<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Lily Tuckrige &#8211; @Forensicxs</title>
	<atom:link href="https://www.forensicxs.com/tag/lily-tuckrige/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.forensicxs.com</link>
	<description>Ethical Hacking &#124; Cybersecurity</description>
	<lastBuildDate>Thu, 13 May 2021 19:45:46 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Computer Forensics : Network Case using Wireshark and NetworkMiner</title>
		<link>https://www.forensicxs.com/computer-forensics-network-case-using-wireshark-and-networkminer/</link>
					<comments>https://www.forensicxs.com/computer-forensics-network-case-using-wireshark-and-networkminer/#comments</comments>
		
		<dc:creator><![CDATA[Forensicxs]]></dc:creator>
		<pubDate>Sat, 14 Nov 2020 15:40:46 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computer Forensics]]></category>
		<category><![CDATA[Digitalcorpora]]></category>
		<category><![CDATA[Harassment]]></category>
		<category><![CDATA[Lily Tuckrige]]></category>
		<category><![CDATA[Network]]></category>
		<category><![CDATA[Networkminer]]></category>
		<category><![CDATA[Nitroba]]></category>
		<category><![CDATA[State University]]></category>
		<category><![CDATA[Wireshark]]></category>
		<guid isPermaLink="false">https://www.forensicxs.com/?p=919</guid>

					<description><![CDATA[In this article, I&#8217;m going to show you how to use Wireshark, the famous network packet sniffer, together with NetworkMiner, another very good tool, to perform some network forensics. You can easily download and install Wireshark here https://www.wireshark.org/download.html, on a Windows 10 machine for example, and NetworkMiner here https://weberblog.net/intro-to-networkminer/ I&#8217;m going to follow step by &#8230; <p class="link-more"><a href="https://www.forensicxs.com/computer-forensics-network-case-using-wireshark-and-networkminer/" class="more-link">Continue reading<span class="screen-reader-text"> "Computer Forensics : Network Case using Wireshark and NetworkMiner"</span></a></p>]]></description>
										<content:encoded><![CDATA[
<p id="Network-case-wireshark">In this article, I&#8217;m going to show you how to use <strong><span class="has-inline-color has-luminous-vivid-orange-color">Wireshark</span></strong>, the famous network packet sniffer, together with <strong><span class="has-inline-color has-luminous-vivid-orange-color">NetworkMiner</span></strong>, another very good tool, to perform some network forensics. You can easily download and install Wireshark here <a rel="noreferrer noopener" href="https://www.wireshark.org/download.html" target="_blank">https://www.wireshark.org/download.html</a>, on a Windows 10 machine for example, and NetworkMiner here <a href="https://weberblog.net/intro-to-networkminer/" target="_blank" rel="noreferrer noopener">https://weberblog.net/intro-to-networkminer/</a></p>



<p>I&#8217;m going to follow step by step a network forensics case, the Nitroba State University Harrassment Case. All the material is available here, published under the CC0 licence : <a href="https://digitalcorpora.org/corpora/scenarios/nitroba-university-harassment-scenario" target="_blank" rel="noreferrer noopener">https://digitalcorpora.org/corpora/scenarios/nitroba-university-harassment-scenario</a></p>



<p>This scenario includes two important documents</p>



<p>The first one is the presentation of the Case : <a href="http://downloads.digitalcorpora.org/corpora/network-packet-dumps/2008-nitroba/slides.ppt" target="_blank" rel="noreferrer noopener">http://downloads.digitalcorpora.org/corpora/network-packet-dumps/2008-nitroba/slides.ppt</a></p>



<p>The second one is the PCAP capture : <a href="http://downloads.digitalcorpora.org/corpora/network-packet-dumps/2008-nitroba/nitroba.pcap" target="_blank" rel="noreferrer noopener">http://downloads.digitalcorpora.org/corpora/network-packet-dumps/2008-nitroba/nitroba.pcap</a>. Read below about PCAP</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="935" height="157" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture.png" alt="" class="wp-image-928" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture.png 935w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-300x50.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-768x129.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Let&#8217;s have a first look at the PCAP file</span></strong></p>



<p>Just click on the PCAP file, and it should open in Wireshark. You get a first overview of the very long list of packets captured</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-2-1024x490.png" alt="" class="wp-image-930" width="847" height="405" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-2-1024x490.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-2-300x144.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-2-768x368.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-2-1536x736.png 1536w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-2.png 1904w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>In the first section, you get the list of packets/frames ordered by number, time, source IP, destination IP, protocol, length, and informations about content</p>



<p>In the second section, you see the details of a packet (here packet/frame number 1), shown according to the main layers of the <strong>OSI model</strong>. For packet number 1, we have informations about the first four layers (respectively n°1 &#8220;wire&#8221;, n°2 &#8220;Ethernet&#8221;, n°3 &#8220;IP&#8221;, n°4 &#8220;TCP&#8221;)</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-3.png" alt="" class="wp-image-931" width="534" height="388" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-3.png 795w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-3-300x218.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-3-768x558.png 768w" sizes="(max-width: 534px) 100vw, 534px" /></figure>



<p>In the third section, we have the details of the packet number 1 in HEX format. It is usefull to check the source data in a &#8220;compact&#8221; format (instead of binary which would be very long)</p>



<p>As a very first step, you can easily gather <strong>statistics</strong> about this capture, just using the statistics module of Wireshark : Statistics =&gt; Capture File Properties</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-4-1024x482.png" alt="" class="wp-image-932" width="660" height="310" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-4-1024x482.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-4-300x141.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-4-768x362.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-4.png 1081w" sizes="(max-width: 660px) 100vw, 660px" /></figure>



<p>We can see that the SHA1 and SHA256 hash signatures match with the ones given in the scenario (as expected). We also see that the elapsed time of the capture was about 4 hours and 22 minutes. This is quite long, and explains the quantity of packets received in this network capture : 94 410 lines. No chance to read through each packet line by line&#8230;this is why <strong>a key concept in Wireshark is to make use of filters</strong> to narrow down any search made in the capture. As you can guess, we are going to use filters for our analysis&#8230;!</p>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Map the Nitroba dorm room network</span></strong></p>



<figure class="wp-block-image"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-13.png" alt="This image has an empty alt attribute; its file name is Capture-13.png"/></figure>



<p>Now, read through the Powerpoint presentation to get an overview of the Case. There is one key information to start analyzing the PCAP capture</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-5.png" alt="" class="wp-image-934" width="520" height="87" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-5.png 885w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-5-300x51.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-5-768x129.png 768w" sizes="(max-width: 520px) 100vw, 520px" /></figure>



<p>The IP was found in the email header</p>



<figure class="wp-block-image size-large"><img decoding="async" width="933" height="374" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-20.png" alt="" class="wp-image-965" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-20.png 933w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-20-300x120.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-20-768x308.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>So, let&#8217;s filter the PCAP file using the IP adress used to send the first email : 140.247.62.34, both in the source and destination IP : <strong>ip.src==140.247.62.34 or ip.dst==140.247.62.34</strong> (to learn the filtering by IP, check this : <a rel="noreferrer noopener" href="https://networkproguide.com/wireshark-filter-by-ip/" target="_blank">https://networkproguide.com/wireshark-filter-by-ip/</a>)</p>



<p>We find that this IP has a low presence in the Wireshark statistics : 0.06% of the total sent packets (equal 52 packets)</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-6.png" alt="" class="wp-image-936" width="529" height="88" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-6.png 619w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-6-300x50.png 300w" sizes="(max-width: 529px) 100vw, 529px" /></figure>



<p>Now, look closer at the IP adresses source and destination (here below a screenshot of the first packets)&#8230;you see that the <strong>IP 192.168.15.4</strong> plays a central role as it is the only IP bridging with our IP 140.247.62.34</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-7.png" alt="" class="wp-image-937" width="488" height="333" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-7.png 575w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-7-300x205.png 300w" sizes="(max-width: 488px) 100vw, 488px" /></figure>



<p>This type of IP is well known : it&#8217;s a <strong>private IP adress</strong>. See below some explanations</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-8.png" alt="" class="wp-image-939" width="610" height="118" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-8.png 707w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-8-300x58.png 300w" sizes="(max-width: 610px) 100vw, 610px" /></figure>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-9.png" alt="" class="wp-image-940" width="610" height="576" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-9.png 710w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-9-300x283.png 300w" sizes="(max-width: 610px) 100vw, 610px" /></figure>



<p>Let&#8217;s have a look in the OSI layer n°2 of a packet capture between these two IP adresses<strong> </strong>192.168.15.4 (source) and IP 140.247.62.34 (destination). We find interesting informations about the hardware and MAC adress of the two physical devices pointed by these IP</p>



<figure class="wp-block-image size-large"><img decoding="async" width="704" height="224" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-11.png" alt="" class="wp-image-943" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-11.png 704w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-11-300x95.png 300w" sizes="(max-width: 704px) 100vw, 704px" /></figure>



<p>So, the information reads as follows </p>



<figure class="wp-block-table"><table><tbody><tr><td class="has-text-align-center" data-align="center"><strong>IP</strong></td><td class="has-text-align-center" data-align="center"><strong>MAC</strong></td><td class="has-text-align-center" data-align="center">       <strong>Hardware</strong>            </td></tr><tr><td class="has-text-align-center" data-align="center">192.168.15.4 (source)</td><td class="has-text-align-center" data-align="center">00:17:f2:e2:c0:ce</td><td class="has-text-align-center" data-align="center">Apple</td></tr><tr><td class="has-text-align-center" data-align="center">140.247.62.34 (destination)</td><td class="has-text-align-center" data-align="center">00:1f:d9:2e:4f:60</td><td class="has-text-align-center" data-align="center">HonHaiPr</td></tr></tbody></table></figure>



<p>A Google check with the MAC 00:17:f2:e2:c0:ce confirms this is an <strong>Apple</strong> device</p>



<figure class="wp-block-image size-large"><img decoding="async" width="980" height="899" src="https://www.forensicxs.com/wp-content/uploads/2020/11/image.png" alt="" class="wp-image-947" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/image.png 980w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-300x275.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-768x705.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>What is HonHaiPr ? A carefull Google search reveals it&#8217;s Hon Hai Precision Industry Co Ltd, also known as the electronics giant <strong>Foxconn</strong></p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="275" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-12-1024x275.png" alt="" class="wp-image-948" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-12-1024x275.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-12-300x81.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-12-768x206.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-12.png 1270w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><span class="has-inline-color has-luminous-vivid-orange-color"><strong>Find who sent email to lilytuckrige@yahoo.com</strong> <strong>and identify the TCP connections that include the hostile message</strong></span></p>



<p>Let&#8217;s use again the filter capabilities of Wireshark : <strong>frame contains &#8220;tuckrige&#8221;</strong></p>



<p>We find three packets . The first two of them are using the OSI model layer n°7, that is the application layer, represented by the <strong>HTTP protocol</strong>. The last one is using the OSI model layer n°4, in this case the <strong>TCP protocol</strong></p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="540" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-14-1024x540.png" alt="" class="wp-image-952" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-14-1024x540.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-14-300x158.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-14-768x405.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-14.png 1512w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>The packet n°80614 shows an harassing message was sent using sendanonymousemail.net</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-15.png" alt="" class="wp-image-953" width="463" height="298" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-15.png 507w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-15-300x193.png 300w" sizes="(max-width: 463px) 100vw, 463px" /></figure>



<p>The source IP is 192.168.15.4, and the destination IP is 69.80.225.91</p>



<p>The packet n°83601 shows an harassing message was sent using <strong>Willselfdestruct.com</strong>, with the exact email header as described in the Powerpoint &#8220;you can&#8217;t find us&#8221;</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-16.png" alt="" class="wp-image-954" width="526" height="145" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-16.png 608w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-16-300x83.png 300w" sizes="(max-width: 526px) 100vw, 526px" /></figure>



<p>The source IP is 192.168.15.4, and the destination IP is 69.25.94.22</p>



<p>At this point of the article, we can confirm that the IP 192.168.15.4 plays a central role in the email &#8220;attacks&#8221; and the harassment faced by the professor Lily Tuckrige</p>



