The CISO and response team believe there were attempts to scan the network for vulnerabilities and that an attacker may have discovered and exploited a vulnerability on one of the network servers. You will conduct packet sniffing with Wireshark to gather information about the attacker, determine the resources that may have been compromised during the attack, and how the attacker compromised the resources. Your role here is to assume responsibility of analyzing a network packet capture file that was created during the network attack. It is time to help the CISO with the network intrusion. ![]() Step 14: Conduct Wireshark Packet Capture Analysis
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
June 2023
Categories |