DNS C2 Analysis: Detecting Data Exfiltration in HackTheBoo CTF 2022 🔍

Learn how to analyze DNS traffic in Wireshark to identify command and control (C2) channels and uncover data breaches in this HackTheBoo CTF 2022 challenge. Step-by-step walkthrough for effective detection!

DNS C2 Analysis: Detecting Data Exfiltration in HackTheBoo CTF 2022 🔍
0xdf
2.0K views • Nov 1, 2022
DNS C2 Analysis: Detecting Data Exfiltration in HackTheBoo CTF 2022 🔍

About this video

This challenge presents a PCAP with a bunch of DNS resolutions that is exfiling data. I'll start in Wireshark and identify what's happening, and then switch to tshark to pull out those requests, and with some bash foo convert them back into an .xslx file.

☕ Buy Me A Coffee: https://www.buymeacoffee.com/0xdf

[00:00] Introduction
[00:14] Opening PCAP, looking at Statistics ➡️ Conversations and Statistics ➡️ Protcol Hierarchy
[01:22] Looking at DNS queries, coming up with theory about DNS names
[01:41] Using tshark to pull out data
[04:00] Looking up file magic, seeing it's a zip file
[04:40] Using cut and xxd to get binary data
[06:02] Opening excel file with unzip and finding flag with grep
[07:04] Installing Libreoffice and looking at resulting file

Video Information

Views

2.0K

Likes

65

Duration

9:04

Published

Nov 1, 2022

User Reviews

4.5
(1)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.