Wireshark + libemu for shellcode detection のバックアップ(No.6)〜


Tips

Main feature: shellcode detection on the tree view of the packet headers

Wireshakr + libemu enables us to detect a shellcode within the packet selected on the tree view of packet headers by clicking "Detect a shellcode" on the context menu. When the shellocde is detected, the dialog box display the message "Detected a shellocde at the offset" and the offset value from the start of the byte code selected on the byte code view. After detection, the byte code view highlights the byte code of the shellcode.

Download: filewireshark-1.8.3+libemu.tgz

Requirements

libemu 0.2.0 SVN revision 2151

"Compile and build" status

Compile and build

  1. tar xvzf wireshark-1.8.3+libemu.tgz
  2. cd wireshark-1.8.3+libemu
  3. ./autogen.sh
  4. ./configure --enable-emu --with-emu-include=/opt/libemu/include --with-emu-lib=/opt/libemu/lib/libemu
  5. make

Usage

  1. Launch Wireshark
    $ ./wireshark
  2. Capture network traffic
  3. Select a packet on the packet list view
  4. Select a packet header on the header tree view
    select.png
  5. Right-click the packet header and click "Detect a shellocde" on the context menu.
    menu.png
    • Detected a shellcode
      detected.png
    • Not found a shellcode
      notdetected.png

トップ   新規 一覧 単語検索 最終更新   ヘルプ   最終更新のRSS