I want to mimic a replay attack on controller PR402. I connected my computer with this controller via TCP/IP <-> Serial Bridge and I would like to analyse packets sent between computer and controller.
First of all, I send a command “Disarm the system” from software provided by the producer and capture these packets in Wireshark. What I would like to do is to capture this packet, find out how and where this command is located in this packet and perform a replay attack by sending a generated frame to the controller. I am new to Wireshark and I am not sure how to begin analysing these packets – I focused on interface which is connected with controller and have few commands captured.
To be more specific – these are (with my knowledge) steps I need to perform:
- Capture data with Wireshark
- Analyse them, dump to a file
- Generate proper packet/frame
- Transfer it to the controller and achieve disarming system
Could anyone give me a tip or recommendation what should I do next to achieve the goals listed above? I am not sure how to capture these data to a file and transfer them next to the controller. If it helps to see any more Wireshark screenshots or connection configuration, just let me know and I will post them.
I upload 2 captures. These are just some packets from running the same command – “Disarm system”. I found out that packets from 1st to 8th from the first screen and from 2nd to 9th have the same length and I think there this “Disarm system” command was transmitted. Let me know if this is the right direction of analysis.
Continue reading How to analyse packets sent by controller in Wireshark?→