alerts are working. Today, you will monitor live traffic on the wire to detect any abnormalities that aren’t reflected in the alerting system.

You are to report back all your findings to both the SOC manager and the Engineering Manager with appropriate analysis.


If you wish to follow along you will need to use a Kali VM to analyze live traffic on the wire.

In order to get started, you will need to:

  • Start up your Kali VM.
  • Download the PCAP file directly from this link .
  • Alternatively you can use curl to download the file with this alternate URL: http://tinyurl.com/yaajh8o8.

Curl download example: curl -L -o pcap.pcap http://tinyurl.com/yaajh8o8

  • Launch Wireshark and go to the file option and select open navigate to find your downloaded PCAP file .

Note: You will be dealing with live malware in this investigation. Please make sure all work is done in your VM.

Time Thieves:

At least two users on the network have been wasting time on YouTube. Usually, IT wouldn’t pay much mind to this behavior, but it seems these people have created their own web server on the corporate network. So far, Security knows the following about these time thieves:

  • They have set up an Active Directory network.
  • They are constantly watching videos on YouTube.
  • Their IP addresses are somewhere in the range

In this section are goal is to inspect the captured traffic to answer the following questions:

  1. What is the domain name of the users’ custom site?
  2. What is the IP address of the Domain Controller (DC) of the AD network?
  3. What is the name of the file downloaded to the machine? Once you have found the file, export it to your Kali machine’s desktop.
  4. Upload the file to VirusTotal.com. To see if its some possible malware and which type it is classified as.

For the first question lets filter for the


We can take a look at the the packet list panel in Wireshark and see the DNS requests. lets click on it and under the packet details pane. We and see that the domain name of the users custom site is frank-n-ted.com

Now to answer the next question of what is the IP address of the Domain Controller (DC) of the AD network. We need to look under the details panel so we can see the IP address associated with the Domain Controller which is: (Frank-n-Ted-DC.frank-n-ted.com)

Next to answer the question in regards to the downloaded malware. Let filter for GET requests. So we can find the malware that was downloaded to the machine:

ip.addr== and http.request.method==GET

lets export the file for further analysis click: File > Export Objects > HTTP > june11.dll

Lets upload the file to virus total and see what comes up!

Looks like are file turned out to be a Trojan. That's pretty bad as the user of the machine is most likely infected with the trojan horse malware.

Vulnerable Windows Machines:

Additionally the Security team received reports of an infected Windows host on the network. They currently know the following:

  • Machines in the network live in the range
  • The domain mind-hammer.net is associated with the infected computer.
  • The DC for this network lives at and is named Mind-Hammer-DC.
  • The network has standard gateway and broadcast addresses.

In this section we are going to answer the following questions:

  1. Find the following information about the infected Windows machine:
  • Host name: ROTTERDAM-PC
  • IP address:
  • MAC address: (00:59:07:b0:63:a4)

2. What is the username of the Windows user whose computer is infected?

3. What are the IP addresses used in the actual infection traffic?

4. As a bonus, retrieve the desktop background of the Windows host.

For the first question lets filter for Kerberos network traffic. To find a possible sign on with the mind-hammer.net domain. Which will give us access to Host Names, IP address, MAC address we need to complete the question. And we are luckily able to extract this information because the Kerberos protocol is mostly unencrypted except for the tickets, authenticators, and some other sensitive details

For the hostname of the infected windows machine we need to look for the cname-string which contains the user name being authenticated so lets filter for it.

Filter: ip.src== and kerberos.CNameString

Click on the packet number 3209 and move on to details pane and Kerberos > tgs-rep > cname:

Lets add the CNameString as a column for future reference sake:

Now to find the IP address of the infected machine its pretty simple it’s just the destination IP Address:

Now lets find the MAC Address under Ethernet II we see the MAC Address clear as day:

Now for question 2, we are going to use the same Kerberos filter as used previous. But since we saved the CNameString as a column we don’t have to retype it in. Our answer for question 2 is matthijs.devries

Now lets move on to the question of what IP addresses used in the actual infection traffic? Let go to the statistics option in Wireshark

Statistics > Conversations > IPv4 (tab) > Packets (high to low)

Based on the Conversations statistics and then filtering by the highest amount packets between IPs,, that's pretty suspicious lets investigate a bit more.

Lets filter for and And lets see what pops up.

Filter: ip.addr== and ip.addr==

Now the result of our filter, it can be seen that their is a the frequent amount of POST requests of empty.gif being sent out without any originating GET request that pretty suspicious!

If you follow the HTTP stream of one of the frequent amount of POST requests being sent without any originating GET request. You see that it
references to (b569023.green.mattingsolutions.co). Which is flagged as Malicious and Malware by some security vendors.

All these red flag strongly lean towards, being the infected traffic.

Illegal Downloads:

IT was informed that some users are torrenting on the network. The Security team does not forbid the use of torrents for legitimate purposes, such as downloading operating systems. However, they have a strict policy against copyright infringement.

IT shared the following about the torrent activity:

  • The machines using torrents live in the range and are clients of an AD domain.
  • The DC of this domain lives at and is named DogOfTheYear-DC.
  • The DC is associated with the domain dogoftheyear.net.

Various isolate torrent traffic and answer the following questions:

  1. Find the following information about the machine with IP address
  • MAC address: 00:16:17:18:66:c8
  • Windows username: elmer.blanco

2. Which torrent file did the user download?

To answer the first questions lets filter for CNameString with the IP address provided to us.

Filter: ip.src== and kerberos.CNameString

In one swoop we obtained both MAC address, Windows username, and Host Name, Now we got our answers for question one.

Now for question 2 we can use a more somewhat complex Wireshark filter:

Filter: ip.addr== and http.request.method==GET and http.request.uri contains “.torrent”

This filter filters for the IP address of And filters for GET requests methods associated with it. Which Contains requests Uri's that include the text “.torrent”

We are presented with a file called : Betty_Boop_Rythm_on_the_Reservation.avi.torrent the illegal download




Cybersecurity Professional and Tech Enthusiast

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Spy on your Ethereum node events

Anatomy of DDoS attacks

{UPDATE} Queen Of Castle Hack Free Resources Generator

How to fix a surge of “your connection is not private” browser/Chrome errors that began in October…

A cloud of error messages saying “Your connection is not private”

Inter University CTF Competition Organized By University of Colombo School Of Computing

5 Terrifying REST API security issues you need to destroy now

Buying guide for Backup Solutions

Powershell alphanumeric shellcode injector with Social-Engineering Toolkit

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


Cybersecurity Professional and Tech Enthusiast

More from Medium

Mastering Ethereum — What is Ethereum ? [Chapter 1]

Kaira Network

Switching IPv4 to IPv6 Implementation

CIS Controls v8 Overview- Control 04