D. Burke

TechnoSavage

View on GitHub

tshark challenge 1: Teamwork

Q: What is the full URL of the malicious/suspicious domain address (defanged)?

tshark -r teamwork.pcap -Y "dns"

defanged domain

www[.]paypal[.]com4uswebappsresetaccountrecovery[.]timeseaways[.]com

Q: When was the URL of the malicious/suspicious domain address first submitted to VirusTotal?

2017-04-17 22:52:53 UTC

Q: Which known service was the domain trying to impersonate?

paypal

Q: What is the IP address of the malicious domain (defanged)?

184[.]154[.]127[.]226

Q: What is the email address that was used(defanged)?

tshark -r teamwork.pcap -Y 'ip.dst==184.154.127.226 && http.request.method=="POST"' -V

tshark -r teamwork.pcap -Y 'ip.dst==184.154.127.226 && http.request.method=="POST"' -V | grep @

johnny5alive[at]gmail[.]com