SPYWARE Analysis with Wireshark - STOLEN LOGINS!

แชร์
ฝัง
  • เผยแพร่เมื่อ 31 ก.ค. 2024
  • In this video we are going to take a look at how Agent Tesla Spyware works. Using an exercise from malware-traffic-analysis.net, we will learn what indicators to look for as this Spyware steals user credentials.
    Let's dig!
    Get the pcaps here - malware-traffic-analysis.net/...
    == More On-Demand Training from Chris ==
    ▶Getting Started with Wireshark - bit.ly/udemywireshark
    ▶Getting Started with Nmap - bit.ly/udemynmap
    == Live Wireshark Training ==
    ▶TCP/IP Deep Dive Analysis with Wireshark - bit.ly/virtualwireshark
    == Private Wireshark Training ==
    Let's get in touch - packetpioneer.com/product/pri...
    Questions? Comments?
    You know what to do below!
    Chapters:
    0:00 Intro
    0:40 Get the PCAP
    1:52 Victim's IP Address
    3:48 Stolen Credentials
    5:50 Decoding Base64 Logins
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 37

  • @x0rZ15t
    @x0rZ15t ปีที่แล้ว +10

    These small videos of yours are so fun and informative. I didn't even know you could decode base64 inside Wireshark before 🤯

    • @vq8gef32
      @vq8gef32 ปีที่แล้ว +2

      Just adding this side note, I watched the Unit42 Wireshark series, but the way Chris dives into this Wireshark is 360 degree different. This is my opinion but please watch and compare. Thank you so much Chris.

    • @johnvardy9559
      @johnvardy9559 ปีที่แล้ว

      @@vq8gef32 what you mean? which one is better to understand?

  • @colinrogers9927
    @colinrogers9927 ปีที่แล้ว +3

    Awesome vid! I am now intrigued enough that I will be analyzing much more malware. Thank you good sir!

  • @rakeshn5070
    @rakeshn5070 ปีที่แล้ว +1

    Wow Chris. This calls to for serious learning Wireshark. Damn how people steal logins using malware. Thanks for sharing the video and keep informing us.

  • @dbasslock
    @dbasslock ปีที่แล้ว +1

    Learning a ton of information from you, keep it up!

  • @vq8gef32
    @vq8gef32 ปีที่แล้ว +1

    Chris , Chris, you are Master Shark! :) Big Thank you.

  • @Manavetri
    @Manavetri ปีที่แล้ว +1

    Excellent, I love this kind of videos with real files !... Keep going.

  • @slip6699
    @slip6699 ปีที่แล้ว +1

    I love this content. Every time I learn something new. I have very little experience looking at logs but I'm picking stuff up. Thanks for sharing. I really need to try some of those real world examples. My eyes jumped to the port 80 right away and you basically got everything from smtp instead.

    • @ChrisGreer
      @ChrisGreer  ปีที่แล้ว

      I get it, it's easy to focus on the wrong thing... I do it all the time!

  • @monh964
    @monh964 ปีที่แล้ว +1

    Compressed and rich video. Thank you sir ✌️✌️✌️✌️✌️

  • @yhytuncer
    @yhytuncer ปีที่แล้ว +1

    These malicious pcap traffic analysis videos are awesome !

    • @ChrisGreer
      @ChrisGreer  ปีที่แล้ว +1

      Glad you like them! I gotta make some more then...

  • @clementyves6154
    @clementyves6154 ปีที่แล้ว +1

    very nice video ! thanks

  • @ScottPlude
    @ScottPlude ปีที่แล้ว

    1%
    That's how much of your wireshark knowledge that I hope to retain some day! Just 1%!
    Amazing!

  • @majiddehbi9186
    @majiddehbi9186 ปีที่แล้ว +2

    Woow Chris always a good subject and smart analyze thx and keep givin jsut question where to get any wirshark certificat Chris thx for u re help

  • @joerockhead7246
    @joerockhead7246 ปีที่แล้ว

    nice. thank you.

  • @TheKhirocks
    @TheKhirocks ปีที่แล้ว +1

    that base64 decode in wireshark was a great tip - i've been copy/pasting strings to external websites to do the same 👍

    • @ChrisGreer
      @ChrisGreer  ปีที่แล้ว

      Glad it helped! I was too... until someone showed me that lil' trick.

  • @stanleytomasetti1074
    @stanleytomasetti1074 9 หลายเดือนก่อน

    please do more of these

  • @denza2843
    @denza2843 11 หลายเดือนก่อน

    ty chris

  • @YaserBasaad
    @YaserBasaad ปีที่แล้ว

    Thanks a lot , keep it up

    • @ChrisGreer
      @ChrisGreer  ปีที่แล้ว

      Thanks for the comment!

  • @vq8gef32
    @vq8gef32 ปีที่แล้ว

    Hi Chris, If we try to open this PCAP file using Python Scapy library should we still be careful about it?

  • @Vipinkumarofficial
    @Vipinkumarofficial 10 หลายเดือนก่อน

    Hi Chris,
    After clicking on follow stream, I got only binary code nothing readable. Anything I need to do to get readable data.

  • @MrThumper001
    @MrThumper001 6 หลายเดือนก่อน

    I am not able to download any pcap from this site. Please help

  • @johnvardy9559
    @johnvardy9559 ปีที่แล้ว

    all of these stuff included on your course?

  • @tanteckleng5062
    @tanteckleng5062 ปีที่แล้ว

    👍

  • @justchecking2470
    @justchecking2470 ปีที่แล้ว

    Love the content you made but here comes to my mind a question at the end. If smtp auth process had been done by user on port 465 with ssl, would we able to see the base64 encoded username and password?

    • @ChrisGreer
      @ChrisGreer  ปีที่แล้ว +1

      If it was encrypted over SSL/TLS then no, we wouldn't see the content, nor the base64 encoded username/passwords. To find suspect traffic in encrypted streams we would need to look for strange IP conversations (Which could possibly be spoofed), unusual port numbers, or other unusual conversation patterns. It can get tough these days! But I like showing the unencrypted pcaps because they are much better for learning how the spyware/malware works.

    • @justchecking2470
      @justchecking2470 ปีที่แล้ว

      @@ChrisGreer 👍

  • @vijay85cisco
    @vijay85cisco ปีที่แล้ว

    hi bro my client to server scenario TCP connection intermittently getting RESET from client side initiation after successful SYN first packet and SYN+ACK second packet received at my client machine. Then my client machine send sudden RESET to server instead of completing the 3-way handshake. on analysis Out of 100 TCP connection i can seen 25 RESET from my client machine to server. i believe something unusual at my CLIENT machine.. i differentiated all successful request and failed reset request. There i found whenever my client machine sent RESET above the wireshark line of each stream on received SYN+ACK delta time is above >500ms to 900ms... On all successful TCP request there syn+ACK received delta time on my client side wireshark shows below than >450ms . So i believe my side machine expecting that SYN+ACK packet receiving to my client machine should below the value of

  • @Iowa.k
    @Iowa.k ปีที่แล้ว

    thanks. smtp trick is a big help.