Learning Computer Forensics Tutorial | Steganography Techniques: Images And Video

Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos (στεγανός), meaning “covered, concealed, or protected”, and graphein (γράφειν) meaning “writing”. Typical network steganography methods involve modification of the properties of a single network protocol. Such modification can … Read more Learning Computer Forensics Tutorial | Steganography Techniques: Images And Video

Bug Hunting Bounties – Finding Website Vulnerabilities – How To Shot Web – Jason Haddix’s talk from DEFCON23

Jason Haddix explores successful tactics and tools used by himself and the best bug hunters. Practical methodologies, tools and tips that make you better at hacking websites and mobile apps to claim those bug bounties. Download Slides Here: http://www.slideshare.net/bugcrowd/how-do-i-shot-web-jason-haddix-at-defcon-23

Introduction to Kali – The Linux Operating System Built for Hacking – Cyber Security Video

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. Mati Aharoni, Devon Kearns and Raphaël Hertzog are the core developers. It is a great Operating System to learn Penetration Testing and practice your skills

Traffic Sample PCAP of FakeAV Malware and Kazy Trojan Downloader

Two key indicators: FakeAV POST – POST /hrrgkkwhjdwwwww/order.php?pid=390 (attempting to setup a payment for the FakeAV with the pid linking to the current session) Trojan Downloader function – GET /week.exe HTTP/1.1     2015-08-27 11:39:35.045855 ARP, Request who-has 192.168.56.1 tell 192.168.56.10, length 28 …….. .’*….8 ……..8. 2015-08-27 11:39:35.046218 ARP, Reply 192.168.56.1 is-at 0a:00:27:00:00:00, length 46 …….. .’…..8. … Read more Traffic Sample PCAP of FakeAV Malware and Kazy Trojan Downloader

BRO vs Snort IDS Locky Ransomware tcpdump Traffic Sample Data Packet Analysis

(PCAP and Binary samples available with their usual password and location) Bro and Snort are completely different types of applications although they are commonly compared against one another. From a network security standpoint Snort can’t do much to detect new malware variants, obfuscation TTPs and other non-low hanging fruit we haven’t created a signature for. … Read more BRO vs Snort IDS Locky Ransomware tcpdump Traffic Sample Data Packet Analysis

Malspam E-mail Leads to Ransomware Cerber/Zerber Infection TRAFFIC SAMPLE

Example of files that were encrypted and protected: The domain name ftoxmpdipwobp4qy.joa688.top was NX and not required for the purchase process. 2016-12-16 01:29:05.256362 IP 192.168.1.102.50104 > 72.167.232.152.80: Flags [P.], seq 0:303, ack 1, win 256, length 303: HTTP: GET //up1/1/4fv3b5.exe HTTP/1.1 E..W..@……..fH……P.n……P…….GET //up1/1/4fv3b5.exe HTTP/1.1 Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, */* Accept-Language: en-us User-Agent: Mozilla/4.0 (compatible; … Read more Malspam E-mail Leads to Ransomware Cerber/Zerber Infection TRAFFIC SAMPLE

CERBER Ransomware Hidden C2 Servers Traffic and Malware Analysis

Cerber ransomware has been one of the most prolific crimeware botnets to have arisen, it is currently generating an estimated $2.5 million dollars a year and rising. Once infected, your content is encrypted and held for ransom as the name implies. You will see an image popup with instructions on how to reclaim your data … Read more CERBER Ransomware Hidden C2 Servers Traffic and Malware Analysis

So you want a job as a Network Security Analyst? Network Intrusion Detection Practice

etwork security analysis takes a lot of experience, the best way you can get real world experience is by setting up your own testing environment lab. Download WireShark and TCPDUMP – these tools will be used to monitor live traffic you will generate. Make sure you have some type of Virtual Machine software and here … Read more So you want a job as a Network Security Analyst? Network Intrusion Detection Practice