From the course: Wireshark: Malware and Forensics
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Challenge: Email forensics - Wireshark Tutorial
From the course: Wireshark: Malware and Forensics
Challenge: Email forensics
(upbeat music) - [Narrator] Before we get into the challenge, I want to give you a little background information. Now when investigating malware sometimes we wonder, how did we get this infection? Now we know that there are many attack vectors and ways to get malware onto your system, one way is by using email. Now email communication is vital for business. However, a large percentage of email that comes into an organization is abusive and includes junk mail, spam, and malware. Much of the abusive email has a fake sender address which is done to conceal the sender's true address. Malware creators classically use spoofed email to get into an organization via a phishing attack. One of the ways to prevent abusive email from getting into the system is by checking the reputation of the IP address or domain name. A reputation method is a way of assuring appropriate email traffic and preventing abusive email. With a reputation…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Exploring cyberattacks and trends5m
-
(Locked)
Understanding malware and cyber threats2m 35s
-
(Locked)
Packet analysis overview2m 59s
-
(Locked)
Outlining the benefits of Wireshark3m 25s
-
(Locked)
Tshark4m 52s
-
(Locked)
Tap into your network4m 40s
-
(Locked)
Create firewall rules3m 53s
-
(Locked)
Challenge: Email forensics3m 37s
-
(Locked)
Response: Email forensics3m 56s
-
-
-
-
-