Cyberops Undip
Cyberops Undip
0 views 1 0
Cyberops-Undip
Uploaded by alfah
CCNA Cybersecurity Operations v1.0 Skills
Assessment Full description
Content for this assessment was obtained from http://www.malware-traffic-analysis.net/ and is used
permission. We are grateful for the use of this material.
Addressing Table
The following addresses are preconfigured on the network devices. Addresses are provided for refer
purposes.
Cyberops-Undip
Uploaded by alfah
CCNA Cybersecurity Operations v1.0 Skills
Assessment Full description
j. What is the operating system r unning on the internal computer in questi on?
Window-based OS
Exploit kit adalah alat pemrograman yang memungkinkan seseorang yang tidak m
pengalaman menulis kode perangkat lunak untuk membuat, menyesuaika
mendistribusikan malware. Kit eksploit dikenal dengan sejumlah nama lain, term
infeksi, kit crimeware, kit serangan DIY, dan toolkit malware.
Exploit kit memiliki antarmuka program aplikasi grafis (API) yang memun
pengguna non-teknis untuk mengelola serangan canggih yang mampu menc
perusahaan dan pribadi, mengatur eksploitasi denial of service (DoS)) atau mem
botnet
c. Do a quick Google search on ‘Angler EK’ to learn a little about the fundamentals the exploit kit.
Summarize your findings and record them here.
1.Penyerang kompromi sejumlah situs lalu lintas tinggi dan menyuntikkan kode berbaha
RELATED TITLES
0 views 1 0
Cyberops-Undip
Uploaded by alfah
CCNA Cybersecurity Operations v1.0 Skills
Assessment Full description
3. Kode berbahaya memungkinkan pemindaian sistem korban, yang pada akhirnya men
kemungkinan kerentanan
4. Informasi seperti plugin yang diinstal dan versinya, OS, nama dan versi browser web
kemudian disaring ke server jahat, sering melalui HTTP POST yang disandikan.
5. Berdasarkan data exfiltrated, server jahat menyiapkan paket eksploit yang disesuaika
mengirimkannya ke browser korban
6. Paket exploit sering berisi exploit yang disesuaikan dan payload; exploit digunakan un
mendapatkan hak eksekusi kode dalam sistem korban. Payload terdiri dari kode berbaha
tambahan yang hanya dapat dieksekusi setelah eksploit melakukan tugasnya.
d. How does this exploit fit the definition on an exploit kit? Give examples from the events you see
eksploit menggunakan situs web yang disusupi untuk memindai host untuk men
kerentanan dan kemudian mengunduh perangkat lunak berbahaya
Cyberops-Undip
Uploaded by alfah
CCNA Cybersecurity Operations v1.0 Skills
Assessment Full description
e. This exploit kit typically targets vulnerabilities in which three software applications?
adobe flash player, java runtime environmt, Microsoft Silverlight
f. Based on the SGUIL events, what vulnerability seems to have been used by the exploit kit?
outdated flash plugin
g. What is the most common file type that is related to that vulnerable software?
- adobe flash authoring file FLA
- action script file AS
- flash XML file XML
- compiled flash file SWF
h. Use ELSA to gather more evidence to support the hypothesis that the host you identified above
the malware. Launch ELSA and list all hosts that downloaded the type of file listed above. Reme
adjust the timeframe accordingly.
Were you able to find more evidence? If so, record your findings here.
Yes.
1510604611.228059|CYCGVz4HyAXsgGuNV2|209.165.201.17|47144|209.165.200.235|80|1|GE
5.200.235|/mutillidae/index.php?page=user-
info.php&username='+union+select+ccid,ccnumber,ccv,expiration,null+from+credit_cards+--
+&password=&user-info-php-submit-
button=View+Account+Details|http://209.165.200.235/mutillidae/index.php?page=user-
info.php&username=%27+union+select+ccid%2Cccnumber%2Cccv%2Cexpiration%2Cnull+from
cards+--+&password=&user-info-php-submit-button=View+Account+Details|1.1|Mozilla/5.0 (X11
x86_64; rv:45.0) Gecko/20100101 Firefox/45.0|0|960|200|OK|-|-|HTTP::URI_SQLI|-|-|-|-|-|-
|FvFBhF1tikxaHjaG1|-|text/html
host=127.0.0.1 program=bro_http class=BRO_HTTP srcip=209.165.201.17 srcport=47144
dstip=209.165.200.235 dstport=80 status_code=200 content_length=960 method=GET
site=209.165.200.235 uri=/mutillidae/index.php?page=user-
info.php&username='+union+select+ccid,ccnumber,ccv,expiration,null+from+credit_cards+--
+&password=&user-info-php-submit-button=View+Account+Details
referer=http://209.165.200.235/mutillidae/index.php?page=user-
info.php&username=%27+union+select+ccid%2Cccnumber%2Cccv%2Cexpiration%2Cnull+from
cards+--+&password=&user-info-php-submit-button=View+Account+Details user_agent=Mozilla/
Linux x86_64; rv:45.0) Gecko/20100101 Firefox/45.0 mime_type=text/html
i. At this point you should know, with quite some level of certainty, whether the site listed in Part 3
Part 3c delivered the malware. Record your conclusions below.
192.168.0.12, the internal host, was likely infected. It has an aotdated version of the flash plugin
was noticed by the exploit kit. 192.168.0.12 was then led to download a malicious SWF (Flash fi
qwe.mvdunalterableairreport.net
Cyberops-Undip
Uploaded by alfah
CCNA Cybersecurity Operations v1.0 Skills
Assessment Full description