Highlight: THM Advent of Cyber 2023 | [Day 17] Traffic analysis I Tawt I Taw A C2 Tat!

Channel:
Subscribers:
536
Published on ● Video Link: https://www.youtube.com/watch?v=lNTEz1cLNOo



Duration: 49:23
36 views
1


Get started with Cyber Security in 24 Days - Learn the basics by doing a new, beginner friendly security challenge every day leading up to Christmas.

Watch these streams live over on Twitch at [https://www.twitch.tv/msec](https://www.twitch.tv/msec)

If you want to get £5 credit when signing up to a TryHackMe subscription then please use my referral code: [https://tryhackme.com/signup?referrer=607d626582258725e9bc2bf6](https://tryhackme.com/signup?referrer=607d626582258725e9bc2bf6)

[Day 17] Traffic analysis I Tawt I Taw A C2 Tat!

In today’s task, you will:

* Gain knowledge of the network traffic data format

* Understand the differences between full packet captures and network flows

* Learn how to process network flow data

* Discover the SiLK tool suite

* Gain hands-on experience in network flow analysis with SiLK

The Advent of Cyber 2023 room URL is: [https://tryhackme.com/room/adventofcyber2023](https://tryhackme.com/room/adventofcyber2023) -- Watch live at https://www.twitch.tv/msec




Other Videos By MSec


2024-03-10AWS Developer Associate (DVA-C02) Certification: Introduction to AWS Lambda
2024-01-01Steamboat Willie 1928 by Walt Disney | Now In The Public Domain
2023-12-29TryHackMe | Advent of Cyber '23 Side Quest | The Return of the Yeti - Side Quest Challenge 1 Flag
2023-12-24TryHackMe Advent of Cyber 2023 | [Day 24] You Are on the Naughty List, McGreedy
2023-12-23TryHackMe Advent of Cyber 2023 | [Day 23] Coerced Authentication Relay All the Way
2023-12-22TryHackMe Advent of Cyber 2023 | [Day 22] SSRF Jingle Your SSRF Bells: A Merry Command & Control Hac
2023-12-21TryHackMe Advent of Cyber 2023 | [Day 21] DevSecOps Yule be Poisoned: A Pipeline of Insecure Code!
2023-12-20TryHackMe Advent of Cyber 2023 | [Day 20] DevSecOps Advent of Frostlings
2023-12-19TryHackMe Advent of Cyber 2023 | [Day 19] Memory forensics CrypTOYminers Sing Volala-lala-latility
2023-12-18TryHackMe Advent of Cyber 2023 | [Day 18] Eradication A Gift That Keeps on Giving
2023-12-17Highlight: THM Advent of Cyber 2023 | [Day 17] Traffic analysis I Tawt I Taw A C2 Tat!
2023-12-16TryHackMe Advent of Cyber 2023 | [Day 16] Machine learning Can't CAPTCHA this Machine!
2023-12-15TryHackMe Advent of Cyber 2023 | [Day 15] Machine learning Jingle Bell SPAM: Machine Learning Saves
2023-12-15TryHackMe Advent of Cyber 2023 | [Day 14] Machine learning The Little Machine That Wanted to Learn
2023-12-13TryHackMe Advent of Cyber 2023 | [Day 13] Intrusion detection To the Pots, Through the Walls
2023-12-12TryHackMe Advent of Cyber 2023 | [Day 12] Defence in depth Sleighing Threats, One Layer at a Time
2023-12-11TryHackMe Advent of Cyber 2023 | [Day 11] Active Directory Jingle Bells, Shadow Spells
2023-12-10TryHackMe Advent of Cyber 2023 | [Day 10] SQL injection Inject the Halls with EXEC Queries
2023-12-10TryHackMe Advent of Cyber 2023 | [Day 9] Malware analysis She sells C# shells by the C2shore
2023-12-08TryHackMe Advent of Cyber 2023 | [Day 8] Disk forensics Have a Holly, Jolly Byte!
2023-12-07TryHackMe Advent of Cyber 2023 | [Day 7] Log analysis ‘Tis the season for log chopping!



Tags:
Anomalies Detection
Brute Force
Data Exfiltration
Data Recovery
Exploitation
Full Packet Captures
Incident Response
Indicators of Attack (IoA)
Indicators of Compromise (IoC)
Log Analysis
Machine Learning in Cybersecurity
Malware Analysis
Network Artefacts
Network Flow Data
Network Statistics
Network Traffic Analysis
Phishing
Security Operations Centre (SSOC)
SiLK Tool Suite
Threat Hunting
games
twitch