Incident response January 14, 2020 Howard Poston Network traffic analysis for IR: TCP protocol with Wireshark The Transmission Control Protocol (TCP) is one of the most commonly-used protocols on the internet. Unlike the User Datagram Protocol (UDP), TCP is not a “fire...
Incident response January 13, 2020 Howard Poston Network Traffic Analysis for Incident Response: Internet Protocol with Wireshark The Internet Protocol (IP) is the most widely-used network-level protocol. Common transport-level protocols, the Transport Control Protocol (TCP) and the...
Incident response January 8, 2020 Greg Belding ICMP protocol with Wireshark Unlike the Transport Control Protocol (TCP) and User Datagram Protocol (UDP), the Internet Control Message Protocol (ICMP) is not designed for carrying data. While...
Incident response December 26, 2019 Greg Belding Cyber Work with Infosec: How to become an incident responder In this episode of Cyber Work with Infosec, Chris Sienko interviewed Keatron Evans, Infosec instructor, managing consultant at KM Cyber Security, LLC and...
Incident response December 16, 2019 Howard Poston Simple Mail Transfer Protocol (SMTP) with Wireshark The Simple Mail Transfer Protocol (SMTP) is one of three protocols used for email. The other two are Post Office Protocol v3 (POP3) and Internet Message Access...
Incident response December 11, 2019 Howard Poston Internet Relay Chat (IRC) protocol with Wireshark Internet Relay Chat (IRC) uses a client-server model to provide a chatroom. A single IRC server is set up, and users connect to the server via IRC clients....
Incident response December 10, 2019 Howard Poston Hypertext transfer protocol (HTTP) with Wireshark The Hypertext Transfer Protocol (HTTP) is the protocol that is used to request and serve web content. HTTP is a plaintext protocol that runs on port 80. However,...
Incident response December 5, 2019 Howard Poston Network traffic analysis for IR: FTP protocol with Wireshark The File Transfer Protocol (FTP), as its name suggests, is designed for transferring files between computers. It is used for a variety of different purposes,...
Incident response December 4, 2019 Howard Poston Infosec skills – Network traffic analysis for IR: DNS protocol with Wireshark The Domain Name System (DNS) protocol was first defined in RFCs 1034 and 1035 but has been updated by many subsequent RFCs. A primary purpose of the DNS protocol...
Incident response December 3, 2019 Patrick Mallory Network traffic analysis for IR: Data collection and monitoring Data collection and analysis for use by network engineers, security professionals and incident response has only exploded over the years with the growth of...