Using Wireshark to Gather Forensic Evidence on Malware ...
Using Wireshark to Gather Forensic Evidence on Malware ...
Using Wireshark to Gather Forensic Evidence on Malware ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
A few words <strong>on</strong> exploits<br />
• Main focus of IDS / IPS<br />
• Harder <str<strong>on</strong>g>to</str<strong>on</strong>g> spot compared <str<strong>on</strong>g>to</str<strong>on</strong>g> the later acti<strong>on</strong>s<br />
• Usually hard <str<strong>on</strong>g>to</str<strong>on</strong>g> interpret<br />
– Obfuscated<br />
– Packed<br />
– Crypted<br />
• Not necessarily needed<br />
7