Posts

Network Traffic Analysis for Malware Presence Confirmation using Wireshark

Image
Network Traffic Analysis for Malware Presence Confirmation A structured passive network forensics report using DNS, HTTP, TCP, TLS, ARP, DHCP, and reputation-based evidence. Primary Host 10.6.13.133 Internal system repeatedly observed in suspicious outbound communications. Evidence Types 20 Indicators DNS, HTTP, TLS, TCP, ARP, DHCP, SMB, and reputation checks. Conclusion Malware Likely Multiple independent indicators support command-and-control activity. Introduction This data analysis focuses on identifying malware presence using passive network traffic analysis. The PCAP file was analyzed using Wireshark without executing any malicious code. A layered approach combining DNS, HTTP, TCP, and IP-level observations was used to detect command-and-control communication, data exfiltration, and abnormal network behavior. ...