The Story
Glitch snuck through the shadows, swift as a breeze,
He captured the traffic with delicate ease.
A PCAP file from a system gone bad,
Mayor Malware’s tricks made everything mad!
McSkidy sat at her desk, staring at the PCAP file Glitch had just sent over. It was from Marta May Ware’s computer, the latest victim of Mayor Malware’s long-running schemes.
She smiled, glancing at Byte. “Looks like we’d have to use Wireshark again, eh boy?”
Glitch’s voice crackled over the comms. “Need any help analyzing it?”
McSkidy smiled. “Thanks, Glitch, but I’ve got this.”
Learning Objectives
- Investigate network traffic using Wireshark
- Identify indicators of compromise (IOCs) in captured network traffic
- Understand how C2 servers operate and communicate with compromised systems