TShark Challenge II:Directory
Tools








Last updated








Last updated
tshark -r directory-curiosity.pcap -Y 'dns.qry.name matches "\\[.\\]|(\\.|)\\."' -T fields -e frame.number -e dns.qry.name
tshark -r directory-curiosity.pcap -Y 'http.host == "jx2-bavuong.com"' -T fields -e frame.number | wc -l
tshark -r directory-curiosity.pcap -Y 'http.host == "jx2-bavuong.com"' -T fields -e ip.dsttshark -r directory-curiosity.pcap -Y "http contains \\"jx2-bavuong.com\\"" -T fields -e http.servertshark -r directory-curiosity.pcap -Y "http contains \\"jx2-bavuong.com\\"" -T fields -e http.file_data
#We ended up dumping all the files being connected to this http domain
#This will create a new directory called extracted files, go inside it and use the command
sha256sum vlauto.exe #and this will provide you your SHA256
tshark -r directory-curiosity.pcap --export-objects "http,./extracted_files"