Skip to Main Content
Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence
book

Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence

by Kevin Cardwell
April 2023
Intermediate to advanced content levelIntermediate to advanced
469 pages
10h 7m
English
Apress
Content preview from Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence
© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2023
K. CardwellTactical Wiresharkhttps://doi.org/10.1007/978-1-4842-9291-4_9

9. Analyzing Encoding, Obfuscated, and ICS Malware Traffic

Kevin Cardwell1  
(1)
California, CA, USA
 

In this chapter, we will look at the different techniques that malware authors use to try and “hide” their code from others. The better the tools and analysts get at detecting the malware, the better the attackers get at trying to prevent them from being successful. We will review the concepts of encoding, obfuscated, as well as ICS malware. The first thing we want to think about is encoding.

Encoding

Encoding – The process of data conversion; we can think of this as a method to make something ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security Strategies in Linux Platforms and Applications, 3rd Edition

Security Strategies in Linux Platforms and Applications, 3rd Edition

Ric Messier, Michael Jang
Network Analysis Using Wireshark 2 Cookbook - Second Edition

Network Analysis Using Wireshark 2 Cookbook - Second Edition

Nagendra Kumar Nainar, Yoram Orzach, Yogesh Ramdoss

Publisher Resources

ISBN: 9781484292914Purchase LinkPublisher Website