Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Category: Tutorial

Answers to Unit 42 Wireshark Quiz, January 2023The text Wireshark Quiz in orange set across a screenshot of the Wireshark program.
9,322
people reacted

Answers to Unit 42 Wireshark Quiz, January 2023

  • By Brad Duncan
  • January 23, 2023 at 6:00 AM

4

6 min. read

Unit 42 Wireshark Quiz, January 2023The text Wireshark Quiz in orange set across a screenshot of the Wireshark program.
14,813
people reacted

Unit 42 Wireshark Quiz, January 2023

  • By Brad Duncan
  • January 20, 2023 at 6:00 AM

9

4 min. read

Trending

  • Machine Learning Versus Memory Resident Evil by Esmid Idrizovic
Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the WildMalware conceptual image, covering topics such as Cobalt Strike Team Server, which can be abused by malware authors for malicious purposes
65,385
people reacted

Cobalt Strike Analysis and Tutorial: Identifying Beacon Team Servers in the Wild

  • By Durgesh Sangvikar, Chris Navarrete, Matthew Tennis, Yanhui Jia, Yu Fu and Siddhart Shibiraj
  • November 3, 2022 at 6:00 AM

22

9 min. read

Defeating Guloader Anti-Analysis TechniqueMalware conceptual image, including types of malware such as the Guloader variant covered here.
52,588
people reacted

Defeating Guloader Anti-Analysis Technique

  • By Mark Lim
  • October 28, 2022 at 6:00 AM

8

5 min. read

Tor 101: How Tor Works and its Risks to the EnterpriseConceptual image representing global traffic and information flow. Tor sometimes plays a role in efforts to conceal network traffic, both benign and malicious.
59,244
people reacted

Tor 101: How Tor Works and its Risks to the Enterprise

  • By Janos Szurdi
  • August 29, 2022 at 6:00 AM

59

14 min. read

Cobalt Strike Analysis and Tutorial: CS Metadata Encryption and DecryptionA conceptual image representing malware and its evasions.
46,707
people reacted

Cobalt Strike Analysis and Tutorial: CS Metadata Encryption and Decryption

  • By Chris Navarrete, Durgesh Sangvikar, Yu Fu, Yanhui Jia and Siddhart Shibiraj
  • July 13, 2022 at 6:00 AM

31

9 min. read

Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and DecodingA conceptual image that represents malware, including the malicious uses of Cobalt Strike and its metadata encoding algorithm covered here.
36,205
people reacted

Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding

  • By Chris Navarrete, Durgesh Sangvikar, Yu Fu, Yanhui Jia and Siddhart Shibiraj
  • May 6, 2022 at 12:00 PM

11

9 min. read

Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to DetectA conceptual image representing malware, including the adversarial use of Cobalt Strike and its Malleable C2 profile discussed here.
59,979
people reacted

Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect

  • By Chris Navarrete, Durgesh Sangvikar, Andrew Guan, Yu Fu, Yanhui Jia and Siddhart Shibiraj
  • March 16, 2022 at 3:00 PM

17

9 min. read

Wireshark Tutorial: Wireshark Workshop Videos Now AvailableA conceptual image representing Wireshark Tutorials.
72,373
people reacted

Wireshark Tutorial: Wireshark Workshop Videos Now Available

  • By Brad Duncan
  • October 1, 2021 at 6:00 AM

103

2 min. read

Wireshark Tutorial: Examining Traffic from Hancitor InfectionsA conceptual image representing Wireshark Tutorials.
53,258
people reacted

Wireshark Tutorial: Examining Traffic from Hancitor Infections

  • By Brad Duncan
  • April 7, 2021 at 6:00 AM

46

20 min. read

Wireshark Tutorial: Decrypting RDP TrafficA conceptual image representing Wireshark Tutorials.
73,637
people reacted

Wireshark Tutorial: Decrypting RDP Traffic

  • By Brad Duncan and Vijay Prakash
  • April 1, 2021 at 6:00 AM

45

10 min. read

Wireshark Tutorial: Examining Emotet Infection TrafficA conceptual image representing Wireshark Tutorials.
71,081
people reacted

Wireshark Tutorial: Examining Emotet Infection Traffic

  • By Brad Duncan
  • January 19, 2021 at 6:00 AM

50

15 min. read

Wireshark Tutorial: Examining Dridex Infection TrafficA conceptual image representing Wireshark Tutorials.
51,689
people reacted

Wireshark Tutorial: Examining Dridex Infection Traffic

  • By Brad Duncan
  • October 23, 2020 at 9:00 AM

34

12 min. read

Wireshark Tutorial: Decrypting HTTPS TrafficA conceptual image representing Wireshark Tutorials.
361,647
people reacted

Wireshark Tutorial: Decrypting HTTPS Traffic

  • By Brad Duncan
  • August 21, 2020 at 6:00 AM

165

7 min. read

Wireshark Tutorial: Examining Qakbot InfectionsA conceptual image representing Wireshark Tutorials.
66,267
people reacted

Wireshark Tutorial: Examining Qakbot Infections

  • By Brad Duncan
  • February 13, 2020 at 6:00 AM

39

9 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.