this requires basic skill with wireshark. you will need to have wireshark to com

Do you need this or any other assignment done for you from scratch?
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

this requires basic skill with wireshark. you will need to have wireshark to complete the assingment. flag 1 to 5 on wireshark. see the instructions file below for flags instructions and submission instructions. one of zip was big so i could not attach. please give your email or any other option i can send the zip file to you as it needed to complete the flag 1-5.
below instructions already inside the instructions file. I want to make sure you have it.
The final deliverables:
Man in the Middle – PCAP Analysis
Man in the Middle – PCAP Analysis template A single JSON file named project_mitm.json. A template can be found below. This submission consists of Flag 1 to Flag 5.
PCAP is available at: https://cs6035.s3.amazonaws.com/MITM/mitm_fall_202… ( please give your email or any other option i can send the zip file to you as it needed to complete the flag 1-5 incase you cant submit)
Links to an external site.
Official Wireshark Guide
Read the RFCs provided.
If you have no experience with networking or application layer protocols, we STRONGLY encourage you to research those topics. There are many great resources online like Google and YouTube.
Requirements
Wireshark
Ensure you have nslookup installed on your OS (DNSUtils) (it should come default on any Windows, MacOS or Linux environment)
Packet Capture – Part 1:
The packet capture can be downloaded attached
Flag 1 (5 points)
Your first task is to figure out where the hackers are spending their time and gather some evidence for the Attorney General. This will also give you a good overview of Wireshark filters.
The Attorney General needs some evidence of The Necrocryptors’ associates and where the group meets.
For this, you need to gather the following information:
Task 1.1
Based on the provided packet capture (pcap) file, identify the server address used by the hackers to communicate.
Example: irc.someplace.net
Points: 1
Task 1.2
Based on the provided packet capture (pcap) file, identify the nicknames of the malicious actors involved in the conversation. List the nicknames in the order they appear in the conversation following the format below:
Example: firstactor,secondactor,thirdactor
Points: 1
Task 1.3
Based on the provided packet capture (pcap) file, identify the channel the malicious actors use to communicate. Remember, channel names always start with #, so include # in your answer.
Example: #WOW
Points: 1
Task 1.4
Based on the provided packet capture (pcap) file, identify the hash used by the malicious actor to validate its identity.
Example: a12342342bcde393202013434
Points: 1
Task 1.5
Based on the pcap file provided, analyze the network traffic to determine the potential origin country of the last identified malicious actor. Consider the IP addresses, any geolocation data. Provide the name of the country
Example: Atlantis
Points: 1
Flag 2 (27 points)
Your second task will require you to recover a payload from the conversation. There are multiple ways to do this. You can use Wireshark, pyShark or any other library available.
As part of the evidence gathering, the Attorney General needs concrete evidence of malicious intent. For Task 2, you will need to review the conversation between members of TNC and gather incriminating data from this conversation.
Task 2.1
Based on the provided pcap file, identify which malicious actor initiated a private chat during the conversation.
Example:maliciousactor
Points: 2
Task 2.2
Based on the provided pcap file, identify the name of the file transferred by one hacker to another via IRC DCC. (Including extension)
Example:somefile.extension
Points: 5
Task 2.3
Based on the provided pcap file, determine the encryption method or algorithm used to encrypt the file transferred between the hackers. (Just the 3-letter name)
Example:something
Points: 4
Task 2.4
If you decrypt and run the file, you’ll get a unique hash based on your GTID. What is the hash generated?
Example:a123242342342342342934234
Points: 16
Flag 3 (21 points)
The Attorney General lets you know that they think there is a web server in here that is phishy and is spitting out long numbers and letters. The Necrocryptors hacking group is known to play tricks with these values. The Attorney General needs the following information to track the folks operating the website:
Task 3.1
The site domain name (Record just the site’s domain name and the top-level-domain (TLD) name, with the period. E.G: something.hostname.tld)
Example: something.something.something
Points: 2
Task 3.2
What is the public IP address?
Example: 192.168.1.10
Points: 2
Task 3.3
The primary nameserver for this domain (You may need to look outside the pcap for this information. Think about tools that will give you the nameserver data for a specific domain)
Example: ns-something-something.something.something
