![]() Future videos will focus on traffic from specific families of Windows-based malware, and some will cover traffic from other malicious activities like phishing websites. These videos are designed to be watched sequentially, starting with “Part 1: Introduction and Prerequisites.” After Part 1, each workshop video builds on material covered in the previous video(s).Īs the opportunity arises, I will create more Wireshark Workshop videos. Part 5: Introductions to Windows Malware Infections - 39 minutes and 11 seconds Part 4: Non-Malicious Activity - 45 minutes and 38 seconds Part 3: Host Identification - 30 minutes and 19 seconds Part 2: Setting Up Wireshark - 23 minutes and 36 seconds Part 1: Introduction and Prerequisites - 14 minutes and 5 seconds The following are the first five videos of our Palo Alto Networks Unit 42 Wireshark Workshop: Due to this setback, we want to announce an initial series of video tutorials developed to replicate most aspects of these formerly in-person workshops. ![]() Since early 2020, travel restrictions due to COVID-19 (the coronavirus) have halted these in-person workshops. My in-person workshops were designed to help people in information security roles use Wireshark to review traffic from Windows-based malware infections. Since 2018, I have written various Wireshark tutorials and conducted in-person workshops at conferences across the globe. Wireshark is a tool used to review packet captures (pcaps) of network activity.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |