Make sure that your @docker.com #Docker Containerized Server(s) are running. I spent 15 mins trying to run the #ContainerizedAttack server when I FORGOT the #ContainerizedVictim Server wasn't even online...
Cybersec is fun when well rested.
Make sure that your @docker.com #Docker Containerized Server(s) are running. I spent 15 mins trying to run the #ContainerizedAttack server when I FORGOT the #ContainerizedVictim Server wasn't even online...
Cybersec is fun when well rested.
#Cybersecurity #CybersecurityStudent #Wireshark #macOS #LinuxVM #EmailForensicAnalysis #Network-LevelEmailForensics
#Cybersecurity #CybersecurityStudent #Wireshark #macOS #LinuxVM #EmailForensicAnalysis #Network-LevelEmailForensics
smtp.data.fragment - atomic pieces
smtp.data.fragments - the whole puzzle
smtp.data.fragment.count - count of atomic pieces.
It took me a minute to understand the differences b/w these. The documentation available on these is sparse & varied...
smtp.data.fragment - atomic pieces
smtp.data.fragments - the whole puzzle
smtp.data.fragment.count - count of atomic pieces.
It took me a minute to understand the differences b/w these. The documentation available on these is sparse & varied...
Thankfully, wireshark helps piece that fragmented smtp puzzle.
1. In the display filter, type
`smtp.data.fragment` - individual puzzle piece
OR
`smtp.data.fragments` - the whole puzzle
2. Manually scan the filtered list for the complete one.
〰️🦈
Thankfully, wireshark helps piece that fragmented smtp puzzle.
1. In the display filter, type
`smtp.data.fragment` - individual puzzle piece
OR
`smtp.data.fragments` - the whole puzzle
2. Manually scan the filtered list for the complete one.
〰️🦈
What I've learnt about #SocialEngineering seeks to undermine chinks in human psyche. It's successful as long as we're NOT careful
- Poor Grammar & spelling
- Deceptive URLs
- Urgent Call to Action
- Intimidating Language
- Attachments
- Irresistable Offers
What I've learnt about #SocialEngineering seeks to undermine chinks in human psyche. It's successful as long as we're NOT careful
- Poor Grammar & spelling
- Deceptive URLs
- Urgent Call to Action
- Intimidating Language
- Attachments
- Irresistable Offers
**Learning to use to the display filter in Wireshark is important for anyone going into Cybersecurity/Networking/IT Systems.**
1. Since it's phishing BEC's I'm trying to find filter by SMTP (literally type in 'smtp' in the display filter).
#BEC's #CyberSecurity
**Learning to use to the display filter in Wireshark is important for anyone going into Cybersecurity/Networking/IT Systems.**
1. Since it's phishing BEC's I'm trying to find filter by SMTP (literally type in 'smtp' in the display filter).
#BEC's #CyberSecurity
1. Download the files to your machine (don't recommend it on windows unless you have a VM running.)
2. I used my MAC (honestly anything Linux or VM works)
(For futher exercises look into www.malware-traffic-analysis.net)
1. Download the files to your machine (don't recommend it on windows unless you have a VM running.)
2. I used my MAC (honestly anything Linux or VM works)
(For futher exercises look into www.malware-traffic-analysis.net)
Further posts will detail my learning process :3
Further posts will detail my learning process :3