![]() ![]() What exploit kit was used to infect the user’s computer?.What is the name of the malware that infected the user’s computer?.What type of malware was the computer infected with?.What is the host name of the infected Windows computer?.What is the IP address of the infected Windows computer?.What is the MAC address of the infected Windows computer?.What was the date and time of the infection?.Here are the questions, and I’ll attempt to answer as many as I can: BASIC QUESTIONS: This challenge actually has three sets of questions, categorized as Basic, Advanced, and More Advanced. Just in time to get back to network forensics! As always, a huge thanks to Brad over at MTA for providing these challenges to work through. Full Packet Friday: Malware Traffic Analysisįor today’s post, I’ll be taking a look at the Malware Traffic Analysis exercise that was posted on January 28, 2017. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |