Hello again to another blue team CTF walkthrough for more network forensics and malware analysis. Shall we start? This is the 2nd installment of Malware Traffic Analysis 2 Challenge in CyberDefenders.org

CHELLENGE OVERVIEW
The attached PCAP belongs to an Exploitation Kit infection. Analyze it using your favorite tool and answer the challenge questions.
Tools:
• BrimSecurity
• suricatarunner
• suricata.rules
• NetworkMiner
• WireShark



#blueteam #dfir #networkforensics #malwareanalysis #cyberdefenders.org