MALWARE Analysis with Wireshark // TRICKBOT Infection
HTML-код
- Опубликовано: 9 июн 2024
- Download the pcap here and follow along:
malware-traffic-analysis.net/...
The password to unzip the file is "infected"
If you liked this video, I’d really appreciate you giving me a like and subscribing, it helps me a whole lot. Also don't be shy, chat it up in the comments!
Video for configuring GeoIP in Wireshark:
• Map IP Address Locatio...
// Contact Me //
LinkedIn: / cgreer
RUclips: / chrisgreer
Twitter: / packetpioneer
== More On-Demand Training from Chris ==
▶Getting Started with Wireshark - bit.ly/udemywireshark
▶Getting Started with Nmap - bit.ly/udemynmap
== Live Wireshark Training ==
▶TCP/IP Deep Dive Analysis with Wireshark - bit.ly/virtualwireshark
== Private Wireshark Training ==
Let's get in touch - packetpioneer.com/product/pri...
Links above contain affiliate links where I will receive a small amount for any goods purchased. I thank you for clicking because it really helps to support me!!
0:00 Intro
0:48 DNS Filters
2:00 HTTP Requests/Replies
5:00 Using GeoIP
5:48 Exporting Usernames and Passwords
6:48 Exporting System Info
8:50 Extracting Hidden EXE Files
11:44 TLS Handshake Signatures - Наука
Nice job Chris. This really shows the detail of how Malware traverses a network. Love the practical breakdown.
Thanks Kevin! I agree, this was a fun one to work through.
Brilliant. You should create a course for people to do some basic verification on their systems for malware, viruses, etc
Hey it is definitely something I am considering. Let me know if you'd like to see that Packet Heads! 🙂
@@ChrisGreer I’d love to. I bought Pluralsight just for your courses!
+1
+2
@@ChrisGreer Nice idea - it would be educational to see the impact this has on a Windows system. You could use Volatility for process listing and network connection artifacts. You could also do some registry or file system analysis as well.
That was amazing, would love to see deeper dives on malware analysis .
JA3 was mindblowing. Keep them coming!
All the best.
Recently discovered your channel and I must admit that everything you cover is pure gold - Thank you so much for sharing your knowledge Chris!
Thank you! Thanks for stopping by the channel.
I just wanted to take a glance at the video as i really appreciate your work and got totally sucked in! Great content and presentation. Simple, clear and effective. Would love to see more.
Thanks for the feedback Michal! I'll get on it.
Chris, great content as always! Thank you for these short little "deep dives".
Must say that i am pleasantly shocked from your videos and the way you present the analysis- i am working with captures almost 21 years and i still learning something from each of your videos- you are amazing !!!
Very cool video - looking forward to the rest.
If you're interested in learning about SOC work, this is a fast and great intro into some of the often encountered technology and trends.
Brilliant C.G. Please do more of these. Helps to understand the capabilites of wireshark
More on the way!
Hi Chris. I just want to say that I LIKE THIS KIND OF CONTENT A LOT!👍
Thank you for the feedback!
There are too many words to describe the material you have offered here. Impressive, is one..... your talent to present material, it just makes you the right person for the job... Congratulation
Thanks Chris. I appreciate this effort and would love to see more of 'em in this domain.
This is not just a high technical valuable content but enjoyable 👏🏻 someone give a award to this man 🙌🏻 as always, amazing content.
Much appreciated!
Every video of Chris is an eye opener in packet analysis. To the point.. Thank you very much Chris..
My pleasure! Thank you for the comment!
That was great, could definitely sit through more videos like this.
More to come!
Thank you Chris for another brilliant session! Very interesting tip with the ja3 hash and I guess that's the voodoo the new next gen firewall use to identify application level traffic?! I am looking forward to your next videos :-)
Agreed. I'm totally nerding out on JA3 stuff right now. Super cool.
Discovered you from the david bombal video and man, I'm excited to learn from your videos, this one was great! So cool to see malware attacks from a packet level perspective. If they had taken extra steps to use SSL and a normal user-agent string, aside from the foreign IP it might be a bit harder to spot.
