Extract Web Traffic Evidence

WiresharkWiresharkBeginner
Practice Now

Introduction

In this challenge, you will step into the role of a cybersecurity trainee at NetDefenders investigating a potential data leak. Your instructor has provided a network traffic capture file, and your mission is to extract communication evidence between an employee and labex.io for your forensic training report.

Using Wireshark, you'll analyze the captured network traffic by filtering for TCP packets containing "labex," following the TCP stream to examine the complete conversation, and saving the evidence as a text file. This practical exercise demonstrates essential network forensics techniques used by security professionals to identify and document suspicious web communications.


Skills Graph

%%%%{init: {'theme':'neutral'}}%%%% flowchart RL wireshark(("Wireshark")) -.-> wireshark/WiresharkGroup(["Wireshark"]) wireshark/WiresharkGroup -.-> wireshark/display_filters("Display Filters") wireshark/WiresharkGroup -.-> wireshark/follow_tcp_stream("Follow TCP Stream") wireshark/WiresharkGroup -.-> wireshark/export_packets("Exporting Packets") subgraph Lab Skills wireshark/display_filters -.-> lab-548842{{"Extract Web Traffic Evidence"}} wireshark/follow_tcp_stream -.-> lab-548842{{"Extract Web Traffic Evidence"}} wireshark/export_packets -.-> lab-548842{{"Extract Web Traffic Evidence"}} end

Reveal Hidden Web Conversations

As a cybersecurity trainee at NetDefenders, you are investigating a potential data leak. Your instructor has captured network traffic from an employee accessing labex.io and assigned you to extract the communication details as evidence for your forensic training report.

Tasks

  • Filter the captured Wireshark traffic to display only TCP packets containing labex
  • Follow a TCP stream from the filtered packets and save it as tcp_evidence.txt in the project folder

Requirements

  1. Open the capture file network_evidence.pcapng in Wireshark, which is located in your /home/labex/project directory.
  2. Use a display filter to show only TCP packets that contain "labex" in their content.
  3. Select one of the filtered packets, then use Wireshark's "Follow TCP Stream" feature to view the entire conversation.
  4. Save the TCP stream content as a file named tcp_evidence.txt in the /home/labex/project directory.
  5. The saved file must contain the complete TCP stream data between your system and labex.io.

Examples

When you apply the correct filter, your Wireshark display might look something like this:

Wireshark filter

After following the TCP stream, you'll see a window showing the conversation data. The saved file will contain this data, which might include TLS handshake information and encrypted HTTPS traffic.

Hints

  • To filter for TCP packets containing specific text, use the format: tcp contains "text"
  • Right-click on a packet and select "Follow" > "TCP Stream" to view the entire conversation
  • In the "Follow TCP Stream" window, click the "Save As" button to save the stream data
  • Make sure to save the file with exactly the required name in the specified directory
  • The save dialog might default to a different location, so navigate to /home/labex/project before saving
โœจ Check Solution and Practice

Summary

In this challenge, I performed network forensics tasks using Wireshark to extract web traffic evidence from a captured packet file. The investigation focused on examining communication between a system and labex.io to document potential data leakage, which required applying specific display filters to isolate relevant TCP packets containing "labex" in their content.

The process involved opening a network capture file, filtering the traffic, following TCP streams to view complete communications, and saving the evidence as a text file. These techniques represent essential skills for cybersecurity professionals conducting network forensic investigations and preparing evidence for security incident reports.