
Tcpdump (Intermediate)
The Importance of Having Access to PCAP Data in an Investigation
1. Detect Suspicious SMB Traffic
2. Identify Large Outbound Traffic (Potential Data Exfiltration)
3. Detect Command-and-Control (C2) Communication
4. Find Encrypted Traffic with Unusual Destinations
5. Detect Abnormal File Transfers (FTP/SMB)
6. Look for Brute Force or Credential Theft
7. Detect Port Scanning or Lateral Movement
8. Identify Ransomware Network Beaconing
9. Monitor for Abnormal DNS Queries
10. Detect Rapidly Generated Outbound Connections
11. Monitor for Tor Traffic
12. Capture Malicious HTTP Requests
13. Detect Suspicious Use of ICMP (Ping Tunnels)
14. Identify Outbound Traffic to Known Malicious IPs
15. Track Ransomware Encryption Activity
16. Extract Packets with Suspicious Payload Sizes
17. Detect Traffic to Unusual Regions
Last updated