
SPYWARE Analysis with Wireshark - STOLEN LOGINS!
In this video we are going to take a look at how Agent Tesla Spyware works. Using an exercise from malware-traffic-analysis.net, we will learn what indicators to look for as this Spyware steals user credentials.
Let's dig!
Get the pcaps here - https://malware-traffic-analysis.net/training-exercises.html
== More On-Demand Training from Chris ==
▶Getting Started with Wireshark - https://bit.ly/udemywireshark
▶Getting Started with Nmap - https://bit.ly/udemynmap
== Live Wireshark Training ==
▶TCP/IP Deep Dive Analysis with Wireshark - https://bit.ly/virtualwireshark
== Private Wireshark Training ==
Let's get in touch - https://packetpioneer.com/product/private-virtual-classroom/
Questions? Comments?
You know what to do below!
Chapters:
0:00 Intro
0:40 Get the PCAP
1:52 Victim's IP Address
3:48 Stolen Credentials
5:50 Decoding Base64 Logins
Let's dig!
Get the pcaps here - https://malware-traffic-analysis.net/training-exercises.html
== More On-Demand Training from Chris ==
▶Getting Started with Wireshark - https://bit.ly/udemywireshark
▶Getting Started with Nmap - https://bit.ly/udemynmap
== Live Wireshark Training ==
▶TCP/IP Deep Dive Analysis with Wireshark - https://bit.ly/virtualwireshark
== Private Wireshark Training ==
Let's get in touch - https://packetpioneer.com/product/private-virtual-classroom/
Questions? Comments?
You know what to do below!
Chapters:
0:00 Intro
0:40 Get the PCAP
1:52 Victim's IP Address
3:48 Stolen Credentials
5:50 Decoding Base64 Logins
Chris Greer
Wireshark can be intimidating. Let's change that.
This channel is about analyzing protocols with Wireshark and other packet shredding tools. These skills are critical for network troubleshooting, Cybersecurity, and all IT roles.
For business inquiries...