Question: Project #1 will begin by introducing you to the process of malware traffic analysis. Review the following situations utilizing Wireshark: Situation: Traffic Analysis Exercise Download

Project #1 will begin by introducing you to the process of malware traffic analysis. Review the following situations utilizing Wireshark: Situation: Traffic Analysis Exercise Download this PCAP source file Review the sample analysisPreview the document discussing these questions: What was the date and time of the infection? What is the MAC address of the infected Windows computer? What is the IP address of the infected Windows computer? What is the host name of the infected Windows computer? What type of malware was the computer infected with? What is the name of the malware that infected the user's computer? What exploit kit was used to infect the user's computer? What compromised website kicked off the infection chain of events? Before the Windows computer was infected, what did the user search for on Bing? Which campaign(s) used the exploit kit noted in the pcap? What are the indicators of compromise (IOCs) from the pcap?

Link :http://www.malware-traffic-analysis.net/2017/01/28/index.html

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!