The packets don't lie. You can hide processes or logs, but you cannot hide packets. Malware is a major problem in today's networks. Chris Greer is the Wireshark master. He shows us how to use Wireshark to find Malware and suspicious traffic in our networks.
// SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU // 0:00 - Coming up 01:17 - New content for 2025 02:13 - Monitoring Snake Keylogger malware in Wireshark 04:30 - Snake Keylogger demo // Spotting irregularities 08:10 - Checking irregular traffic // Opening the packet 12:25 - Checking URL with Virustotal 13:05 - Checking irregular traffic continued 17:50 - Snake Keylogger overview 18:39 - SOC teams are important 19:03 - Checking FTP irregularities 19:59 - Real-world vs. Theory 21:12 - Checking FTP irregularities continued 24:01 - Viewing sensitive info from client server 27:16 - Summary 30:24 - Chris Greer updated Udemy course 32:11 - Conclusion
malware hacking hacker wireshark udp http https quic tcp firewall firewall quic quic firewall threat hunting hack hackers blue team red team tshark chris greer http https ssl nmap ja3 ja3 ssl ssl fingerprint nmap tutorial defcon sharkfest, acket analysis wireshark training wireshark tutorial free wireshark training wireshark tips wireshark for beginners wireshark analysis packet capture wireshark tutorial kali linux wireshark course introduction to wireshark
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!