Malicious Traffic Analysis

The following is a combination of notes, research, and knowledge acquired from a malicious traffic analysis course. The focus of this post is on identifying malicious activity in Wireshark. For basic Wireshark setup and tips for filtering, check here.
Note: A good rule of thumb in terms of physical requirements is that whatever the pcap size is, you should have four times that amount of RAM available.
Lifecycle: Reconnaissance
This includes discovery as well as scanning for hosts, fingerprinting, sevices, and network mapping.
TTL-OS Table
When you ping an ip address, the Operating System can sometimes be surmised by the TTL value. The table below is from this maintained website.
| Device / OS | Version | Protocol | TTL |
|---|---|---|---|
| AIX | TCP | 60 | |
| AIX | UDP | 30 | |
| BSDI | 3.2, 4.1 | ICMP | 255 |
| Compa | BSD/OS 3.1 and 4.0 | ICMP | 255 |
| Cisco | ICMP | 64 | |
| DEC Pathworks | ICMP | 254 | |
| Foundry | V5 | TCP and UDP | 30 |
| FreeBSD | 2.1R | ICMP | 64 |
| FreeBSD | 3.4, 4.0 | TCP and UDP | 64 |
| FreeBSD | 5 | ICMP | 255 |
| HP-UX | 9.0x | ICMP | 64 |
| HP-UX | 10.01 | TCP and UDP | 30 |
| HP-UX | 10.2 | TCP and UDP | 64 |
| HP-UX | 11 | ICMP | 255 |
| Irix | 11 | ICMP | 255 |
| Irix | 5.3 | TCP | 64 |
| juniper | 6.x | TCP and UDP | 60 |
| MPE/IX (HP) | 6.5.3, 6.5.8 | TCP and UDP | 60 |
| Linux | ICMP | 255 | |
| Linux | ICMP | 64 | |
| Linux | 2.0.x kernel | ICMP | 200 |
| Linux | 2.2.14 kernel | ICMP | 64 |
| Linux | 2.4 kernel | ICMP | 255 |
| Linux | Red Hat 9 | ICMP | 255 |
| MacOS/MacTCP | 2.0.x | ICMP and TCP | 64 |
| MacOS/MacTCP | X (10.5.6) | TCP and UDP | 60 |
| NetBSD | ICMP | 255 | |
| Netgear FVG318 | ICMP and UDP | 64 | |
| OpenBSD | 2.6 & 2.7 | ICMP | 255 |
| OpenVMS | 07.01.2002 | ICMP | 255 |
| OS/2 | TCP/IP 3.0 | ICMP | 64 |
| OSF/1 | V3.2A | TCP | 60 |
| OSF/1 | V3.2A | UDP | 30 |
| Solaris | 2.5.1, 2.6, 2.7, 2.8 | ICMP | 255 |
| Solaris | 2.8 | TCP | 64 |
| Stratus | TCP_OS | ICMP | 255 |
| Stratus | TCP_OS (14.2-) | TCP and UDP | 30 |
| Stratus | TCP_OS (14.3+) | TCP and UDP | 64 |
| SunOS | STCP | ICMP/TCP/UDP | 60 |
| SunOS | 4.1.3/4.1.4 | TCP and UDP | 60 |
| Ultrix | 5.7 | ICMP and TCP | 255 |
| VMS/Multinet | V4.1/V4.2A | TCP | 60 |
| VMS/TCPware | V4.1/V4.2A | UDP | 30 |
| VMS/Wollongong | V4.2 – 4.5 | ICMP | 255 |
| VMS/UCX | TCP and UDP | 64 | |
| Windows | 1.1.1.1 | TCP | 128 |
| Windows | 1.1.1.1 | UDP | 30 |
| Windows | for Workgroups | TCP and UDP | 128 |
| Windows | 95 | TCP and UDP | 32 |
| Windows | 98 | ICMP | 32 |
| Windows | 98, 98 SE | ICMP | 128 |
| Windows | 98 | TCP | 128 |
| Windows | NT 3.51 | TCP and UDP | 32 |
| Windows | NT 4.0 | TCP and UDP | 128 |
| Windows | NT 4.0 SP5- | 32 | |
| Windows | NT 4.0 SP6+ | 128 | |
| Windows | NT 4 WRKS SP 3, SP 6a | ICMP | 128 |
| Windows | NT 4 Server SP4 | ICMP | 128 |
| Windows | ME | ICMP | 128 |
| Windows | 2000 pro | ICMP/TCP/UDP | 128 |
| Windows | 2000 family | ICMP | 128 |
| Windows | Server 2003 | 128 | |
| Windows | XP | ICMP/TCP/UDP | 128 |
| Windows | Vista | ICMP/TCP/UDP | 128 |
| Windows | 7 | ICMP/TCP/UDP | 128 |
| Windows | Server 2008 | ICMP/TCP/UDP | 128 |
| Windows | 10 | ICMP/TCP/UDP | 128 |
Display Anomalous TCP Flags
By applying the filter below, you will display packets with TCP flag combinations not included in the normal set, helping to identify potential anomalous activity.
Detect unusual TCP flag combinations:
tcp && (!(tcp.flags == 0x02 || tcp.flags == 0x12 || tcp.flags == 0x10 || tcp.flags == 0x01 || tcp.flags == 0x04 || tcp.flags == 0x18))










