Network Forensics Puzzle Contest
One of the friends of the Internet Storm Center, Johnathan Ham, put out a nice Network Forensics Puzzle Contest. Check it out below.
The answers can be sent to the email listed below. (Don't sent them into the Internet Storm Center. It's not our contest!)
Good luck!
*Prizewinner to be announced at Sec558 "Network Forensics" in San Diego, 9/16-9/18.
Anarchy-R-Us, Inc. suspects that one of their employees, Ann Dercover, is really a secret agent working for their competitor. Ann has access to the company's prize asset, the secret recipe. Security staff are worried that Ann may try to leak the company's secret recipe.
Security staff have been monitoring Ann's activity for some time, but haven't found anything suspicious-- until now. Today an unexpected laptop briefly appeared on the company wireless network. Staff hypothesize it may have been someone in the parking lot, because no strangers were seen in the building. Ann's computer, (192.168.1.158) sent IMs over the wireless network to this computer. The rogue laptop disappeared shortly thereafter.
"We have a packet capture of the activity," said security staff, "but we can't figure out what's going on. Can you help?"
You are the forensic investigator. Your mission is to figure out who Ann was IM-ing, what she sent, and recover evidence including:
1. What is the name of Ann's IM buddy?
2. What was the first comment in the captured IM conversation?
3. What is the name of the file Ann transferred?
4. What is the magic number of the file you want to extract (first four bytes)?
5. What was the MD5sum of the file?
6. What is the secret recipe?
Here is your evidence file:
http://jhamcorp.com/contest_01/evidence.pcap
MD5 (evidence.pcap) = d187d77e18c84f6d72f5845edca833f5
The MOST ELEGANT solution wins. In the event of a tie, the entry submitted first will receive the prize. Scripting is always encouraged. All responses should be submitted as plain text files.
Exceptional solutions may be incorporated into the SANS Network Forensics Toolkit. Authors agree that their code submissions will be freely published under the GPL license, in order to further the state of network forensics knowledge. Exceptional submissions may also be used as examples and tools in the Network Forensics class. All authors will receive full credit for their work.
Email submissions to contest@jhamcorp.com. Deadline for submissions is 9/10. Good luck!!
UPDATE: We usually don't update these older diaries, however, since so many submissions/email has been sent about this, I thought I'd update it. The results are in, and posted here. http://forensicscontest.com/
-- Joel Esler | http://www.joelesler.net | http://twitter.com/joelesler
Vulnerability in Pidgin, patch!
Time for your daily patch.
CORE security technologies published a vulnerability in libpurple. Libpurple is the backend frame work to many Instant Messenger clients.
Pidgin, Finch, Adium, Meebo, and Gaim among others. Although CORE only specifically mentions GAIM, Libpurple, Pidgin, and Adium specifically, the other libpurple based ones may be vulnerable as well.
Versions of Libpurple <= 2.5.8 (Pidgin <=2.5.8 and Adium <=1.3.5) are vulnerable. The vulnerability is an exploit in the function msn_slplink_process_msg() which handles instant messages from the MSN network.
All it takes to exploit this vulnerability is to receive a message from another MSN user. They do not have to be on your buddy list. Unless your buddy list states that you only allow specific users to contact you, it's the only mitigation step. (Other than patching or logging off of the MSN network.)
Solution:
Upgrade to a version of your respective IM client that is based off of pidgin. Non vulnerable versions of Libpurple are >=2.5.9.
-- Joel Esler | http://blog.joelesler.net | http://twitter.com/joelesler
Comments
www
Nov 17th 2022
6 months ago
EEW
Nov 17th 2022
6 months ago
qwq
Nov 17th 2022
6 months ago
mashood
Nov 17th 2022
6 months ago
isc.sans.edu
Nov 23rd 2022
6 months ago
isc.sans.edu
Nov 23rd 2022
6 months ago
isc.sans.edu
Dec 3rd 2022
5 months ago
isc.sans.edu
Dec 3rd 2022
5 months ago
<a hreaf="https://technolytical.com/">the social network</a> is described as follows because they respect your privacy and keep your data secure. The social networks are not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go.
<a hreaf="https://technolytical.com/">the social network</a> is not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go. The social networks only collect the minimum amount of information required for the service that they provide. Your personal information is kept private, and is never shared with other companies without your permission
isc.sans.edu
Dec 26th 2022
5 months ago
isc.sans.edu
Dec 26th 2022
5 months ago