<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Malware Analysis/identification with Wireshark in Welcome</title>
    <link>https://community.isc2.org/t5/Welcome/Malware-Analysis-identification-with-Wireshark/m-p/11462#M1226</link>
    <description>&lt;P&gt;Hi all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope you are well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Somebody can help with helpful links for malware identification/analysis using Wireshark, please?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like tutorials and exercises to identify malware when I am using Wireshark.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Elias&lt;/P&gt;</description>
    <pubDate>Thu, 14 Jun 2018 14:02:46 GMT</pubDate>
    <dc:creator>esilvalabh</dc:creator>
    <dc:date>2018-06-14T14:02:46Z</dc:date>
    <item>
      <title>Malware Analysis/identification with Wireshark</title>
      <link>https://community.isc2.org/t5/Welcome/Malware-Analysis-identification-with-Wireshark/m-p/11462#M1226</link>
      <description>&lt;P&gt;Hi all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope you are well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Somebody can help with helpful links for malware identification/analysis using Wireshark, please?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like tutorials and exercises to identify malware when I am using Wireshark.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Elias&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jun 2018 14:02:46 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Welcome/Malware-Analysis-identification-with-Wireshark/m-p/11462#M1226</guid>
      <dc:creator>esilvalabh</dc:creator>
      <dc:date>2018-06-14T14:02:46Z</dc:date>
    </item>
    <item>
      <title>Re: Malware Analysis/identification with Wireshark</title>
      <link>https://community.isc2.org/t5/Welcome/Malware-Analysis-identification-with-Wireshark/m-p/11466#M1227</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Elias,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I'm not sure of any free sources that could give you a complete end-to-end training on how to use Wireshark for security auditing.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You may be interested in Jessey Bullock &amp;amp; Jeff Parker, &lt;U&gt;Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework&lt;/U&gt;&amp;nbsp;288 (Feb 2017)&amp;nbsp;&lt;A href="https://www.wiley.com/en-us/Wireshark+for+Security+Professionals%3A+Using+Wireshark+and+the+Metasploit+Framework-p-9781118918227" target="_blank"&gt;https://www.wiley.com/en-us/Wireshark+for+Security+Professionals%3A+Using+Wireshark+and+the+Metasploit+Framework-p-9781118918227&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This book takes you on a tour of setting up a lab, and through various exercises in being able to detect several types of attacks against the network using Wireshark.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Best wishes!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Sincerely,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Eric B.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jun 2018 14:36:36 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Welcome/Malware-Analysis-identification-with-Wireshark/m-p/11466#M1227</guid>
      <dc:creator>Baechle</dc:creator>
      <dc:date>2018-06-14T14:36:36Z</dc:date>
    </item>
    <item>
      <title>Re: Malware Analysis/identification with Wireshark</title>
      <link>https://community.isc2.org/t5/Welcome/Malware-Analysis-identification-with-Wireshark/m-p/11473#M1228</link>
      <description>&lt;P&gt;Hi Eric,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Elias&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jun 2018 15:43:34 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Welcome/Malware-Analysis-identification-with-Wireshark/m-p/11473#M1228</guid>
      <dc:creator>esilvalabh</dc:creator>
      <dc:date>2018-06-14T15:43:34Z</dc:date>
    </item>
  </channel>
</rss>

