From the course: Wireshark: Malware and Forensics

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Indications of compromise

Indications of compromise - Wireshark Tutorial

From the course: Wireshark: Malware and Forensics

Start my 1-month free trial

Indications of compromise

- (Presenter) When I get a request from someone to look over their packet capture, I generally ask them to tell me what made them think there was a problem on their system. Many times, they cannot explain what they feel is the problem, except they feel that there is unusual network traffic, and that something is not quite right. Although you may be fairly sure that there is something amiss on the network, there are some indications that the network may be under attack. As we can see by this website, most countries have IP ranges specific to their location. For example, let's select Aruba. Here you can see IP address ranges in Aruba. When monitoring inbound traffic, there may be indications of unusual geographical irregularities and attempted logins and access patterns. It's work investigating, as when your device picks up traffic destined to countries outside the range of normal business activity, this might indicate hackers are siphoning sensitive data to another country. In…

Contents