Thanks for the comment! Welcome to the channel. Suggestions always welcome. 👍
Thanks Chris, really enjoyed this video! Very informative and to the point!
This was great! I'm also taking your wireshark master class on Udemy and it's awesome! Great content. Thanks!
Definitely love this kind of video Chris. Great content.
Thanks Eric!
Love those malware analysis videos!!!
Glad you like them!
That's a great site for practicing with infected pcaps. Been downloading and analyzing them to cut my teeth a bit. Looking forward to future videos of files I have analyzed to see how I compare to your methodology. Excellent content as usual.
A good user friendly malware analysis! Congrats! 🏴☠️
Keep making the real world examples, love videos like this.
This was insightful! Please create more videos like this.
Loving it ! Keep em coming good sir !
Valuable tips from you. Thanks a lot. Look forward to seeing more videos
More to come!
Very clear and interesting!
Thanks for the comment Fab!
You did an amazing job analyzing this infected PCAP file
i begin with your master class and try to understand wireshark more and more before actually using it
Thank you. Yes, I like this type of training using Wireshark
Mate, you are the pope of the Wireshark 🙏 it’s the greatest video I’ve ever seen about a Malware network activity. Thanks and we need more and more videos! 🤜💥🤛🙌🦈
on it!
what a dope video dude! thank you so much! I learned so many things from this!
Thank you or making this video. I'm getting a degree in Cyber Security and I'm recommending this to everyone!
I love this stuff!
45 years ago I would hand disassemble Z80 code to
figure out what it did, and then modify it as needed.
I spent many hours digging into binary and hex files
until I found this thing called a disassembler that
converted it to 'readable' mnemonics along with
an assembler that would do the opposite.
(No internet back then)
It was a wonderful place for a curious 18 year old and
I loved it and it launched my career into other
microprocessors and debugging methods.
You, sir, are doing the same thing with that
enthusiasm, but I do not know the 'language'!
A neighbor flies his drone over my property all the
time, and I just wanted to capture his GPS data
to prove to the law both his altitude and position
over my property. I would be forever thankful
if someone could point me in that direction
for this data collection effort.
I do not know what types of drones he flies,
but they are all VERY annoying and it is clearly
an intimidation effort considering his darting
around while we are outside (9 acres).
Many thanks.
Mr. Brown
North Central Florida.
why iam thankful to chris. because his video and sharing his knowledge saved me in my career many times.. when my application team easily pointing anything to my network team.
Thank you for the comment!
Great video as always. spent 4 hours looking for malware in my network and cant stop ;))
Nice! Keep going!
Thanks Chris for all the information you bring to us, its incredible how much we can do with wireshark! A lot of things that some people maybe didn't know.
Please don't stop doing this type of content, i'll be waitint for your next videos.
Greetings.
Awesome
Video ! You should do more this kind of malware analysis videos with wireshark cause it’s a great skill for defenders
I love this guy. Thank for your time
Great work Chris, thanks.
Genious. Like these type of videos will be very helpful identifying which type of malware by just using pcap file. Please post more videos.
Thank you!
That was very good thanks, this new malware analysis is really interesting.
Glad you liked it!
This comment isent just for this video, its for your whole channel. Thank you, mr Greer, for everything! You rock brother. Hope all is well and wish you all the best.
Thank you for the comment!
More content like this, please! This is amazing and scary. Thanks very much for sharing this.
Thanks Kevin!
Man… that was excellent video. You are a super star 🌟
Thanks for watching!
Yes I liked it !! Your videos are really intesresting. Thank you
Glad you like them!
Love it. More malware analysis will be great. Great content thx
More to come! Thank you.
Brilliant video Chris!!!!
Hello Chris,
Love the way you are able to balance on more levels of difficulty and still keep in short, interesting and applicable: you go deep in the packets but seem to avoid long tails where one shoe might fit but than the pathway to the second one zzzzz … btw I learned a lot, enough to be able to identify my ex-boss -as the sneaky-creep-hacker who harassed me more than a year- I would never ever have know whiteout your video’s- thank you Mr C.
next week -
This was great! About to check out the GeoIP video!