Points: 6
Task 3.4
The hash provided by entering your Georgia Tech ID in the field (i.e. 9021042) (NOTE: The website is real and safe to access)
Example: abcdef1234567890953453434
Points: 11
Flag 4 (27 points)
The Attorney General is impressed by you but says they believe the group is also using another server to host a malicious file. It appears that one of the hackers recently accessed this server and downloaded a file from it. As a last minute request, the Attorney General is asking you to investigate what this file is, and where it is hosted.
Task 4.1
What is the IP address for the server in question?
Example: 192.168.8.7
Points:2
Task 4.2
What is the username used to log in the server?
Example: something
Points:4
Task 4.3
What is the password used to log in the server?
Example: something
Points:4
Task 4.4
One file is downloaded from the server, what is the file name?
Example: something
Points:3
Task 4.5
What is the programming language used to create this file?
Example: something
Points:5
Task 4.6
If you run this file you’ll get a Combined hash. What is the unique hash for your GTID (i.e 902042)?
Example: 12123123129413249121249aa
Points:9
Flag 5 (5 points)
Exhausted from the prior exercises, the attorney general has two more exercises for you to prove you belong here and that he shouldn’t fire you despite doing a good job. He mentions to you the hackers are getting smart and they have a website called http://www.didbastionbreak.com that has absolutely nothing to do with Azure Firewalls but everything to do with web application firewalls. Apparently there are some weaknesses integrated into the website which allow you to get to different parts of the website something called a path traversal attack.
Task 5.1
There is a flag labeled 5.1 that outputs a hash when you input in your GTID. Try to find the page and recover the flag
Example: tr95843fkdspugr8euyre0gfd
Points: 2
Task 5.2
What is the directory name that contains the hint for 5.3?
Example: something
Points: 1
Task 5.3
There is a flag labeled 5.3 that outputs a hash when you input in your GTID. Try to find the page and recover the flag
Example: 58437594ejgfdiohr8e054309
Points: 2
Suddenly, your phone rings. You see that the call is coming from Bill’ extension.You were ready to head back home and watch Netflix. Here we go again…
“Mark, great job so far! I was thinking here. This will not be the last time you will be doing this analysis on pcaps, so why don’t we start building a python class with several methods to automate some of the work for next time?” “When you say we, you are saying, why dont I build this class right?” you say.
“Of course not! I already created some skeleton code to help you out. You just need to build 3 functions now” Bill says.
“Oh, ok. Thank you Boss..”
As you hang up the call, Bill sends you via IM a zip file containing the python class and a attack pcap from a past incident so you can create the functions and test.
File submission instructions:
Man in the Middle – WireShark Assignment –
Name your submission file: project_mitm.json. In addition, ensure you replace the placeholders with the flags you retrieve from each relevant task.
Note: You can use Notepad++/TextEdit or Vim to create and edit this file. IMPORTANT: Do not use LibreOffice, Word, or any similar document editor. Your submission must be in proper JSON format with no special characters in order to pass the autograder; these document editors are likely to introduce special characters that will make your submission fail the autograder.
Here is an example of the provided JSON file:
{
“task1.1”: ““,
“task1.2”: ““,
“task1.3”: ““,
“task1.4”: ““,
“task1.5”: ““,
“task2.1”: ““,
“task2.2”: ““,
“task2.3”: ““,
“task2.4”: ““,
“task3.1”: ““,
“task3.2”: ““,
“task3.3”: ““,
“task3.4”: ““,
“task4.1”: ““,
“task4.2”: ““,
“task4.3”: ““,
“task4.4”: ““,
“task4.5”: ““,
“task4.6”: ““,
“task5.1”: ““,
“task5.2”: ““,
“task5.3”: “
}
And here is an example of how your submitted file should look: (Note: this is an example; none of these values are correct.)
An example of what the submitted file content should look like:
{
“task1.1”: “something.something.something”,
“task1.2”: “BigBird,CookieMonster,OscarTheGrouch”,
“task1.3”: “#WOW”,
“task1.4”: “a12342342bcde393202013434”,
“task1.5”: “Atlantis”,
“task2.1”: “maliciousactor”,
“task2.2”: “somefile.extension”,
“task2.3”: “something”,
“task2.4”: “a123242342342342342934234”,
“task3.1”: “something.something”,
“task3.2”: “192.168.1.10”,
“task3.3”: “ns-something-something.something.something”,
“task3.4”: “abcdef1234567890953453434”,
“task4.1”: “192.168.8.7”,
“task4.2”: “something”,
“task4.3”: “something”,
“task4.4”: “something”,
“task4.5”: “something”,
“task4.6”: “12123123129413249121249aa”,
“task5.1”: “tr95843fkdspugr8euyre0gfd”,
“task5.2”: “something”,
“task5.3”: “58437594ejgfdiohr8e054309”
}

Do you need this or any other assignment done for you from scratch?
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!