Skip to content

Wireshark Phishing

Wireshark Phishing Tolkien Ring Sparkle Redberry

Objective : Use the Wireshark Phishing terminal in the Tolkien Ring to solve the mysteries around the suspicious PCAP. Get hints for this challenge by typing hint in the upper panel of the terminal.

A picture containing graphical user interface

Description automatically generated

Graphical user interface, text

Description automatically generated

PCAP file :
https://storage.googleapis.com/hhc22_player_assets/suspicious.pcap

We type "yes" on the terminal and that prompts a series of questions.

Text

Description automatically generated

Text

Description automatically generated

Question 1 : There are objects in the PCAP file that can be exported by Wireshark and/or tshark. What kind of objects can be exported from this PCAP

Answer : http

Open the suspicious.pcap in Wireshark and go to File > Export Object. We choose every option there and see exportable items in the list only when we select HTTP

Graphical user interface, application

Description automatically generated

Graphical user interface, text, application

Description automatically generated

Question 2 : What is the file name of the largest file we can export?

Answer : app.php

Open the exportable objects by clicking on File > Export Objects > HTTP.

Sort the objects by clicking the Size column in descending order. app.php is of largest file (808 KB)

Graphical user interface, text, application

Description automatically generated

Question 3: What packet number starts that app.php file?

Answer: 687

In the Wireshark exportable objects under HTTP, app.php shows to start from packet number 687

Graphical user interface, text, application

Description automatically generated

Question 4: What is the IP address of the Apache server?

Answer: 192.185.57.242

Added a new column named with "http.server" to show the server name and put the below filter http && http.server=="Apache"

Graphical user interface, text, application

Description automatically generated

 

Text

Description automatically generated with low confidence

Question 5: What file is saved to the infected host?

Answer : Ref_Sept24-2020.zip

Save the app.php from the exportable HTTP objects.
Examine the file in a text editor and around line number 68, Ref_Sept24-2020.zip is being saved to local host.

Save the app.php from the exportable HTTP objects.

file in a text editor and around line number 68, Ref_Sept24-2020.zip is being saved to local host.

 

Question 6: Attackers used bad TLS certificates in this traffic. Which countries were they registered to? Submit the names of the countries in alphabetical order separated by a comma (Ex: Norway, South Korea).

Answer : Israel, South Sudan

The challenge provides a URL as a hint. This has the filters for TLS traffic in the Wireshark pcap file.

Filtering with ssl.handshake.type == 11, below would get us the certificates sent.

For the selected packet we can look the certificate section and get the country code of the issuer.

Looking at all the available packets, we get the following country codes : IL,SS where the certificates are not valid
Get the names for the code and arranging them alphabetically: Israel, South Sudan

For the selected packet we can look the certificate section and get the country code of the issuer.

Question 7 : is the host infected (Yes/No)?

Answer : Yes

We know the file Ref_Sept24-2020.zip is being saved via app.php. So first we take a look at the zip file.
We rename the app.php to app.html because its all javascript and simply open it in a browser and that downloads the Ref_Sept24-2020.zip.

We unzip the file and see a file named "Ref_Sept24-2020.scr" in it.

Calculate the MD5 hash of the file..

Submitting that MD5 hash to the Virustotal shows 45 security vendors and 4 sandboxes flagged this file as malicious.
Therefore, based on this, the host was indeed infected.

The objective is now completed, and we get 5 coins as well.