Zeek
Pingback: ICMP Tunneling Malware
This blog will introduce a method of detecting the Pingback malware in which attackers often hide their communications in ping message payloads.
This blog will introduce a method of detecting the Pingback malware in which attackers often hide their communications in ping message payloads.
This blog is a brief story of a few points that occurred to me during the less than 24 hours it took to turn around this package from dev to testing.
I downloaded Whonix version 15, in which two virtual machines work together to detect activity in a clever way.