2021年12月26日星期日

How wireshark can done in a APT situation ?

General Advice on Wireshark Examples

  • Pay attention to what Wireshark columns are used. They are not all the same, nor ordered the same.
  • These are very “clean” captures. Even without display filters, there is little to no other traffic.
  • Some things aren’t what they seem; for example, why are ICMP requests left unreplied? Much investigating needs to be done in malware analysis.
  • Much more can be gleaned from a capture; for example, trying other columns or opening Analyze ⇨ Expert Information



沒有留言:

發佈留言

歡迎留下寶貴意見

台灣電力公司對外資訊服務漏洞懸賞活動

台灣電力公司對外資訊服務漏洞懸賞活動 ⚠️本次活動通報方式為直接透過本公司郵件bugbounty@taipower.com.tw提交通報,若您仍需額外將漏洞細節上架於HITCON ZeroDay,請於回報信件中告知,本公司將誠摯協助處理。 一、活動訊息公告 本公司的漏洞懸賞活動即...