1. From the wireshark statistics menu, check capture file properties and protocol hierarchy.
2. Filter with data or http keyword (for ftp filter: ftp-data) to see what data are exchanged. You may find http POST request here. If you find POST request then do follow tcp or http stream to see what is being requested by the attacker and what reply came from the victim. Red color are request and blue color are response.
3. If you see 4444 port then there is a chance attacker use metasploit to create reverse shell.
4. use URL decoder to decode suspicious url to see what executables is being requested to the victim to download by the attacker.
5. You can filter with also tcp.port == 4444 then go for follow tcp stream to see what command is issued on the victim system after reverse shell is established successfully. You may get there interesting things.
Comments
Post a Comment