![]() |
Course code: Malware-1 Introductory seminar on Malware analysis using packet capture Takeshita giving practical training and lectures at DEFCON via Pakecap We will be holding an introductory seminar on Malware analysis. Analyzing Malware behavior using Wireshark You can learn the method |
|
![]() |
||
Seminar name/code |
Date/time |
Overview |
Introductory seminar on Malware analysis using packet captureNew |
1 day |
Takeshita, who gives practical training and lectures at DEFCON Packet Capture Village, will be holding an open cyber security seminar held by the Self-Defense Forces and the Ministry of Defense. |
Textbook and equipment used |
Lecturer |
Purpose |
★Distribution |
|
We analyze the movement of malware using example packets from malware such as LOKIBOT, Emotet, RAMNIT, Trickbot, and exploit kits leading up to actual infections. Through practical training, you will learn how to identify devices, the process leading to malware infection, root causes, and the process of creating an incident report. This is an introductory seminar on malware analysis using packet capture. Using Wireshark, a LAN analyzer, we will analyze the operation and behavior of malware, as well as introduce methods for collecting information, discovering root causes, and creating incident reports. *Since the main content of the seminar is the analysis of packets that are infected with actual malware and packets in which malware is running, the trace files that will be distributed and the scripts and files that will be extracted will contain malware such as actual viruses, worms, spyware, and malicious tools. This is for Purpose of providing education on malware analysis, and although addresses and ports are anonymized and harmless as much as possible, many anti-virus software, anti-malware tools, VirusTotal, etc. may detect it as a malicious tool. Please be careful when handling capture files. |
Seminar details |
||
Batch processing with tshark *Since the main content of the seminar is the analysis of packets that are infected with actual malware and packets in which malware is running, the trace files that will be distributed and the scripts and files that will be extracted will contain malware such as actual viruses, worms, spyware, and malicious tools. This is for Purpose of providing education on malware analysis, and although addresses and ports are anonymized and harmless as much as possible, many anti-virus software, anti-malware tools, VirusTotal, etc. may detect it as a malicious tool. Please be careful when handling capture files. |
Suspicious web traffic (Note) |
|
Introduction to Malware Analysis Through Packet Capture
This page keeps all original information and links. Japanese page



