Network Navigator
MediumBackground
Security teams have detected suspicious network traffic originating from a corporate workstation. The traffic appears to be using a covert channel to exfiltrate sensitive data. Your task is to analyze the captured traffic and identify the method being used.
Objective
Using the provided packet capture:
- Identify the protocol being used for data exfiltration
- Find the destination of the exfiltrated data
- Decode the hidden message in the traffic
Tools Recommended
- Wireshark
- NetworkMiner
- tshark
Analysis Steps
- Examine the packet capture file
- Look for unusual patterns in:
- DNS queries
- HTTP headers
- Timing intervals
- Decode any suspicious data
- Document the exfiltration method
Notes
- All required data is contained within the packet capture
- Focus on anomalous traffic patterns
- Consider timing-based covert channels
Remember to document your analysis methodology and any tools used during the investigation.
Question 1: Identify the Exfiltration Method
What protocol is being used to exfiltrate data in the captured traffic?
Question 2: Data Destination
What is the IP address of the server receiving the exfiltrated data?
Question 3: Hidden Message
What is the decoded message being sent in the DNS queries?