
2021-09-10 - TRAFFIC ANALYSIS EXERCISE - ANGRYPOUTINE
Sep 10, 2021 · Write an incident report based on the pcap and the alerts. Executive Summary: State in simple, direct terms what happened (when, who, what). Details: Details of the victim (hostname, IP address, MAC address, Windows user account name). Indicators of Compromise (IOCs): IP addresses, domains and URLs associated with the infection.
ANGRYPOUTINE - cyberphor
Feb 28, 2022 · Frame #1489 is one of the first “TLS 1.2 Server Hello” packets. It contains the domain name “londonareloeli.uk.” Yet, there are no name resolution requests for it within the PCAP and VirusTotal also reports it as benign. What is the victim’s username and hostname? What files were downloaded via HTTP? Yes. 46 files were downloaded via HTTP.
Quick Malware Analysis: AngryPoutine exercise pcap from 2021 …
Oct 19, 2021 · Today's quick malware analysis is the AngryPoutine exercise pcap from 2021-09-10! Thanks to Brad Duncan for sharing this pcap! First 4 screenshots are below. For more, please see:
Angry Poutine - Traffic Analysis - Brian Biddle
Mar 29, 2023 · The purpose of this report is to outline the findings of a malware analysis and provide recommendations for mitigation. The malware was discovered during a PCAP analysis and was identified as a security threat. Findings
Quick Malware Analysis: AngryPoutine exercise pcap from 2021 …
Oct 19, 2021 · We did a quick analysis of this pcap on the latest version of Security Onion via so-import-pcap: https://docs.securityonion.net/en/2.3/so-import-pcap.html Below are some of the interesting Suricata alerts, Zeek logs, and session transcripts.
BazarLoader - Traffic Analysis - ANGRYPOUTINE - DEV Community
Jun 10, 2024 · Download the .pcap file from pcap. Familiarize yourself with the assignment instructions. Write an incident report based on the pcap and the alerts. Indicators of Compromise (IOCs). This is my method for finding the infected host in a PCAP file, though it may not always guarantee accurate results. In Wireshark, go to Statistics > Endpoint > IPv4.
DFIR Playbook - Network Forensics - Angry-Bender's blog house
Nov 24, 2020 · Find the relevant certificate with the following wireshark filter tls.handshake.type == 11 and an identifier such as IP or domain name that resolves to that endpoint. You can also use tls.handshake.extensions_server_name contains <name> if you know the domain name then follow the stream.
A-Packets: Online PCAP Analysis and Network Traffic Insights
Explore and analyze PCAP files online using A-Packets, designed to provide comprehensive insights into network protocols like IPv4/IPv6, HTTP, Telnet, FTP, DNS, SSDP, and WPA2. This tool allows users to easily view details of network communications and …
Malicious Packet analyzer
It utilizes manual checking and Artificial Intelligence to predict which packets contain potentially malicious activity by manually checking for suspicious activity within packets.
pcap-analyzer
With pcap-analyzer you can get an overview of your pcap file, analyze it and create a dashboard
- Some results have been removed