Recently, I worked on analyzing Command-and-Control (C2) traffic using Wireshark as part of an IBM project, where I analyzed PCAP files to identify malicious activity.
Share this post
Advent of Cyber Day 20: Command-and-Control…
Share this post
Recently, I worked on analyzing Command-and-Control (C2) traffic using Wireshark as part of an IBM project, where I analyzed PCAP files to identify malicious activity.