April 3, 2024, 6:25 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

This week, the SSH protocol made the news due to the now infamous xz-utils backdoor. One of my favorite detection techniques is network traffic analysis. Protocols like SSH make this, first of all, more difficult. However, as I did show in the discussion of SSH identification strings earlier this year, some information is still to be gained from SSH traffic [1].


Article Link: Some things you can learn from SSH traffic - SANS Internet Storm Center


1 post - 1 …

analysis backdoor can detection identification learn network network traffic network traffic analysis protocol protocols ssh ssh protocol strings techniques things traffic traffic analysis week

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

SITEC- Systems Security Administrator- Camp HM Smith

@ Peraton | Camp H.M. Smith, HI, United States

Cyberspace Intelligence Analyst

@ Peraton | Fort Meade, MD, United States

General Manager, Cybersecurity, Google Public Sector

@ Google | Virginia, USA; United States

Cyber Security Advisor

@ H&M Group | Stockholm, Sweden

Engineering Team Manager – Security Controls

@ H&M Group | Stockholm, Sweden