Incident response

Network traffic analysis for IR: UDP with Wireshark

The User Datagram Protocol (UDP) is one of the two main protocols that sits between the Internet Protocol (IP) layer and higher-level, specialized protocols

Network traffic analysis for IR: TCP protocol with Wireshark

The Transmission Control Protocol (TCP) is one of the most commonly-used protocols on the internet. Unlike the User Datagram Protocol (UDP), TCP is not a “fi

Network Traffic Analysis for Incident Response: Internet Protocol with Wireshark

Introduction to the Internet Protocol The Internet Protocol (IP) is the most widely-used network-level protocol. Common transport-level protocols, the Trans

ICMP protocol with Wireshark

Unlike the Transport Control Protocol (TCP) and User Datagram Protocol (UDP), the Internet Control Message Protocol (ICMP) is not designed for carrying data.

Cyber Work with Infosec: How to become an incident responder

Introduction In this episode of Cyber Work with Infosec, Chris Sienko interviewed Keatron Evans, Infosec instructor, managing consultant at KM Cyber Securit

Simple Mail Transfer Protocol (SMTP) with Wireshark

The Simple Mail Transfer Protocol (SMTP) is one of three protocols used for email. The other two are Post Office Protocol v3 (POP3) and Internet Message Acce

Internet Relay Chat (IRC) protocol with Wireshark

Internet Relay Chat (IRC) uses a client-server model to provide a chatroom. A single IRC server is set up, and users connect to the server via IRC clients. T

Hypertext transfer protocol (HTTP) with Wireshark

 HTTP The Hypertext Transfer Protocol (HTTP) is the protocol that is used to request and serve web content. HTTP is a plaintext protocol that runs on port 8

Network traffic analysis for IR: FTP protocol with Wireshark

The File Transfer Protocol (FTP), as its name suggests, is designed for transferring files between computers. It is used for a variety of different purposes,

Infosec skills - Network traffic analysis for IR: DNS protocol with Wireshark

The Domain Name System (DNS) protocol was first defined in RFCs 1034 and 1035 but has been updated by many subsequent RFCs. A primary purpose of the DNS prot