Worksheet 10 is Lab
Worksheet 10 is Lab
Wireshark offers several benefits that make it appealing for everyday use. It is aimed at both the journeyman and the
expert packet analyst, and offers a variety of features to entice each.
Indicators of compromise (IOCs) are pieces of forensic data, such as data found in system log entries or files, that identify
potentially malicious activity on a system or network
By applying filter http.request a file and its hash can be found in(I). In next step it has to be checked whether the file
is malicious or not .For this obtained file hashes has been checked at virustotal.com. VirusTotal is a website created
by the Spanish security company Hispasec Sistemas. Launched in June 2004.
▪ Finding the host name, Domain name, IP address and MAC address:
Details have been found from NBNS traffic steps for obtaining host name , domain name,IP address and MAC
address are as follows
(Domain Address)
(IP Address of Onfected Host)
3. Result/Output/Writing Summary:
The cases of packet analysis by collecting values for Indicators of compromise will help to realize
packet analysers, especially WireShark which is crucial to network forensics.
“Indicators of compromise” helps to use threat data effectively, identify malware and quickly respond to
incidents. Packet analyzer like wireshark can be used for security.
However, despite its rich toolset, it is important to keep in mind that Wireshark is not an intrusion
detection system. WireShark will not warn us when someone does strange things on network that he is
not allowed to do, and it will not manipulate things on the network such as sending packets. The
usefulness of Packet analyzer is that it is a convenient and effective tool that can help network security
professionals figure out what is really happening in the network if strange things happen.
Evaluation Grid: