Description
this requires basic skill with wireshark. you will need to have wireshark to complete the assingment. flag 1 to 5 on wireshark. see the instructions file below for flags instructions and submission instructions. one of zip was big so i could not attach. please give your email or any other option i can send the zip file to you as it needed to complete the flag 1-5. below instructions already inside the instructions file. I want to make sure you have it.The final deliverables:Man in the Middle – PCAP Analysis Man in the Middle – PCAP Analysis template A single JSON file named project_mitm.json. A template can be found below. This submission consists of Flag 1 to Flag 5.PCAP is available at: https://cs6035.s3.amazonaws.com/MITM/mitm_fall_202… ( please give your email or any other option i can send the zip file to you as it needed to complete the flag 1-5 incase you cant submit) Links to an external site.Official Wireshark GuideRead the RFCs provided.If you have no experience with networking or application layer protocols, we STRONGLY encourage you to research those topics. There are many great resources online like Google and YouTube.RequirementsWiresharkEnsure you have nslookup installed on your OS (DNSUtils) (it should come default on any Windows, MacOS or Linux environment)Packet Capture – Part 1:The packet capture can be downloaded attachedFlag 1 (5 points)Your first task is to figure out where the hackers are spending their time and gather some evidence for the Attorney General. This will also give you a good overview of Wireshark filters.The Attorney General needs some evidence of The Necrocryptors’ associates and where the group meets.For this, you need to gather the following information:Task 1.1Based on the provided packet capture (pcap) file, identify the server address used by the hackers to communicate.Example: irc.someplace.netPoints: 1Task 1.2Based on the provided packet capture (pcap) file, identify the nicknames of the malicious actors involved in the conversation. List the nicknames in the order they appear in the conversation following the format below:Example: firstactor,secondactor,thirdactorPoints: 1Task 1.3Based on the provided packet capture (pcap) file, identify the channel the malicious actors use to communicate. Remember, channel names always start with #, so include # in your answer.Example: #WOWPoints: 1Task 1.4Based on the provided packet capture (pcap) file, identify the hash used by the malicious actor to validate its identity.Example: a12342342bcde393202013434Points: 1Task 1.5Based on the pcap file provided, analyze the network traffic to determine the potential origin country of the last identified malicious actor. Consider the IP addresses, any geolocation data. Provide the name of the countryExample: AtlantisPoints: 1Flag 2 (27 points)Your second task will require you to recover a payload from the conversation. There are multiple ways to do this. You can use Wireshark, pyShark or any other library available.As part of the evidence gathering, the Attorney General needs concrete evidence of malicious intent. For Task 2, you will need to review the conversation between members of TNC and gather incriminating data from this conversation.Task 2.1Based on the provided pcap file, identify which malicious actor initiated a private chat during the conversation.Example:maliciousactorPoints: 2Task 2.2Based on the provided pcap file, identify the name of the file transferred by one hacker to another via IRC DCC. (Including extension)Example:somefile.extensionPoints: 5Task 2.3Based on the provided pcap file, determine the encryption method or algorithm used to encrypt the file transferred between the hackers. (Just the 3-letter name)Example:somethingPoints: 4Task 2.4If you decrypt and run the file, you’ll get a unique hash based on your GTID. What is the hash generated?Example:a123242342342342342934234Points: 16Flag 3 (21 points)The Attorney General lets you know that they think there is a web server in here that is phishy and is spitting out long numbers and letters. The Necrocryptors hacking group is known to play tricks with these values. The Attorney General needs the following information to track the folks operating the website:Task 3.1The site domain name (Record just the site’s domain name and the top-level-domain (TLD) name, with the period. E.G: something.hostname.tld)Example: something.something.somethingPoints: 2Task 3.2What is the public IP address?Example: 192.168.1.10Points: 2Task 3.3The primary nameserver for this domain (You may need to look outside the pcap for this information. Think about tools that will give you the nameserver data for a specific domain)Example: ns-something-something.something.somethingPoints: 6Task 3.4The hash provided by entering your Georgia Tech ID in the field (i.e. 9021042) (NOTE: The website is real and safe to access)Example: abcdef1234567890953453434Points: 11Flag 4 (27 points)The Attorney General is impressed by you but says they believe the group is also using another server to host a malicious file. It appears that one of the hackers recently accessed this server and downloaded a file from it. As a last minute request, the Attorney General is asking you to investigate what this file is, and where it is hosted.Task 4.1What is the IP address for the server in question?Example: 192.168.8.7Points:2Task 4.2What is the username used to log in the server?Example: somethingPoints:4Task 4.3What is the password used to log in the server?Example: somethingPoints:4Task 4.4One file is downloaded from the server, what is the file name?Example: somethingPoints:3Task 4.5What is the programming language used to create this file?Example: somethingPoints:5Task 4.6If you run this file you’ll get a Combined hash. What is the unique hash for your GTID (i.e 902042)?Example: 12123123129413249121249aaPoints:9Flag 5 (5 points)Exhausted from the prior exercises, the attorney general has two more exercises for you to prove you belong here and that he shouldn’t fire you despite doing a good job. He mentions to you the hackers are getting smart and they have a website called http://www.didbastionbreak.comthat has absolutely nothing to do with Azure Firewalls but everything to do with web application firewalls. Apparently there are some weaknesses integrated into the website which allow you to get to different parts of the website something called a path traversal attack.Task 5.1There is a flag labeled 5.1 that outputs a hash when you input in your GTID. Try to find the page and recover the flagExample: tr95843fkdspugr8euyre0gfdPoints: 2Task 5.2What is the directory name that contains the hint for 5.3?Example: somethingPoints: 1Task 5.3There is a flag labeled 5.3 that outputs a hash when you input in your GTID. Try to find the page and recover the flagExample: 58437594ejgfdiohr8e054309Points: 2Suddenly, your phone rings. You see that the call is coming from Bill’ extension.You were ready to head back home and watch Netflix. Here we go again…“Mark, great job so far! I was thinking here. This will not be the last time you will be doing this analysis on pcaps, so why don’t we start building a python class with several methods to automate some of the work for next time?” “When you say we, you are saying, why dont I build this class right?” you say.“Of course not! I already created some skeleton code to help you out. You just need to build 3 functions now” Bill says.“Oh, ok. Thank you Boss..”As you hang up the call, Bill sends you via IM a zip file containing the python class and a attack pcap from a past incident so you can create the functions and test.File submission instructions:Man in the Middle – WireShark Assignment – Name your submission file: project_mitm.json. In addition, ensure you replace the placeholders with the flags you retrieve from each relevant task.Note: You can use Notepad++/TextEdit or Vim to create and edit this file. IMPORTANT: Do not use LibreOffice, Word, or any similar document editor. Your submission must be in proper JSON format with no special characters in order to pass the autograder; these document editors are likely to introduce special characters that will make your submission fail the autograder.Here is an example of the provided JSON file:{“task1.1”: “