General techniques for identifying an unknown service

I have a specific sample I’d like feedback on, but my view is an answer about general techniques is more valuable for this site. I’ll leave the details in, in case anyone googling this bumped into the same service.

My questions:

  1. What are general techniques and resources for identifying an unknown service, or something on a non-standard port that isn’t being talkative?

  2. Does the behaviour below ring a bell with anyone? (Are there steps I have missed to further identify the service?)

While on an engagement, we have encountered an open port, 10001.
As you might’ve guessed, as far as I can tell it does not respond to protocols usually used on that port. My search has not been completely exhaustive but I have fuzzed the first three bytes and found a response for the first byte.

Observations on my specific unknown service:

  • Speaks TCP

  • When sent a capital i, I\n, it responds I213529 (last digits changed for privacy)

  • Messages seem to be null- and newline-terminated; anything but those after the capital i do not affect the behaviour, but a null before it will impair the response.

  • nmap shows it as scp-config, once as tcpwrapped

Continue reading General techniques for identifying an unknown service

Ideal Security Settings to avoid DDos/Buffer Overflow/SYN Flood attacks [on hold]

I am dealing with security issues and while my router is on medium setting for blocking, I would like to be able to game PvP online and/or not have to worry about Denial-of-service attacks on a daily basis. I am on a Mac (10…. Continue reading Ideal Security Settings to avoid DDos/Buffer Overflow/SYN Flood attacks [on hold]

How to analyse packets sent by controller in Wireshark?

I want to mimic a replay attack on controller PR402. I connected my computer with this controller via TCP/IP <-> Serial Bridge and I would like to analyse packets sent between computer and controller.

First of all, I send a command “Disarm the system” from software provided by the producer and capture these packets in Wireshark. What I would like to do is to capture this packet, find out how and where this command is located in this packet and perform a replay attack by sending a generated frame to the controller. I am new to Wireshark and I am not sure how to begin analysing these packets – I focused on interface which is connected with controller and have few commands captured.

To be more specific – these are (with my knowledge) steps I need to perform:

  • Capture data with Wireshark
  • Analyse them, dump to a file
  • Generate proper packet/frame
  • Transfer it to the controller and achieve disarming system

Could anyone give me a tip or recommendation what should I do next to achieve the goals listed above? I am not sure how to capture these data to a file and transfer them next to the controller. If it helps to see any more Wireshark screenshots or connection configuration, just let me know and I will post them.
I upload 2 captures. These are just some packets from running the same command – “Disarm system”. I found out that packets from 1st to 8th from the first screen and from 2nd to 9th have the same length and I think there this “Disarm system” command was transmitted. Let me know if this is the right direction of analysis.
Wireshark capture. Disarm System.

Continue reading How to analyse packets sent by controller in Wireshark?