We’ll do it by analyzing the pickup file in Wireshark. Our goal is to check if any of entities were infected. We have three Windows computers active and at least one of them has an exploit kit injected. However, due to NTA, we are able to track Neutrino steps and find the root that has caused the infection. Its malicious code can be injected into legitimate resources – like websites – and compromise a computer through various vendor vulnerabilities. Neutrino, one of the world’s most popular exploit kits, will be the base for our Hacks Weekly scenario.
0 Comments
Leave a Reply. |