Death of Security: Breached Hosts/Stolen Data/IP Espionage


Right click “Save as…”

Slides (view online)
Using Wireshark, the world’s most popular network analyzer, Laura delves into network communications from suspect hosts -- hosts that have been compromised and hosts that are performing a variety of discovery processes to locate potential targets. The traffic may include evidence of scanning processes to and from suspect hosts, access to Command and Control (C&C) servers, traffic to suspect locations and unusual data flow patterns. Sharing case studies of various compromises that have occurred in the last 12 months, Laura customizes traffic views to highlight some of the blatant indications of malicious activity such as unacceptable SMB Process High ID values, botnet phone home communications, poisoning/redirection and more.

Follow the discussion

  • Oops, something didn't work.

    Getting subscription
    Subscribe to this conversation

Comments closed

Comments have been closed since this content was published more than 30 days ago, but if you'd like to continue the conversation, please create a new thread in our Forums, or Contact Us and let us know.