Network Analysis
Name | Response | Post-Analysis Lookup |
---|---|---|
www.google.com | 172.217.26.36 |
- UDP Requests
-
-
192.168.56.101:59369 164.124.101.2:53
-
192.168.56.101:61479 164.124.101.2:53
-
192.168.56.101:62324 164.124.101.2:53
-
192.168.56.101:137 192.168.56.255:137
-
192.168.56.101:138 192.168.56.255:138
-
192.168.56.101:49152 239.255.255.250:3702
-
192.168.56.101:59370 239.255.255.250:3702
-
192.168.56.101:62445 239.255.255.250:1900
-
192.168.56.101:62447 239.255.255.250:3702
-
52.231.114.183:123 192.168.56.101:123
-
GET
200
https://www.google.com/
REQUEST
RESPONSE
BODY
GET / HTTP/1.1
Host: www.google.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Wed, 11 Aug 2021 00:38:44 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=ISO-8859-1
P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
Server: gws
X-XSS-Protection: 0
X-Frame-Options: SAMEORIGIN
Set-Cookie: 1P_JAR=2021-08-11-00; expires=Fri, 10-Sep-2021 00:38:44 GMT; path=/; domain=.google.com; Secure
Set-Cookie: NID=221=ZaLWS4jFEd3q4IY3Q-FqoNVffWUdjxY1w8zLgPTZxE_jVsiSyHASf4h74Jj27ZnRs84tBv3iCHr43jkm4E3GmMrmULkm4d1caKaLlRZmdQfLf84jei42Nal3SdZoSShcGi9dF3w_INmHUT_AXQchwt4-bYeQoWPVlN8if1_g9wc; expires=Thu, 10-Feb-2022 00:38:44 GMT; path=/; domain=.google.com; HttpOnly
Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
Accept-Ranges: none
Vary: Accept-Encoding
Transfer-Encoding: chunked
GET
200
https://www.bing.com/
REQUEST
RESPONSE
BODY
GET / HTTP/1.1
Host: www.bing.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Cache-Control: private
Transfer-Encoding: chunked
Content-Type: text/html; charset=utf-8
P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND"
Set-Cookie: MUID=3C1CF879D6046E2836E8E8E9D7A66F53; domain=.bing.com; expires=Mon, 05-Sep-2022 00:38:44 GMT; path=/; secure; SameSite=None
Set-Cookie: MUIDB=3C1CF879D6046E2836E8E8E9D7A66F53; expires=Mon, 05-Sep-2022 00:38:44 GMT; path=/
Set-Cookie: _EDGE_S=F=1&SID=09ABF415645D62473E99E48565FF6393; domain=.bing.com; path=/
Set-Cookie: _EDGE_V=1; domain=.bing.com; expires=Mon, 05-Sep-2022 00:38:44 GMT; path=/
Set-Cookie: SRCHD=AF=NOFORM; domain=.bing.com; expires=Fri, 11-Aug-2023 00:38:44 GMT; path=/
Set-Cookie: SRCHUID=V=2&GUID=EFCE03C71E5D4A9EA426E58FBBCACBB3&dmnchg=1; domain=.bing.com; expires=Fri, 11-Aug-2023 00:38:44 GMT; path=/
Set-Cookie: SRCHUSR=DOB=20210811; domain=.bing.com; expires=Fri, 11-Aug-2023 00:38:44 GMT; path=/
Set-Cookie: SRCHHPGUSR=SRCHLANG=ko; domain=.bing.com; expires=Fri, 11-Aug-2023 00:38:44 GMT; path=/
Set-Cookie: _SS=SID=09ABF415645D62473E99E48565FF6393; domain=.bing.com; path=/
Set-Cookie: ULC=; domain=.bing.com; expires=Tue, 10-Aug-2021 00:38:44 GMT; path=/
Set-Cookie: _HPVN=CS=eyJQbiI6eyJDbiI6MSwiU3QiOjAsIlFzIjowLCJQcm9kIjoiUCJ9LCJTYyI6eyJDbiI6MSwiU3QiOjAsIlFzIjowLCJQcm9kIjoiSCJ9LCJReiI6eyJDbiI6MSwiU3QiOjAsIlFzIjowLCJQcm9kIjoiVCJ9LCJBcCI6dHJ1ZSwiTXV0ZSI6dHJ1ZSwiTGFkIjoiMjAyMS0wOC0xMVQwMDowMDowMFoiLCJJb3RkIjowLCJEZnQiOm51bGwsIk12cyI6MCwiRmx0IjowLCJJbXAiOjF9; domain=.bing.com; expires=Fri, 11-Aug-2023 00:38:44 GMT; path=/
X-SNR-Routing: 1
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
X-Cache: CONFIG_NOCACHE
X-MSEdge-Ref: Ref A: 55DB5811F3594CD595353C43D4630E2B Ref B: SLAEDGE0707 Ref C: 2021-08-11T00:38:44Z
Date: Wed, 11 Aug 2021 00:38:44 GMT
POST
200
http://37.0.10.102/rut/index.php
REQUEST
RESPONSE
BODY
POST /rut/index.php HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)
Host: 37.0.10.102
Content-Length: 91
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Wed, 11 Aug 2021 00:38:52 GMT
Server: Apache/2.4.38 (Win64) OpenSSL/1.0.2q PHP/5.6.40
X-Powered-By: PHP/5.6.40
Content-Length: 4
Content-Type: text/html; charset=UTF-8
ICMP traffic
No ICMP traffic performed.
IRC traffic
No IRC requests performed.
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49197 -> 172.217.26.132:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.101:49204 -> 37.0.10.102:80 | 2018358 | ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 | Potentially Bad Traffic |
TCP 192.168.56.101:49199 -> 13.107.21.200:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49197 172.217.26.132:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=www.google.com | f8:ac:5b:8f:1a:ee:5d:6b:5e:bc:fc:68:93:41:16:36:29:f6:62:36 |
TLSv1 192.168.56.101:49199 13.107.21.200:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 02 | CN=www.bing.com | e6:d6:8f:e4:5e:31:2c:7f:a5:1a:6c:d5:bb:5c:15:c6:54:47:bf:47 |
Snort Alerts
No Snort Alerts