Hello guys, Iam searching for a client controller from a botnet in a PCAP file. Is there somebody who knows where and how I am able to find the client controller. The PCAP file is about 75mb with all kinds of different ip addresses. I am not familiar with WireShark yet. Any help will be appreciated. Thanks in advance. Regards, asked 22 Dec '13, 06:05 nothingatall closed 11 Jan '14, 12:26 Bill Meier ♦♦ |
The question has been closed for the following reason “Question is off-topic or not relevant” by Bill Meier 11 Jan ‘14, 12:26
2 Answers:
well, as there are several hundred (or even thousand) different bots in the wild, it's hard to give any good advice, as most of them have different 'control protocols'. So, if you don't know what kind of botnet you are looking for and you don't know the protocol being used, the only way to find botnet communication in the capture file (if it exists at all), is the hard way by removing what does not look like botnet traffic. The traffic that remains is the botnet traffic. Here is how I would start.
Regards answered 23 Dec '13, 11:57 Kurt Knochner ♦ |
I would take a look at the RSA Security Analytics forum for this. They have lists of some fresh botnet traffic captures for botnets. The SA parses don't translate to ws filters but you can amend them. They list for user agent strings, which in WS would http user agent contains, dst ip, and ports etc etc. There are 1000's of bad ips, you could try the freeware version of netwitness. Just experiment and apply them as filters to see what you get. One method would be to put a pfsense firewall up at home then you can create a more permanent solution. Here is an example. http.user_agent contains "GTB0.0" <- botnet useragent some ips to look for ip.dst == 117.20.165.245 || ip.dst == 174.56.218.245 || ip.dst == 184.172.204.122 || ip.dst == 208.103.243.252 || ip.dst == 37.154.32.249 || ip.dst == 66.85.130.234 || ip.dst == 70.180.80.2 || ip.dst == 77.238.214.249 || ip.dst == 78.83.197.4 || ip.dst == 79.115.90.253 || ip.dst == 80.48.209.4 || ip.dst == 86.105.156.250 answered 24 Dec '13, 21:06 rayyai beach |
Hello guys,
Thanks in advance for the answers. Thanks to you because I found what I was looking for!
Greets,
"from the Netherlands"
do you mind to tell us how?
I have the same problem with finding a client controller in a pcap file. I found the "server" but now i need to find the client controller.
Is there anyone who has a clue for me..?
I have found an webpage, but i can't see al the details i wish. It is asking for a token provided by the client controller.
I can't find that token. What do i miss and where do i have to look at?
@MarkV: stop spamming the site with your comments to an already closed question (I mean the other one)!! You will do yourself (and us) a favor if you ask this kind of questions in a malware analysis forum!