{"id":289,"date":"2025-06-27T03:30:08","date_gmt":"2025-06-27T03:30:08","guid":{"rendered":"https:\/\/epbrtcybersecurityportfolio.xyz\/?p=289"},"modified":"2025-06-27T03:30:08","modified_gmt":"2025-06-27T03:30:08","slug":"http","status":"publish","type":"post","link":"https:\/\/epbrtcybersecurityportfolio.xyz\/?p=289","title":{"rendered":"HTTP"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\"><strong>Overview<\/strong><\/h3>\n\n\n\n<p>In this lab, I explored the intricacies of the HTTP protocol while gaining practical experience with network traffic analysis and intrusion detection systems (IDS), specifically Snort. The goal was to extract and analyze HTTP traffic captured from a live network segment, then prepare the data for further inspection using IDS tools.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Objectives<\/strong><\/h3>\n\n\n\n<p>The lab focused on:<\/p>\n\n\n\n<ul class=\"wp-block-list is-style-default\">\n<li>Deepening understanding of the HTTP protocol and how it manifests in raw packet data.<\/li>\n\n\n\n<li>Practicing the use of IDS rule sets related to HTTP activity.<\/li>\n\n\n\n<li>Preparing packet captures for detection and analysis using Snort.<\/li>\n\n\n\n<li><\/li>\n\n\n\n<li><\/li>\n<\/ul>\n\n\n\n<p>1) Using the <code>analyze<\/code> tool on the course VM, extract all HTTP traffic observed by the <strong>dmz<\/strong> sensor on <strong>TCP port 80<\/strong> during the time range from <strong>05\/02\/19 09:00:00<\/strong> to <strong>05\/02\/19 11:00:00<\/strong>. Save the extracted data to a file named <code>http_extract.pcap<\/code>.<\/p>\n\n\n\n<p>Place this file in the directory <code>\/sec503\/Exercises\/Day3<\/code><br>This will ensure it is accessible for use with Snort or Suricata in the upcoming exercises.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"76\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-112-1024x76.png\" alt=\"\" class=\"wp-image-290\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-112-1024x76.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-112-300x22.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-112-768x57.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-112.png 1383w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>2) Review the extracted packets using Wireshark and answer the following questions about the capture:<\/p>\n\n\n\n<p>&#8211; Reassemble the session between host 192.168.61.20 and host 134.170.104.154. What version of HTTP is in use? What kind of request is sent? How does the server respond? What kind of server does it appear to be?  <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"573\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-113-1024x573.png\" alt=\"\" class=\"wp-image-292\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-113-1024x573.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-113-300x168.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-113-768x430.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-113.png 1524w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>We see that  HTTP version 1.1 is in use. The client is sending an HTTP POST request to the server meaning it is sending data to the server, likely for uploading. The body of the request contains 1324 bytes of data. The target host for this request is ssw.live.com. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"248\" height=\"91\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-114.png\" alt=\"\" class=\"wp-image-294\"\/><\/figure>\n\n\n\n<p>The server HTTP response is a successful 200 ok response. The server acknowledged and successfully processed the request but did not return any content. This is typical for many upload or form submission responses that only need to confirm success without sending data back. The webserver is a Microsoft-IIS\/7.5.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"295\" height=\"121\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-115.png\" alt=\"\" class=\"wp-image-295\"\/><\/figure>\n\n\n\n<p>3) Create a Snort Rule that can detect a possible indicator of data exfiltration using one or more Snort Http rule options.  <\/p>\n\n\n\n<p>&#8211; What in the URL might indicate a potential exfiltration attempt ?<\/p>\n\n\n\n<p>The URL in question is <code>\/UploadData.aspx<\/code>. Even though it\u2019s not definitive proof, seeing the word \u201cUpload\u201d in the URL is a strong clue that the client may be sending data to the server\u2014something often associated with exfiltration.<\/p>\n\n\n\n<p>-why is it better to scan for this term in the url instead of the full request or response body?<\/p>\n\n\n\n<p>Urls are generally short and follow predictable patterns, making them much easier and faster to scan for keywords like &#8220;upload&#8221;. searching the full session payload for this term could be very inefficient, especially since we wouldn&#8217;t know where to start looking.<\/p>\n\n\n\n<p>&#8211; create a snort or rule in your local.rules file under \/sec503\/exercises\/day3 that looks for the word &#8220;upload&#8221; in a url. confirm that your rule successfully detects the activity.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"28\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-117-1024x28.png\" alt=\"\" class=\"wp-image-303\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-117-1024x28.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-117-300x8.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-117-768x21.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-117.png 1120w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Let&#8217;s verify if this alert works properly:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"130\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-118-1024x130.png\" alt=\"\" class=\"wp-image-305\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-118-1024x130.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-118-300x38.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-118-768x97.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-118.png 1277w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Bingo<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview In this lab, I explored the intricacies of the HTTP protocol while gaining practical experience with network traffic analysis and intrusion detection systems (IDS), specifically Snort. The goal was to extract and analyze HTTP traffic captured from a live network segment, then prepare the data for further inspection using IDS tools. Objectives The lab [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-289","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/posts\/289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=289"}],"version-history":[{"count":5,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/posts\/289\/revisions"}],"predecessor-version":[{"id":307,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/posts\/289\/revisions\/307"}],"wp:attachment":[{"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}