3d ago · 7 min read · If you are just starting your cybersecurity journey, one tool you absolutely must know is Wireshark. Whether you are a student, a SOC analyst, or someone preparing for a certification like ISC2 CC or
Join discussion
4d ago · 16 min read · Tools: Wireshark, Python, Flask, WayDroid Difficulty: Beginner The Moment It Clicked I was sitting at my desk in Nairobi at around 11pm, staring at Wireshark, when I watched my own password — the one
Join discussion
Feb 14 · 8 min read · Task 1 Scenario Eric Fischer from the Purchasing Department at Bartell Ltd has received an email from a known contact with a Word document attachment. Upon opening the document, he accidentally clicked on "Enable Content." The SOC Departmen...
Join discussion
Feb 7 · 2 min read · [ link: https://chatgpt.com/share/69868332-b6a0-800f-b3f5-a491c251f128 ] To read and analyze a .pcap file generated by tcpdump, use one of the methods below, depending on whether you prefer command-line or GUI tools. 1. Read a PCAP file using tcpdum...
Join discussionFeb 6 · 3 min read · LokiBot is a long‑running credential‑stealing trojan designed to harvest usernames, passwords, browser data, and cryptocurrency wallets. First appearing in 2016 and attributed to a developer known as “lokistov” or “Carter,” it quickly became popular ...
Join discussion
Jan 28 · 6 min read · Introduction: Why Wireshark Matters in Cybersecurity Wireshark is one of the most powerful tools in networking and cybersecurity. It lets you capture and analyze network traffic in real time, basically showing you what your computer is “saying” on th...
Join discussion