1 of 15

Malware 2-4

20.11.2013

2 of 15

3 things ?

3 of 15

5 cents from me

4 of 15

5 cents from me

5 of 15

5 cents from me

6 of 15

5 cents from me

7 of 15

5 cents from me

8 of 15

5 cents from me

9 of 15

Plan for today

Your presentations

Clarification on processor aridecture

Network forensic ..

Lab time

10 of 15

Presentations ?!

11 of 15

Clarification on processor architecture

12 of 15

Network ...

13 of 15

Lab

Hints and other pcap

Enisa Pcap lab +

Pcap1 < even

or

Pcap2 < odd including 0

14 of 15

Results

Malware what is downloaded

Where from is downloaded

Any C&C or P2P connection data .

Timeline.

Snort or Suricata rule do detect.

How you did it ?

15 of 15

network lab ideas

suricata -l /folder/where /log/goes -r startstop.pcap

snort -qdexNA cmg -c all.rules -r startstop.pcap