Not finding the argus payload of a flow inside the pcap

Carter Bullard carter at qosient.com
Tue Jun 2 23:44:52 EDT 2015


Hey Sebas,
I’ve checked out the pcap that you sent, and Argus appears to be doing
the right thing.  Argus assembles its user data from as many packets as
are needed to fill up the ARGUS_CAPTURE_DATA_LEN.

The example TCP that you showed that has all the “0.0.0.0.” in the user
data buffers is actually correct.  For this TCP, starting on packet #1988
in your pcap file, there are many hundreds of packets, back to back, 
that contain only 2 bytes in the data payload,  hex value 0x3000.
0x3000 is coded as "0.” since you are printing in ascii.  0x30 is a ‘0' and
0x00 doesn’t have an ascii value, so it will be printed as a ‘.’

So there is a very long stream of 0x3000’s in the payloads of the TCP
packets, and argus concatenates these tiny payloads to generate a
300 byte buffers full of 0x300030003000300030003000….  This is
correct behavior.

To see the actual hex values of the user data payloads, you need to use
   ra -M printer=hex

which will give you a traditional hex dump output for the user data buffers.
Or you can use this:
   ra -M printer=encode32

which will printout the hex values in a single line.

So, you can’t find these payload values in the packet capture, because the
individual packets have very tiny payloads.  Nothing in tcpdump or wireshark
will assemble the payload stream and show what is actually being transported.

Sorry for the confusion, 

Carter

> On Jun 2, 2015, at 2:53 PM, el draco <eldraco at gmail.com> wrote:
> 
> Hi list
> 
> We have a malware capture that we are analyzing with argus, but we
> came across some issue that we can not explain: argus is showing some
> payload that we can not find in the pcap file.
> 
> The file is : https://mcfp.felk.cvut.cz/publicDatasets/CTU-Malware-Capture-Botnet-120-1/2015-04-22_capture-win4.pcap
> 
> If we extract the argus flows with some amount of payload data and we
> print the flows with ra:
> 
> argus -F argus_bi.long.conf -r 2015-04-22_capture-win4.pcap -w - |ra
> -n -r - -F ra.conf.realtime |less
> 
> After 160 flows we can see some lines like these (notice that ra is
> printing the suser and duser fields:
> 
> 03:21:39.147159 tcp 147.32.83.57 5552   <?> 10.0.2.104 49227 CON 192
> 10624  s[120]=0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
> d[120]=0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
> 
> Argus is reporting almost 60 flows like this (each one is a flow that
> timeouted according to our ARGUS_FLOW_STATUS_INTERVAL=3600
> configuration)
> 
> The flows indicate that the payload content of some flows have the
> data: "0.0.0.0.0.0.0.0.0.0.0.".
> 
> However, if we try to search for this data inside the pcap file by
> hand, I'm not able to find it. Which is weird:
> 
> grep "0.0.0.0.0.0.0.0.0.0.0." 2015-04-22_capture-win4.pcap
> Gives us nothing.
> 
> Finding inside the traffic with tcpdump gives us nothing:
> tcpdump -n -s0 -r 2015-04-22_capture-win4.pcap -A|less
> 
> Strings give us nothing:
> strings 2015-04-22_capture-win4.pcap |grep "0.0.0.0.0.0.0.0.0.0.0."
> 
> So my question is, what I'm doing wrong? where is the text being
> reported by argus coming from?
> 
> Thanks!
> Sebas
> 
> 
> 
> -- 
> https://pgp.mit.edu/pks/lookup?op=get&search=0x9D9A358CA10F1601
> <ra.conf.realtime><argus_bi.long.conf>




More information about the argus mailing list