1 Fictional Back Story
The University’s new student finance system is about to be launched! Just before giving a demonstration to the University President, one of our team logged in to the system from their laptop. All they did was log in and then log back out, but somehow someone was able to change their financial details, apply for a grant and steal the money! This shouldn’t be possible as it uses a 2 factor authentication.
Thankfully the network team managed to record the traffic going to and from the attacker’s machine. You have been asked to work out how they stole the money.
• Using your knowledge of network protocols and the features of Wireshark work out what has happened.
• Write a short report (4.5 pages max! and PDF) which covers the following three topics:
What Happened Describe what happens in the captured network traf- fic. Give all of the relevant details. You need to work out what is relevant.
The Attack Identify the different steps used in the attack. Explain how each step of the attack works.
1
Prevention Give defences which would prevent this attack. They must be specific to this attack and not general security improvements. Say which steps of the attack they would stop.
• Every claim or observation you make must be linked to one or more packets or parts of packets in the pcap file. Use the packet number (on the far left of the main display) to identify packets. Screen shots are not required but you can include them if you feel it is the best way of explaining something.
5 Hints
• In Wireshark filters are very important for narrowing down what you are looking for and hiding things that you have already understood.
• To fully understand what is happening you will need information from several protocol layers. As the course is covering these in order, not all of the relevant information has been taught before the coursework is set. If things don’t immediately make sense, don’t panic and pay attention to future lectures and reading.
• One approach to the coursework is to divide the captured traffic into a series of time-slices based on the type of traffic. Then work out what happens in each time slice.
• Another approach is to work by protocol layers. For each layer what protocols are used, what addresses are used, what kind of services are used.
• Just like real traffic captures, there is some noise and irrelevant packets. Not everything is the file is important.
• Also there may be information that is not included in the file or is not readable due to encryption. This is common in real uses and something you will have to work around.
• The practicals contain some relevant exercises to get you started with Wireshark.
• Many of the tools needed to generate the attack file are on the virtual machine image so it should be possible to test out different ideas and see what packets they generate.
• Don’t just look at the protocol information, the pattern and amount of data exchanged may be useful, especially if some of the packets are en- crypted.