2017-05-18 - TRAFFIC ANALYSIS EXERCISE - FANCY THAT
- Zip archive with a pcap of traffic from the infected computer: 2017-05-18-traffic-analysis-exercise.pcap.zip 2.2 MB (2,169,666 bytes)
- Zip archive with the two suspicous emails: 2017-05-18-traffic-analysis-exercise-emails.zip 222 kB (222,221 bytes)
All ZIP files on this site are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Roger Finster is a miserly old man, somewhat like Ebenezer Scrooge, only if Scrooge had never been visited by his Christmas ghosts. His favorite phrase when he's happy (a very rare occasion) is "Fancy that!"
Shown above: Roger's happy face.
Roger owns a business called Finster's Fine Jewelry. You've been hired to provide IT services and security support for his one-man shop. Today, you stop by Roger's office and hear him swearing at his computer. You think to yourself, "Well, fancy that!" Since Roger is an old man from a byegone era, his curse words consist of outdated phrases like "consarn it" and "dadburn contraption." Eventually, he tells you he's opened an email that he shouldn't have.
Shown above: Roger's angry face is similar to his happy face.
You quickly find two malicious emails that were sent to Roger's business account. You ask him which one he opened, but he can't rememeber. Well, fancy that! Now you must retrieve network traffic for that infection.
Shown above: According to Roger, "These emails all look the same to me!"
Now you have a pcap of traffic from Roger's infected computer, and you have the two malicious emails he received. Your task? Determine which email Roger infected his computer with. You should also figure out the actual malware that infected his computer. It'd also be nice if you did a proper incident report, just to practice.
- Click here for the answers.
Click here to return to the main page.