LetsDefend HTTP Basic Authentication Analysis – PCAP Investigation
Description
In this challenge, we receive a log indicating a possible web-based attack.
The objective is to analyze a provided PCAP file and extract meaningful information related to HTTP activity and authentication.
Investigation Process
Recovering the PCAP File
The PCAP was initially obtained in a Vm from there i obtained the files.
The following commands were used to take the files out of the vm as here was not much network traffic so no large size of the file:
base64 cap.pcap > cap.b64
base64 -d cap.b64 > recovered.pcap
After decoding, the file size was verified to confirm successful recovery.

Traffic Overview
Initial inspection in Wireshark showed:
- A very small number of packets
- Mostly ICMP and HTTP traffic
- Very few unique IP addresses
This suggests focused communication rather than automated scanning or exploitation.

Network Observations
- The IP address 1.1.1.5 is mainly associated with ICMP traffic and may represent a DHCP or internal service.
- The most likely client (possible attacker) IP is 192.168.63.20.
- Since the traffic is from an internal network, this could also represent legitimate user activity.

Filtering HTTP Requests
To identify HTTP GET requests, the following Wireshark filter was applied:

http.request.method == “GET”
This confirmed that there are exactly five HTTP GET requests in the capture.

Extracting Credentials from HTTP Basic Authentication
An Authorization header was discovered in one of the HTTP requests:
Authorization: Basic d2ViYWRtaW46VzNiNERtMW4=
HTTP Basic Authentication uses Base64 encoding.
Decoding this value reveals the credentials:
webadmin:W3b4Dm1n
Full HTTP Request and Response
GET / HTTP/1.0
Host: 192.168.63.100
Accept: text/html, text/plain, text/css, text/sgml, /;q=0.01
Accept-Encoding: gzip, compress, bzip2
Accept-Language: en
User-Agent: Lynx/2.8.7rel.1 libwww-FM/2.14 SSL-MM/1.4.1 OpenSSL/0.9.8n
Authorization: Basic d2ViYWRtaW46VzNiNERtMW4=
HTTP/1.1 200 OK
Date: Thu, 20 Jan 2011 07:39:08 GMT
Server: Apache/2.2.15 (FreeBSD) DAV/2 mod_ssl/2.2.15 OpenSSL/0.9.8n
Content-Type: text/html
Content-Length: 44
Conclusion
This challenge demonstrates why HTTP Basic Authentication without TLS is insecure.
Credentials can be trivially extracted from packet captures.
Key takeaways:
- Base64 is not encryption
- Credentials should never be transmitted without TLS
- Internal network traffic must still be monitored
- PCAP analysis is a critical SOC skill
Challenge Questions & Answers
How many HTTP GET requests are in the PCAP?
Answer: 5What is the server operating system?
Answer: FreeBSDWhat is the name and version of the web server software?
Answer: Apache/2.2.15What is the version of OpenSSL running on the server?
Answer: OpenSSL/0.9.8nWhat is the client’s User-Agent?
Answer: Lynx/2.8.7rel.1 libwww-FM/2.14 SSL-MM/1.4.1 OpenSSL/0.9.8nWhat username was used for HTTP Basic Authentication?
Answer: webadminWhat password was used for HTTP Basic Authentication?
Answer: W3b4Dm1n
#letsdefend #soc #http #pcap #wireshark #networkforensics