AFNOM NETWORKING
Useful Links/Resources
Tools
We're going to be doing some immersive labs as a warm up, then playing around with the chals below, and finally some CTF chals :)
JUST ASK
Challenges
We've written a few short simple challenges to do on your own computer, where you'll carry out some tasks while recording them in wireshark and take a look at what you find. There'll be some overlap with the immersive chals but don't worry, skip over any bits you don't feel like doing, it's just for fun :)
Each challenge comes with some resources for if you don't know how to get started, with maybe some helpful linux commands to use.
Challenge credit: neko3
0: Interfaces
On linux play around with the ip command (pro tip: use the magical -c option)
I want you to briefly take a look at the output, try to figure out what most of it means (if you don't know just ask, either someone else will know or you can figure it out together :)). I want you to work out what interface(s?) you're currently using for your m,ain connection to the internet.
Resources:
ip addrman ip- HowToGeek how to use ip command on Linux
Task 1: Wireshark
Turn on wireshark and start live recording whichever interface you think you're using for your connection. Throughout these chals I want you to take a look at what the commands you write look like ont he wire and it's really interesting!
hint: Wireshark will show a graph of which ones are in use and which aren't, use this. Also if you think you got the right one but can't see amy traffic, you didn't pick the right one.
1: DNS-1
Manually find the IP address of afnom.net and of wtctf.afnom.net. Take a look at the DNS traffic in wireshark and see if you can follow the flow of what happened, how you asked for the information and how you were answered.
Resources:
man nslookupman dig- Linux nslookup command
2: OS from PING
Now ping the IP address you retrieved for part 1. Look at this in wireshark, and see what packet types ping uses.
See if you can use a cool networking trick to work out what Operating System the afnom.net server is running.
Resources:
3: traceroute
traceroute is a command that uses ping to trace which route a packet will take to a destination. Use it to find the route to afnom.net and try to understand that.
Resources:
- check this out too: traceroute
4: HTTP vs HTTPS
In your browser visit http://example.com and https://example.com/ (one is http the other is https).
Look in wireshark and see how you can see the contents of plain HTTP but not the encrypted traffic that is HTTPS.
You can investigate the TLS handshake mechanism if you're interested by looking at the packets and comparing to: What Happens in a TLS Handshake?
5: DNS
By now you should have been generating loads of DNS traffic. filter for DNS, look back through your capture so far and see how much information it has / what weird services you can see your device connecting to.
6: SSH
See what SSH traffic looks like between you and tinky-winky
7: netstat
Play around with the netstat command on linux to explore what services your device is running right now (might explain some of the weird traffic you've been seeing)
2 good commands to try are:
sudo netstat -plntlist listening TCP servicessudo netstat -plantlist active TCP services
8: Tshark
There's a python library for reading and doing cool stuff with pcaps, super useful for CTFs
Try using it to solve the suspicious chal below :)
Other challenges
If you're done with the above challenges, or feel like having a go at more CTF-style challenges, then have a look at the AFNOM CTF instance as usual for our bank of challenges!
THE END
Happy hacking :)