100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Essay

Malware Forensic Using Wireshark For Investigation (Cyber Security Assignment)

Rating
-
Sold
-
Pages
14
Grade
A
Uploaded on
14-10-2022
Written in
2021/2022

This document provides content of investigating malware file after capturing packets of data using the Wireshark Tool and shows clearly of how it can be located and detected. Word Count: 3158

Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Unknown
Course

Document information

Uploaded on
October 14, 2022
Number of pages
14
Written in
2021/2022
Type
Essay
Professor(s)
Unknown
Grade
A

Subjects

Content preview

Assignment 2 –
Malware
13/05/2022



Forensics
Cyber Security




GENC Muhammed
STUDENT NUMBER: 20021350

, Table of Contents
Abstract:................................................................................................................................................2
Introduction:..........................................................................................................................................2
How Malware forensics work:...............................................................................................................2
How Malware Is Detected:....................................................................................................................3
Prerequisites for Malware Analysis:......................................................................................................4
Types of Malware Analysis:...................................................................................................................4
Malware Forensics Stages:....................................................................................................................4
Case Study (Wireshark):.........................................................................................................................5
Malware Analysis Using Wireshark:...................................................................................................6
Device Model and OS from HTTP Traffic:...........................................................................................7
Locating Malware:.................................................................................................................................8
Ursnif Traffic:.....................................................................................................................................9
Trickbot Traffic:................................................................................................................................10
Comparison Table of Other Tools:.......................................................................................................10
Legal and Ethical Consideration:..........................................................................................................11
Malware Analysis Landscape:..............................................................................................................11
Why Malware Analysis is Critical for Cyber Security Posture:..............................................................12
Conclusion:..........................................................................................................................................12
References:..........................................................................................................................................13

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
johnatkinson Staffordshire University (London)
Follow You need to be logged in order to follow users or courses
Sold
1536
Member since
6 year
Number of followers
996
Documents
18
Last sold
6 months ago
BTEC National Extended Diploma IT Level 3 (RQF 2016/17) Resources

Hello and welcome to my page! My target is to help the students pass courseworks and those that aim to be achieving top marks (i.e Merit/Distinction). I had recently been new to this website for about a few months ago and I do feel amazed to bring all the content I have and release to the public for delivering their support plus guiding them through step by step. My assignments are mostly 100% plagiarism-free containing useful content and headings to cover all grade criteria. Payment is 100% reliable! If you have any particular problem? simply contact me and you will be refunded. 100% Money Back Guarantee Coming soon: Furthermore, I will be publishing assignments for Cyber Security BSc (hons) soon which may be able to fulfil your expectations and satisfactions, stay updated with the latest news!

Read more Read less
3.7

390 reviews

5
167
4
86
3
52
2
24
1
61

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions