Introduction

In modern network environments, monitoring and analyzing traffic is crucial for detecting and mitigating security incidents. This lab presents a network forensic challenge where an internal server has been flagged for unusual outbound connections to an unknown external IP. Initial analysis suggests possible data exfiltration, and the goal of this investigation is to determine the source and method of compromise by examining network logs and captured packets. Using Wireshark we will analyze various network protocols, including FTP, DNS, TLS, and HTTP, to uncover key artifacts and trace the suspicious activity. By filtering and dissecting packets, we will identify potential credentials exposure, unauthorized file transfers, and encrypted communications, which may provide insight into how the system was accessed and what data may have been exfiltrated. Through this walkthrough, we will extract sensitive metadata, analyze network-based authentication attempts, and follow the footprints left by the attacker within the network traffic. By methodically inspecting each protocol, we aim to identify indicators of compromise (IOCs) and determine whether malicious actors leveraged misconfigurations or plaintext transmissions to infiltrate the system.


Analysis

Q1 What is the FTP password?

The File Transfer Protocol (FTP) is a widely used protocol for transferring files betw

Unlock Your Full Learning Experience with BlueYard Labs

Sign up to track your progress, unlock exclusive labs, and showcase
your achievements—begin your journey now!
Join for Free