FunTech Inc. have provided a PCAP from their FunGames e-commerce platform following a suspected breach. The task is to trace the full attack chain from initial access through to data exfiltration, identifying the tools, techniques, and data involved.
192[.]168[.]8[.]130192[.]168[.]8[.]142Filtering for HTTP traffic immediately reveals a high volume of GET requests from the attacker to /game-details.php with heavily URL-encoded payloads — classic sqlmap fingerprinting and enumeration. The User-Agent header confirms the tool:
User-Agent: sqlmap/1.8.6.3#dev (https://sqlmap.org)
The attacker was injecting into the id parameter using UNION-based blind SQLi, probing the database version and enumerating tables.

Key Wireshark tip: Rather than manually scrolling hundreds of sqlmap requests, use Edit → Find Packet → String (Packet Bytes) to search for terms like username or password to locate the exact stream containing the credential dump.
One of the successful UNION SELECT responses returned data from the users table. The sqlmap delimiter kglnpd separates the concatenated columns in the response, embedded inside the page HTML:
$qjxkq["Mattkglnpdm.jarovic@fungames.comkglnpd1kglnpdMa77.J@r0v1c-2024kglnpdJarovickglnpdmjarovic"]qvbzq
Parsing out the sqlmap delimiters reveals:
mjarovic@fungames[.]comMa77.J@r0v1c-2024

With valid credentials in hand, the attacker authenticated to the victim over SSH. To escalate from the user account to root, a file named exploit was transferred to the victim machine — a 64-bit ELF statically linked binary:
exploit: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
SHA256: d8dd09b01eb4e363d88ff53c0aace04c39dbea822b7adba7a883970abbf72a77
Submitting the hash to VirusTotal identifies this as a proof-of-concept exploit for CVE-2024-1086 — a use-after-free vulnerability in the Linux kernel’s nf_tables netfilter component, allowing local privilege escalation to root.

With root access established, the attacker exfiltrated sensitive customer data without transferring any files. The key filter to find post-compromise traffic:
ip.src == 192.168.8.142 && !ssh && !http
This reveals a single malformed DNS query from the victim to the attacker — DNS exfiltration. The query carries the stolen data hex-encoded in the query name:
j4672616e6b204d696c6c7320313233343536373839313233343536372065787020646174652030382f32382063767620313233200a
Decoding with Python (stripping the leading j label byte):
python3 -c "print(bytes.fromhex('4672616e6b204d696c6c7320313233343536373839313233343536372065787020646174652030382f32382063767620313233200a').decode())"
```
**Output:**
```
Frank Mills 1234567891234567 exp date 08/28 cvv 123
A customer’s full credit card details — number, expiry, and CVV — exfiltrated in a single DNS packet with no file transfer, no HTTP POST, and no obvious C2 traffic. The technique maps to T1071.004 — Application Layer Protocol: DNS.
The biggest time sink in this lab was manually scrolling through sqlmap’s noise. sqlmap generates hundreds of requests during enumeration — trying to visually identify the one successful credential dump by hand is painful. The fix is simple:
Edit → Find Packet → Packet Bytes → String → username
That jumps straight to the relevant stream. Same approach works for any keyword you’re hunting — password, admin, SELECT, etc. Get comfortable with packet search before reaching for display filters.
The DNS exfil piece reinforces another good habit — always check what the victim machine is talking to after the main attack traffic. Filtering:
ip.src == 192.168.8.142 && !ssh && !http
Strips away all the noise and surfaces the one malformed DNS packet that would otherwise be invisible in a sea of sqlmap requests. A single DNS query containing a customer’s full CC details is easy to miss if you’re not looking for traffic anomalies beyond the obvious attack vectors.
| Type | Value |
|---|---|
| IP — Attacker | 192[.]168[.]8[.]130 |
| IP — Victim | 192[.]168[.]8[.]142 |
| Compromised credentials | mjarovic@fungames[.]com / Ma77.J@r0v1c-2024 |
| Exploit binary | exploit |
| Exploit SHA256 | d8dd09b01eb4e363d88ff53c0aace04c39dbea822b7adba7a883970abbf72a77 |
| CVE | CVE-2024-1086 |
| Exfiltrated data | Frank Mills — CC 1234567891234567 exp 08/28 CVV 123 |
| Exfil method | DNS hex encoding |