Examine packet captures from actual intrusions and dive deeper into how attackers operate! Students will learn the details of protocols such as SMB and SSH by examining network traffic captures in Wireshark®, then will proceed to build network packets “by hand” in order to tunnel secret data in normal-looking traffic. Finally, students will learn the details of “web shell” payloads commonly used by attackers.

    Prerequisites

    Detailed knowledge of networking protocols, including TCP/IP, DNS, and HTTP. Familiarity with Wireshark and the Unix/Linux command line.
    The Cogent Range Packet Capture Analysis and Manipulation exercise is recommended before starting this exercise.

    Expected Duration

    3 hours, self-paced. Pause and continue at any time.
    3 CPEs awarded on successful completion.

    Cyber Workforce Platform

    Lorem ipsum dolor sit amet, consectetur adipiscing elit. Donec sed finibus nisi, sed dictum eros.
    Copyright © 2024 Divi. All Rights Reserved.