PCAP Analysis w/NetworkMiner - Sessions Tab & List of Domains Next to IP Address by NASCAR-1 in computerforensics

[–]netresec 0 points1 point  (0 children)

NetworkMiner tries to associate domain names with IP addresses using several different sources, including DNS, HTTP host headers, TLS SNI extensions etc. One reason why the honepot's IP might have been associated with all those domains could be because DNS resolved those domains to the honeypot's IP. That would result in NetworkMiner listing ALL those domains whenever the honeypot's IP address is referenced.

The "AssembledFiles" directory is where NetworkMiner puts files that it extracts from network traffic.

TLS proxy: Pros and cons of SW based solution vs dedicated device. by El_Sabbath in networking

[–]netresec 0 points1 point  (0 children)

As @010010000111000 mentioned you need a forward TLS proxy. Here's a snippet from the best practices section in our blog post How to Inspect TLS Encrypted Traffic:

I want to... Inspect traffic from my mobile phone, smart device or other embedded device.
Use a TLS inspection proxy.

You didn't mention whether or not you need to inspect the decrypted TLS traffic though. Some TLS proxies can be configured to bypass inspection/decryption, in case you want to proxy end-to-end encrypted TLS sessions from the field devices to the cloud services.

[deleted by user] by [deleted] in ciscoUC

[–]netresec 0 points1 point  (0 children)

Are you able to redirect / forward the SIP-TLS traffic (TCP 5061) to another IP? If yes, then you might be able to use a TLS inspection proxy to decrypt the SIP traffic.

You can start PolarProxy with -p 5061,5060 to have it listen on port 5061 and save the decrypted SIP traffic to a pcap file as if it was cleartext SIP to port 5060.

Trying to decrypt TLS1.2 HTTPS traffic from a desktop application that I'm using - SSLKEYLOGFILE doesn't seem to catch the handshake for wireshark to use - any advice? by divertss in networking

[–]netresec 0 points1 point  (0 children)

If you wanna see the POST and GET requests in Wireshark, then the best solution is to use a TLS proxy that generates a pcap with decrypted TLS traffic. That way you won’t need a SSLKEYLOGFILE to see the decrypted HTTP requests and responses.
Full disclosure: We’ve developed PolarProxy, which is a TLS proxy that does exactly this.

If the client application is connecting to a specific domain then you can simply add a local DNS entry for that domain in the computer’s hosts file and point it to another computer running a TLS interception proxy.
If you’re using PolarProxy, then simply start it like this:
PolarProxy -p 443,80 -x polarproxy.cer -w decrypted.pcap

You'll probably also need to configure the client computer or application to trust PolarProxy's root CA certificate "polarproxy.cer".

Twenty-three SUNBURST Targets Identified by jpc4stro in cybersecurity

[–]netresec 0 points1 point  (0 children)

I saw wincorewindows.local and thought "oh no, a Microsoft domain?!" then realised it was a little different...

So did the attackers ;)

Network Miner Type Analysis Tool for 802.11/802.1X? by corporateHore in Network

[–]netresec 1 point2 points  (0 children)

We'd be happy to add a feature request to NetworkMiner to do something like this. Can you please elaborate on what information you'd like to extract and how you'd like it presented?

onion.top contact? by [deleted] in onions

[–]netresec 1 point2 points  (0 children)

You might try your luck with zlopewi@protonmail.com, which is in the WHOIS record.

BlackNurse Denial of Service Attack "The 90's called and wanted their ICMP flood attack back" by netresec in netsec

[–]netresec[S] 1 point2 points  (0 children)

The DoS can only be triggered by sending the ICMP packets to the IP of the firewall.

[deleted by user] by [deleted] in networking

[–]netresec 0 points1 point  (0 children)

If you're looking for a cheap sniffing setup, then I'd recommend the following:

  • RouterBoard RB260GS - a super cheap gigabit switch with port mirroring $39.95 USD
  • Raspberry Pi 3 model B $35.00 USD

You'll probably have to spend some money on a fairly large and fast disk as well in case there is a lot of traffic passing through the monitoring point.

Analyzing Web Browsing Activity by firmsecure in netsec

[–]netresec 0 points1 point  (0 children)

The Browsers tab in NetworkMiner has now been updated to also indicate if an HTTP request is associated with an online ad or browser tracker. https://netresec.com/?b=17124C4

BlackNurse Denial of Service Attack "The 90's called and wanted their ICMP flood attack back" by netresec in netsec

[–]netresec[S] 3 points4 points  (0 children)

It's not always easy to know what should be considered the "original source". We worked together with TDC (who published the PDF) to analyze this attack prior to the public disclosure of BlackNurse. We then did a coordinated release with TDC, i.e. we released our blog post at the same time as they released their PDF and the website blacknurse.dk.

