CyberChef

From https://github.com/gchq/CyberChef :

The Cyber Swiss Army Knife

CyberChef is a simple, intuitive web app for carrying out all manner of “cyber” operations within a web browser. These operations include simple encoding like XOR or Base64, more complex encryption like AES, DES and Blowfish, creating binary and hexdumps, compression and decompression of data, calculating hashes and checksums, IPv6 and X.509 parsing, changing character encodings, and much more.

The tool is designed to enable both technical and non-technical analysts to manipulate data in complex ways without having to deal with complex tools or algorithms.

There are four main areas in CyberChef:

  1. The input box in the top right, where you can paste, type or drag the text or file you want to operate on.
  2. The output box in the bottom right, where the outcome of your processing will be displayed.
  3. The operations list on the far left, where you can find all the operations that CyberChef is capable of in categorised lists, or by searching.
  4. The recipe area in the middle, where you can drag the operations that you want to use and specify arguments and options.

Screenshot

_images/44_cyberchef.png

Accessing

To access CyberChef, log into Security Onion Console (SOC) and click the CyberChef hyperlink.

You can send highlighted text from PCAP to CyberChef. When the CyberChef tab opens, you will see your highlighted text in both the Input box and the Output box.

You can send all visible packet data from PCAP to CyberChef. When the CyberChef tab opens, it will automatically apply the From Hexdump recipe to render the hexdump that was sent.

Example

Suppose you are looking at an interesting HTTP file download in PCAP and want to extract the file. Click the PCAP CyberChef button and CyberChef will launch in a new tab. It will then show the hexdump in the Input box, automatically apply the From Hexdump recipe, and show the HTTP transcript in the Output box.

_images/cyberchef-session.png

You may want to apply an operation from the left column. One option is to use the Extract Files operation. If you choose this option, you may want to specify certain file types for extraction. In this case, let’s instead remove the client HTTP headers using the Strip HTTP headers operation.

_images/cyberchef-strip.png

If a magic wand appears in the Output box, then CyberChef has detected some applicable operations and you can click the magic wand to automatically apply those operations. Here, CyberChef is automatically applying Strip HTTP headers again to remove the web server HTTP headers and then rendering the actual PNG image.

_images/cyberchef-magic.png

More Information

Note

For more information about CyberChef, please see https://github.com/gchq/CyberChef.