Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Category: Tutorial

Cold as Ice: Answers to Unit 42 Wireshark Quiz for IcedIDA pictorial representation of Wireshark traffic including IcedID.
859
people reacted

Cold as Ice: Answers to Unit 42 Wireshark Quiz for IcedID

  • By Brad Duncan
  • May 30, 2023 at 6:00 AM

2

13 min. read

Cold as Ice: Unit 42 Wireshark Quiz for IcedIDA pictorial representation of Wireshark traffic including IcedID.
7,149
people reacted

Cold as Ice: Unit 42 Wireshark Quiz for IcedID

  • By Brad Duncan
  • May 26, 2023 at 6:00 AM

3

4 min. read

Trending

  • Threat Brief: Attacks on Critical Infrastructure Attributed to Volt Typhoon by Unit 42
  • Cold as Ice: Unit 42 Wireshark Quiz for IcedID by Brad Duncan
  • Old Wine in the New Bottle: Mirai Variant Targets Multiple IoT Devices by Zhibin Zhang
  • Cold as Ice: Answers to Unit 42 Wireshark Quiz for IcedID by Brad Duncan
Finding Gozi: Answers to Unit 42 Wireshark Quiz, March 2023A pictorial representation of Wireshark traffic including a Gozi-like infection.
68,834
people reacted

Finding Gozi: Answers to Unit 42 Wireshark Quiz, March 2023

  • By Brad Duncan
  • March 27, 2023 at 6:00 AM

8

9 min. read

Finding Gozi: Unit 42 Wireshark Quiz, March 2023A pictorial representation of Wireshark traffic including a Gozi-like infection.
72,544
people reacted

Finding Gozi: Unit 42 Wireshark Quiz, March 2023

  • By Brad Duncan
  • March 24, 2023 at 6:00 AM

7

3 min. read

Answers to Unit 42 Wireshark Quiz, February 2023A pictorial representation of packet capture. It also includes the Unit 42 and Palo Alto Networks logos.
53,760
people reacted

Answers to Unit 42 Wireshark Quiz, February 2023

  • By Brad Duncan
  • February 27, 2023 at 6:00 AM

10

15 min. read

Unit 42 Wireshark Quiz, February 2023A pictorial representation of packet capture. It also includes the Unit 42 and Palo Alto Networks logos.
56,621
people reacted

Unit 42 Wireshark Quiz, February 2023

  • By Brad Duncan
  • February 24, 2023 at 6:00 AM

18

4 min. read

Answers to Unit 42 Wireshark Quiz, January 2023The text Wireshark Quiz in orange set across a screenshot of the Wireshark program.
50,868
people reacted

Answers to Unit 42 Wireshark Quiz, January 2023

  • By Brad Duncan
  • January 23, 2023 at 6:00 AM

8

6 min. read

Unit 42 Wireshark Quiz, January 2023The text Wireshark Quiz in orange set across a screenshot of the Wireshark program.
56,478
people reacted

Unit 42 Wireshark Quiz, January 2023

  • By Brad Duncan
  • January 20, 2023 at 6:00 AM

14

4 min. read

Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the WildMalware conceptual image, covering topics such as Cobalt Strike Team Server, which can be abused by malware authors for malicious purposes
69,623
people reacted

Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild

  • By Durgesh Sangvikar, Chris Navarrete, Matthew Tennis, Yanhui Jia, Yu Fu and Siddhart Shibiraj
  • November 3, 2022 at 6:00 AM

23

9 min. read

Defeating Guloader Anti-Analysis TechniqueMalware conceptual image, including types of malware such as the Guloader variant covered here.
55,146
people reacted

Defeating Guloader Anti-Analysis Technique

  • By Mark Lim
  • October 28, 2022 at 6:00 AM

8

5 min. read

Tor 101: How Tor Works and its Risks to the EnterpriseConceptual image representing global traffic and information flow. Tor sometimes plays a role in efforts to conceal network traffic, both benign and malicious.
62,483
people reacted

Tor 101: How Tor Works and its Risks to the Enterprise

  • By Janos Szurdi
  • August 29, 2022 at 6:00 AM

60

14 min. read

Cobalt Strike Analysis and Tutorial: CS Metadata Encryption and DecryptionA conceptual image representing malware and its evasions.
49,570
people reacted

Cobalt Strike Analysis and Tutorial: CS Metadata Encryption and Decryption

  • By Chris Navarrete, Durgesh Sangvikar, Yu Fu, Yanhui Jia and Siddhart Shibiraj
  • July 13, 2022 at 6:00 AM

31

9 min. read

Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and DecodingA conceptual image that represents malware, including the malicious uses of Cobalt Strike and its metadata encoding algorithm covered here.
39,027
people reacted

Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding

  • By Chris Navarrete, Durgesh Sangvikar, Yu Fu, Yanhui Jia and Siddhart Shibiraj
  • May 6, 2022 at 12:00 PM

11

9 min. read

Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to DetectA conceptual image representing malware, including the adversarial use of Cobalt Strike and its Malleable C2 profile discussed here.
72,574
people reacted

Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect

  • By Chris Navarrete, Durgesh Sangvikar, Andrew Guan, Yu Fu, Yanhui Jia and Siddhart Shibiraj
  • March 16, 2022 at 3:00 PM

18

9 min. read

Wireshark Tutorial: Wireshark Workshop Videos Now AvailableA conceptual image representing Wireshark Tutorials.
78,933
people reacted

Wireshark Tutorial: Wireshark Workshop Videos Now Available

  • By Brad Duncan
  • October 1, 2021 at 6:00 AM

110

2 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.