Network Traffic Analysis
Introduction
It's crucial that we understand the networking behind a binary. What connections it's making, what protocol it utilizes and the host it's attempting to communicate with.
Wireshark
This example I am running the following binary I took from HackTheBox using mono (wine will also work).
└─$ mono ./UserInfo.exe -v find -first testr
[*] LDAP query to use: (givenName=testr)
[-] Exception: No Such Object
Notice that the binary is making a connection using the ldap protocol, which is an un-encryted. protocol The username and password is in plaintext.


Last updated