<p>Let&#8217;s keep in mind this key information for the next paragraphs</p>



<figure class="wp-block-table"><table><tbody><tr><td class="has-text-align-center" data-align="center"><strong>IP</strong></td><td class="has-text-align-center" data-align="center"><strong>MAC</strong></td><td class="has-text-align-center" data-align="center">       <strong>Hardware</strong>            </td></tr><tr><td class="has-text-align-center" data-align="center">192.168.15.4 (source)</td><td class="has-text-align-center" data-align="center">00:17:f2:e2:c0:ce</td><td class="has-text-align-center" data-align="center">Apple</td></tr></tbody></table><figcaption>This IP / MAC is going to be essential to solve the case !</figcaption></figure>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Find information in one of those TCP connections that identifies the attacker</span></strong></p>



<p>So now that we have an interesting IP / MAC pair, that may lead to the identification of the attacker, what could we do next ?</p>



<p>I&#8217;ve decided to have a look further in the packets. Could we find maybe, the email adress of the attacker ? And, how to check that ?</p>



<p>I&#8217;ve just filtered in Wireshark typing &#8220;frame contains mail&#8221;. This is a little bit &#8220;quick and dirty&#8221; but could help to narrow down the research as I had no better idea at this point&#8230;then I went scrolling into the selected frames and found some frames titled &#8220;GET /mail/ HTTP/1.1 with some interesting content&#8230;look at the cookie ! They reveal some email adress and the link to the email platform used !</p>



<p>In the example below, we see the frame n°16744, showing a GET /mail/ HTTP/1.1, the MAC adress in layer 2 of the OSI model, and some cookie informations in clear text :</p>



<p><em>User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8.1.16)</em></p>



<p><em>Cookie pair: gmailchat=elishevet@gmail.com/945167</em></p>



<p><em>[Full request URI: http://mail.google.com/mail/]</em></p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="472" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-19-1024x472.png" alt="" class="wp-image-963" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-19-1024x472.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-19-300x138.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-19-768x354.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-19-1536x707.png 1536w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-19.png 1898w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>Of course, the http adress points to the Gmail sign in page. When the person is signing in, Gmail downloads the cookie for authentification needs</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-17.png" alt="" class="wp-image-960" width="260" height="319" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-17.png 470w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-17-245x300.png 245w" sizes="(max-width: 260px) 100vw, 260px" /></figure>



<p>It&#8217;s quite amazing to find this level of information in clear text, furthermore in Wireshark, isn&#8217;t it ? Well, not quite. Just read this blog and the summary below -&gt; enforce SSL so the cookie isn&#8217;t sent in cleartext ! </p>



<p><a href="https://blog.teamtreehouse.com/how-to-create-totally-secure-cookies" target="_blank" rel="noreferrer noopener">https://blog.teamtreehouse.com/how-to-create-totally-secure-cookies</a></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-18.png" alt="" class="wp-image-961" width="486" height="190" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-18.png 813w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-18-300x118.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/Capture-18-768x301.png 768w" sizes="(max-width: 486px) 100vw, 486px" /></figure>



<p>Now that we have found a way to identify the email adress of the attacker, let&#8217;s go through the different frames including the GET /mail/ HTTP/1.1 info and let&#8217;s check the email, IP, MAC data. Probably, we will find a match with the already suspicious IP/MAC pair from the previous paragraph ? Here below the result of my analysis in a table, the match is easily found and highlighted in red</p>



<figure class="wp-block-table"><table><tbody><tr><td class="has-text-align-center" data-align="center">Frame</td><td class="has-text-align-center" data-align="center">E-mail</td><td class="has-text-align-center" data-align="center">IP</td><td class="has-text-align-center" data-align="center">MAC</td></tr><tr><td class="has-text-align-center" data-align="center">16744</td><td class="has-text-align-center" data-align="center">elishevet@gmail.com</td><td class="has-text-align-center" data-align="center">192.168.1.64</td><td class="has-text-align-center" data-align="center">00:1d:d9:2e:4f:61</td></tr><tr><td class="has-text-align-center" data-align="center">78990</td><td class="has-text-align-center" data-align="center"><strong><span class="has-inline-color has-vivid-red-color">jcoach@gmail.com</span></strong></td><td class="has-text-align-center" data-align="center"><strong><span class="has-inline-color has-vivid-red-color">192.168.15.4</span></strong></td><td class="has-text-align-center" data-align="center"><strong><span class="has-inline-color has-vivid-red-color">00:17:f2:e2:c0:ce</span></strong></td></tr></tbody></table><figcaption>The attacker email is jcoach@gmail.com</figcaption></figure>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">So who dit it ?</span></strong></p>