Awesome! Let me know if you like that one. Watch out for my cat to make an appearance on that one too. :-)
@@ChrisGreer ha ha! I saw that and it reminded me of a buddy of mine when I worked at Apple who had two cats that were in all of his video calls.
Great content, on your channel, Chris. I never cared to really mess with Wireshark until I found your channel and now I'm wanting to learn all I can about packet analysis! Thank you for making amazing content and keep it up!
@@duscraftphoto Haha - awesome. Hey be sure to check out my new Udemy class when you get a chance - bit.ly/udemywireshark - it's full of this kind of stuff!
Amazing lectures, this will help me in my Network forensics analysis cases. Really you make my life much easier.
Glad to hear that!
Pretty good infos. Thank you chris, i hope to know more about you actual career and how can i get useful from this great informations
Excellent content, very informative. Please, create more of those!
Thanks, will do!
Looking forward for more malware analysis with wireshark
This is very good stuff! It's a shame there wasn't material like this 10+ years ago.
Amazing, i really enjoy and learned alot
I love your videos. I'm learning a lot. Thank you.
Great! I am having a bunch of fun making them.
@@ChrisGreer keep it up! We love more!
Awesome! Love this kind of videos, we need more like this 👌👌
Just discovered you, thanks for a great guide. i hope you make more security analyst related videos.
I really enjoyed your video! Thank you very much for posting such incredibly interesting stuff! We want more!!! 😀
Well more you will get! Thanks for the comment.
That was so cool. Would love to see more. Thank you.
You got it! Thanks Joe.
Glorious work, thank you.
Woow Chris u are so generous with knowledge u share this the way that gentil People act thx a million a god bless u
Glad you liked it! Thank you for the comment!
@@ChrisGreer Just to add something in medcin the radiologist is the Guy who see the inside thé organs. And it s the same for u see inside thé packets (data) u heal thé network :)
@@majiddehbi9186 Very true! Thanks for the interesting comment.
Great!! Thank you Chris
Love this walkthroughs
Great Video Love These videos!!!
Great video Chris!!!
Thank you!
Excellent work sir❤keep it up😊
such a wonderful explanation.......
This is awesome! More of this!
Ok will do!
awesome; more of this please!
Yes I love it , make more of this
Thank you, this video is very helpful.
Glad it was helpful!
Excellent-thank you!
Glad you liked it!
Thank you very much, Mr Chris. Please make a series of such videos for malware analysis using Wireshark.
I need to add more on this topic, I know!
@@ChrisGreer Thank you sir, I will really appreciate it!
You just don't know how much you have helped me with your videos...You're impacting the world!
Thank you once more Mr Chris. God bless.
Amazing as always.
Thank you!
Thank you Chris for this exciting video. Loved the content.
Will you be adding more videos to the "Masterclass" playlist?
Hey Vyas! Probably not - now that the Udemy course is out there - bit.ly/udemywireshark
Great content Mr Greer, thank you. Why attackers use plaintext for transmitting sensitive information?
Hi, your lessons are really great ! thanks and please keep doing it. I have a question for You...what will your first reaction if when doing a capture of a pc you see no tcp packets ? beacause i got the pb in my network... for one pc i only see NBNS, MDNS, LLMNR but no TCP... i'm a bit confuse...
Great work 👏 👍
That was so helpful!!
Glad it was helpful!
Loved the video, just wished you went more into details such as how to remove the malware (such as what ips to blacklist).
Awesome video, please make more content on malware analysis
Thanks, will do!
Need more of this
Love these videos, you are truly an amazing teacher!
Hey Chris, nice video. I've been practicing Pentesting on my VM's on VMWare. Any videos available for that type of scenario--seeing a hack in real time through Wireshark? Or at least, detecting one after the fact through Wireshark?
Great video!
This is amazing!
glad you like it Nick!
thanks heaps Chris.
This. Was. Awesome.
Thank you! I need to crank out some more of these…
nice and informative!
Glad it helped!
Man I gotta go see this site. Seems fun.
It is!
Ja3er is down now - see github discussion. Otherwise, professional video - straight to the point
Thank you I gotta fix that.
Nice video Chris. Where to find the updated database of JA3 hashes ?
amazing. keeep it going please
Great content
Very cool!!!
Awesome!