Cyber@ANZ - Digital Forensics

Read this in "about 6 minutes".

Task Description

Suspicious network activity has been detected coming from a user on the ANZ network.

A laptop has been flagged up on our security systems due to suspicious internet traffic, and we need you to investigate the network traffic in order to establish what the user accessed and downloaded.

Your task is to examine their network activity and gather what information you can on what images they viewed and what files they accessed.

You have been provided with a packet capture file (pcap) containing all their recent network activity. There may be a number of artifacts contained within the packet capture file, and you will be expected to identify and report as many as possible.

You must provide a report on everything you found, and document what processes / steps you followed to achieve this.

Download Packet: here.


Solutions

Packet Analyses

I utilized the network analysis tool called Wireshark to read the provided packet capture file.

Analysing the traffic, I discovered that most communications occurred via HTTP service, so I decided to filter the HTTP traffic using the http.request query.

As I further investigated the communications, I found out some interesting “GET” requests demonstrated by the following image.

ANZ_Digital_Forensics/1.png

I then took the next step by downloading those images.

Wireshark provides a capability to extract the objects in the HTTP traffic.

  1. From Wireshark, I navigated to File -> Export Objects -> HTTP.
  2. There is a new Windows popped up -> Click Save All -> Pick a desired folder-> Choose.
ANZ_Digital_Forensics/2.png

Here are the md5 hashes of those images after they were downloaded:

ANZ_Digital_Forensics/3.png

Analysing those images, I was able to spot a few dubious points.

Sub-task 1

  • anz-logo.jpg and bank-card.jpg are two images that show up in the users network traffic. Opened those images with an Image Viewer application, I obtained the following results.

  • anz-logo.jpg

ANZ_Digital_Forensics/4.png
  • bank-card.jpg
ANZ_Digital_Forensics/5.png

Sub-task 2

  • The network traffic for the images ANZ1.jpg and ANZ2.jpg is more than it appears.
  • Employing a tool called strings against the ANZ1.jpg, I discovered a hidden message.
ANZ_Digital_Forensics/6.png

I achieved the same result by inspecting the tcp stream 14”.

The Wireshark filter query is: tcp.stream eq 14 -> Follow TCP Stream. At the end of the stream, the hidden message showed up.

ANZ_Digital_Forensics/7.png

Open the image with HxD application, I could also retain the same output.

ANZ_Digital_Forensics/hxd.png

I followed the same techniques with the ANZ2.jpg image and managed to allocate the hidden messages shown as below.

ANZ_Digital_Forensics/8.png

Sub-task 3

  • The how-to-commit-crimes.docx file type is ASCII. I could confirm that with the file command.
ANZ_Digital_Forensics/9.png

Here is how the content looks like on the wire.

ANZ_Digital_Forensics/10.png

Sub-task 4

  • The user accessed three pdf documents: ANZ_Document.pdf, ANZ_Document2.pdf and evil.pdf. Inspecting those .pdf respectively …
  • ANZ_Document.pdf
ANZ_Digital_Forensics/11.png
  • ANZ_Document2.pdf
ANZ_Digital_Forensics/12.png
  • The evil.pdf file is suspicious with the following contents.
ANZ_Digital_Forensics/13.png

Sub-task 5

  • The hiddenmessage2.txt file is actually a JPG image. This could be confirmed with the JFIF file signature.
ANZ_Digital_Forensics/14.png

By changing the file extension to hiddenmessage2.jpg. Here is how it looks like.

ANZ_Digital_Forensics/15.png

Sub-task 6

  • A hidden image is embedded in the atm-image.jpg. I could confirm that by inspecting the file stream with Wireshark.
ANZ_Digital_Forensics/16.png
  • Scrolling down a little bit, I found the second JFIF file signature.
ANZ_Digital_Forensics/17.png
  • Extracting the second image with foremost.
ANZ_Digital_Forensics/18.png
  • Here is how it looks like.
ANZ_Digital_Forensics/19.png

Sub-task 7

  • The broken.png file content is base64-encoded. I decoded the content, and took a look at the file header, it appears to be a PNG image.
ANZ_Digital_Forensics/20.png
  • I simply redirected the decoded content of broken.png to broken_recover.png.
  • Here is how the broken_recover.png image looks like when its recovered.
ANZ_Digital_Forensics/21.png

Sub-task 8

  • The securepdf.pdf is a actually a .zip file. Once again, I could state that by checking the file type with file.
ANZ_Digital_Forensics/22.png
  • Extract the zip, I was prompted to enter a password.
ANZ_Digital_Forensics/23.png
  • Crack the zip with fcrackzip, the yielded password is secure.
ANZ_Digital_Forensics/24.png
  • Extract the zip with the password of secure, I managed to recover the rawpdf.pdf.
ANZ_Digital_Forensics/25.png
  • Here is how the file looks like when its recovered.
ANZ_Digital_Forensics/26.png