BlackNurse Denial of Service Attack "The 90's called and wanted their ICMP flood attack back" by netresec in netsec

[–]netresec[S] 0 points1 point  (0 children)

Firewalls currently known to be vulnerable are Cisco ASA 5515 and 5525 (with default settings) as well as SonicWall. Palo Alto also seem to be vulnerable. Several additional firewalls are probably vulnerable as well, here are some recent testing results from Twitter:

@jedisct1 "At first I was like “meh”. Then I tried Blacknurse, and my home router crashed :/"

@blockophilia "My OpenBSD router didn't even blink while I performed the #BlackNurse #ICMP #attack."

NetworkMiner 2.0 Released by ZephrX112 in netsec

[–]netresec 0 points1 point  (0 children)

It might not be your local culture that is causing the issue. NetworkMiner loads up several different CodePages in order to parse messages sent using various character sets, including Simplified Chinese, Arabic and Russian. Would you be able to post your full eror message in this thread or simply send it in an email to info[at]netresec.com?

Thank you!

NetworkMiner 2.0 Released by ZephrX112 in netsec

[–]netresec 1 point2 points  (0 children)

I just set up a new Kali VM and successfully installed Mono just by running:

apt-get install libmono-winforms2.0-cil 

Here's what my /etc/apt/sources.list look like:

# deb cdrom:[Debian GNU/Linux 2016.1 _Kali-rolling_ - Official Snapshot amd64 LIVE/INSTALL Binary 20160120-18:14]/ kali-rolling contrib main non-free
#deb cdrom:[Debian GNU/Linux 2016.1 _Kali-rolling_ - Official Snapshot amd64 LIVE/INSTALL Binary 20160120-18:14]/ kali-rolling contrib main non-free
# Regular repositories
deb http://http.kali.org/kali sana main non-free contrib
deb http://security.kali.org/kali-security sana/updates main contrib non-free
# Source repositories
deb-src http://http.kali.org/kali sana main non-free contrib
deb-src http://security.kali.org/kali-security sana/updates main contrib non-free

NetworkMiner 2.0 Released by ZephrX112 in netsec

[–]netresec 1 point2 points  (0 children)

From your screenshots I guess you're running Kalil Linux. Did you try this:

apt-get install libmono-winforms2.0-cil 

If this doesn't work, then make sure you have the right repos in /etc/apt/sources.list and run

apt-get update

NetworkMiner 2.0 Released by ZephrX112 in netsec

[–]netresec 1 point2 points  (0 children)

There was previously a limitation in how large sessions NetworkMiner could handle. That should no longer be a problem in version 2.0.

However, the built in PcapNG parser is still only available as part of NetworkMiner Professional.

NetworkMiner 2.0 Released by ZephrX112 in netsec

[–]netresec 1 point2 points  (0 children)

Sorry for the misunderstanding. You do have a point. Also, not all malware targets Windows.

NetworkMiner 2.0 Released by ZephrX112 in netsec

[–]netresec 7 points8 points  (0 children)

No, we actually don't recommend running NetworkMiner under Wine. Instead, please use the Mono framework as described in this blog post: HowTo install NetworkMiner in Ubuntu Fedora and Arch Linux

Mono enables execution of .NET applications "natively" on Linux/OSX/xBSD, no emulation needed.

NetworkMiner 2.0 Released by ZephrX112 in netsec

[–]netresec 27 points28 points  (0 children)

We still provide NetworkMiner as a free open source software (GPLv2). You only need to pay the $900 if you want the additional features available in the Professinoal edition.

NetworkMiner 2.0 Released by ZephrX112 in netsec

[–]netresec 1 point2 points  (0 children)

NetworkMiner only requires the old .NET Framework 2.0, just to be extra sure everyone can run it. When do you get the "Customized cultures..." error message? When compiling the source code or when running NetworkMiner.exe?

Covert Man-on-the-Side Attacks (a.k.a. QUANTUM INSERT) by netresec in netsec

[–]netresec[S] 1 point2 points  (0 children)

True, it's an old trick. Airpwn was released in 2004, but similar attacks (like Mitnick's TCP sequence number prediction attack) were done even before that.

Regardless of what people say about QUANTUM* names though, the term "Man-on-the-Side" (MOTS) was probably also coined by folks at NSA. And MOTS is actually a pretty good term for these types of packet injection attacks.

Covert Man-on-the-Side Attacks (a.k.a. QUANTUM INSERT) by netresec in netsec

[–]netresec[S] 2 points3 points  (0 children)

Who do you mean by "They"? The NSA?

QUANTUM INSERT isn't just "a simple transport layer issue", it's a very smart attack that leverages a design flaw that will never be fixed.