2021年12月26日星期日

How wireshark can done in a APT situation ?

General Advice on Wireshark Examples

  • Pay attention to what Wireshark columns are used. They are not all the same, nor ordered the same.
  • These are very “clean” captures. Even without display filters, there is little to no other traffic.
  • Some things aren’t what they seem; for example, why are ICMP requests left unreplied? Much investigating needs to be done in malware analysis.
  • Much more can be gleaned from a capture; for example, trying other columns or opening Analyze ⇨ Expert Information



沒有留言:

發佈留言

歡迎留下寶貴意見

AI驅動的新一代釣魚郵件(最近攻擊我們公司的詐騙郵件)

比起戀愛詐騙,需大量的人工互動,電子郵件詐騙可以說是低成本、高回報的詐騙方式。只要從暗網外洩資料裡面取得大量使用中的電子郵件,就能廣發詐騙信。 如何識破?簡單的可以從發信者的電子郵件,只要看到不對,立即通告資安部門,另外,從超連結的位置可以判斷。 從下面三個案例,我們可以發現AI...