Continue your exploration into malware’s behavior on the network! Students will analyze network captures containing real, malicious network traffic, both by hand and using tools such as Security Onion and Sguil. Both malware spreading methods and command and control operations will be explored. In addition, students will create web shell payloads of their own to see how they operate from the inside.

    Prerequisites

    Detailed knowledge of networking protocols, including TCP/IP, DNS, and HTTP. Familiarity with Wireshark and the Unix/Linux command line.

    The Cogent Range Intrusion Analysis using Network Traffic exercise is recommended before starting this exercise.

    Expected Duration

     

    3 hours, self-paced. Pause and continue at any time.
    3 CPEs awarded on successful completion.

    Cyber Workforce Platform

    Lorem ipsum dolor sit amet, consectetur adipiscing elit. Donec sed finibus nisi, sed dictum eros.
    Copyright © 2024 Divi. All Rights Reserved.