This project demonstrates the identification and documentation of malicious network activity using packet capture (PCAP) files and Wireshark. This analysis investigates two separate captures highlighting distinct attack scenarios, providing insights into the methods employed by attackers and the necessary defenses to counteract such threats.
- Capture 1 focuses on unauthorized access and data exfiltration, where an attacker employs brute-force techniques to compromise credentials and retrieve a sensitive document from the target server.
- Capture 2 delves into a potential Denial-of-Service (DoS) attack and a brute-force password cracking attempt, showcasing how attackers attempt to disrupt services and gain unauthorized access to critical systems.
This project shows the importance of network monitoring and traffic analysis in detecting and responding to cyber threats and also serves as a practical demonstration of applying cybersecurity principles to real-world scenarios.
Through the analysis of Capture 1 and Capture 2, I gained hands-on experience in:
- Network Traffic Analysis: Interpreting packet capture data using Wireshark to identify patterns, anomalies, and potential attack vectors.
- Incident Investigation: Tracing attack timelines, understanding attacker behaviors, and documenting findings systematically.
- Brute-Force and DoS Detection: Identifying brute-force password attempts and SYN flood attacks, and understanding their impact on network resources.
- Technical Documentation: Structuring and presenting cybersecurity findings in a professional format, suitable for inclusion in a portfolio or report.
- Packet Range: [10 - 71]
- Details: A legitimate user (
192.168.56.102
) successfully logs into the server (192.168.56.101
) via FTP using the credentials:- Username:
ftpuser
- Password:
cmpsem055
- Username:
- The user uploads a file named
Confidential Information.doc
.

Successful login and file upload captured in Wireshark.
- Packet Range: [86 - 100]
- Details: Approximately 15.5 seconds later, a TCP connection attempt originates from a different IP address (
192.168.56.1
). - The connection succeeds, but immediately, the server logs a 500 Internal Server Error and prompts for login credentials.

TCP connection attempt from 192.168.56.1
and server error log.
- Packet Range: [105 - 14143]
- Details: The user (
192.168.56.1
) initiates a password brute-force attack over a period of 42.11 minutes, attempting numerous passwords using a dictionary list.- First 3 Passwords:
aaa
,abc
,academia
- Last 3 Passwords:
root
,backup
,cmpsem055
- First 3 Passwords:
- The attack was successfull with the correct password,
cmpsem055
.

Start of Brute-force attack.

Successful login.
- Packet: [14222]
- Details: After gaining access, the attacker navigates to the directory containing the confidential document.
- Request:
RETR Confidential Information.doc
- Response:
226 File send OK.
- Request:
- The attacker successfully retrieves the file.

File retrieval request and response.
- The capture reveals an unauthorized access and data exfiltration attempt.
- The attacker employs a brute-force attack to bypass authentication mechanisms.
- The sensitive document
Confidential Information.doc
is successfully retrieved, as it was not encrypted. - The FTP protocol sends credentials (USER and PASS) in plaintext, which makes it vulnerable to interception.
- Stronger Password Policies: Enforce complex password requirements (e.g., minimum length of 8, special characters).
- Monitoring and Logging: Regularly review logs for unusual patterns like repeated failed login attempts.
- Two-Factor Authentication (2FA): Add an additional layer of security to prevent unauthorized access.
- Data Encryption: Encrypt sensitive documents to protect their content even if unauthorized access occurs.
Using the Export FTP-DATA Object List, there are two more files on the analyzed network traffic.
-
Other Files on the Server:
1.png
: A png image of a skull and crossbones in white color.
memo
: Contains the text, "this is a memo to remind all users not to share their passwords."
-
Content of
Confidential Information.doc
:- "This file contains confidential information and should not be distributed."
This analysis highlights the critical importance of proactive security measures, such as password management, activity monitoring, and data encryption, in safeguarding sensitive information against unauthorized access and potential breaches.
This analysis focuses on identifying and documenting a potential DoS attack and brute-force password cracking attempt captured in a network packet analysis.
- Packet Range: [32 - 88]
- Details:
- The attacker (
192.168.56.1
) initiates a potential SYN flood attack (half-open attack) against the target (192.168.56.102
). - SYN packets are sent in rapid succession, overwhelming the target system with incomplete connection requests, a common tactic in DoS attacks.
- The attacker (

SYN flood packets as displayed in Wireshark.
- Packet Range: [138 - 81188]
- Details:
- The attacker continues their malicious activity with a brute-force attack against the target server.
- Numerous password attempts are made systematically to gain unauthorized access.
- Example passwords captured in the data include:
- First 3:
eeeeeeee
,eeeeeeei
,eeeeeeeo
- Last 3:
eeeeeESU
,eeeeeESm
,eeeeeESM
- First 3:


Brute-force password attempts shown in Wireshark.
-
Denial-of-Service (DoS) Activity
- The SYN flood attack observed in this capture is an attempt to overwhelm the target server's resources with incomplete TCP connections.
-
Brute-Force Password Attack
- The attacker systematically attempts various passwords in an attempt to gain unauthorized access to the target server.
Screenshot Placeholder: Summary of findings in Wireshark (e.g., filtered views of DoS and brute-force attack patterns).
-
Mitigation of DoS Attacks
- Implement mechanisms to detect and mitigate DoS attacks, such as:
- Rate limiting for incoming connection requests.
- SYN cookies to handle half-open connections more effectively.
- Traffic filtering to block malicious IPs.
- Implement mechanisms to detect and mitigate DoS attacks, such as:
-
Enhanced Password Policies
- Enforce strong password requirements, including:
- Minimum length (e.g., 12+ characters).
- Complexity (e.g., mix of uppercase, lowercase, numbers, and special characters).
- Account lockout after a limited number of failed login attempts.
- Enforce strong password requirements, including:
-
Two-Factor Authentication (2FA)
- Add 2FA for all login mechanisms to enhance security against brute-force attacks.
This analysis shows the significance of strong defenses against DoS and brute-force attacks, including preventive measures such as rate limiting, password policy enforcement, and multi-factor authentication.