Zeek
Pingback: ICMP Tunneling Malware
This blog will introduce a method of detecting the Pingback malware in which attackers often hide their communications in ping message payloads.
Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response
Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response
Feel free to edit this text to reflect your unique voice and message. Tell visitors what you do, why you do it, and what sets you apart.
This blog will introduce a method of detecting the Pingback malware in which attackers often hide their communications in ping message payloads.
This blog is a brief story of a few points that occurred to me during the less than 24 hours it took to turn around this package from dev to testing.
I downloaded Whonix version 15, in which two virtual machines work together to detect activity in a clever way.