<p>Now, we can come to a conclusion, since we have a potential name &#8220;jcoach&#8221;. Let&#8217;s compare with the list of alumni in Lily Tuckrige classroom</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2020/11/image-1.png" alt="" class="wp-image-966" width="249" height="389" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/image-1.png 502w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-1-192x300.png 192w" sizes="(max-width: 249px) 100vw, 249px" /></figure>



<p>We have a match with <strong>Johnny Coach</strong> ! We found the solution to this harassment case <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">NetworkMiner versus Wireshark</span></strong></p>



<p>As we solved the case with Wireshark, let&#8217;s have a quick look what NetworkMiner could bring. Here a good summary available in Google </p>



<figure class="wp-block-image size-large"><img decoding="async" width="914" height="146" src="https://www.forensicxs.com/wp-content/uploads/2020/11/image-2.png" alt="" class="wp-image-967" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/image-2.png 914w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-2-300x48.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-2-768x123.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>I will provide here below a few screenshots of what you can do to solve the case</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="333" src="https://www.forensicxs.com/wp-content/uploads/2020/11/image-3-1024x333.png" alt="" class="wp-image-968" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/image-3-1024x333.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-3-300x98.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-3-768x250.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-3.png 1522w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /><figcaption>NetworkMiner provides a very handy email analyzer. We immediately see the harassment messages</figcaption></figure>



<figure class="wp-block-image size-large"><img decoding="async" width="951" height="481" src="https://www.forensicxs.com/wp-content/uploads/2020/11/image-4.png" alt="" class="wp-image-969" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/image-4.png 951w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-4-300x152.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-4-768x388.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /><figcaption>From the IP 192.168.15.4, we find the MAC adress and more</figcaption></figure>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="184" src="https://www.forensicxs.com/wp-content/uploads/2020/11/image-5-1024x184.png" alt="" class="wp-image-971" srcset="https://www.forensicxs.com/wp-content/uploads/2020/11/image-5-1024x184.png 1024w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-5-300x54.png 300w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-5-768x138.png 768w, https://www.forensicxs.com/wp-content/uploads/2020/11/image-5.png 1519w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /><figcaption>In the Credentials section, we can narrow down the email provider used by 192.168.15.4 to Gmail and confirm there is a single Gmail account corresponding to this IP, jcoach@gmail.com</figcaption></figure>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Conclusion</span></strong></p>



<p>Doing this exercise, we have discovered some good network packet sniffers, and now could be able to solve more difficult cases</p>



<p>We have seen that with a good packet sniffer, a lot of critical informations could be collected&#8230;in such case your personal informations are no longer safe</p>



<p>It was pretty straigthforward to come down to the attacker, thanks to the available email header, then basic filtering in Wireshark and/or NetworkMiner, applying the necessary keywords</p>



<p>Is such a scenario realistic ? Yes, it could be. A network Admin can install such networking sniffers and gather data, or an attacker could slip in a network and also gather informations</p>



<p>To protect yourself, avoid the non encrypted protocols such as HTTP, FTP, TELNET</p>



<p>You can get additional informations about sniffing attacks here : <a href="https://www.greycampus.com/blog/information-security/what-is-a-sniffing-attack-and-how-can-you-defend-it" target="_blank" rel="noreferrer noopener">https://www.greycampus.com/blog/information-security/what-is-a-sniffing-attack-and-how-can-you-defend-it</a></p>



<p>Update 2021/04/30 : please read the chat below, with the user &#8220;kinimod&#8221; as it shows a deeper complexity to the case !</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.forensicxs.com/computer-forensics-network-case-using-wireshark-and-networkminer/feed/</wfw:commentRss>
			<slash:comments>13</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Database Caching using Disk (Request-wide modification query)

Served from: www.forensicxs.com @ 2026-01-10 06:39:50 by W3 Total Cache
-->