Home
Categories
EXPLORE
Society & Culture
Comedy
True Crime
Music
Education
Religion & Spirituality
Business
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/72/9c/78/729c78c8-dd4a-83f1-d865-c815a52fcb4a/mza_18143718259370525373.jpg/600x600bb.jpg
CyberCode Academy
CyberCode Academy
60 episodes
1 day ago
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.
Show more...
Courses
Education,
Technology
RSS
All content for CyberCode Academy is the property of CyberCode Academy and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.
Show more...
Courses
Education,
Technology
https://d3wo5wojvuv7l.cloudfront.net/t_rss_itunes_square_1400/images.spreaker.com/original/7ed2deada0f0e015566806bf19623d80.jpg
Course 6 - Network Traffic Analysis for Incident Response | Episode 6: Investigating RATs, Worms, Fileless, and Multi-Stage Malware Variants
CyberCode Academy
10 minutes
6 days ago
Course 6 - Network Traffic Analysis for Incident Response | Episode 6: Investigating RATs, Worms, Fileless, and Multi-Stage Malware Variants
In this lesson, you’ll learn about: Advanced Malware Traffic Analysis — how to detect, decode, and investigate RATs, fileless exploits, worms, and multi-stage infections using real network captures. 1. Remote Access Trojans (RATs) WSH RAT
  • Uses plaintext beaconing for C2 → very easy to identify.
  • Key data exfiltrated in HTTP requests:
    • Unique device ID
    • Computer name
    • Username (“admin”)
    • RAT version (often hidden in the User-Agent field)
NJRAT
  • Shows extensive data exfiltration:
    • Windows XP build info
    • CPU type (Intel Core i7)
    • Username (“Laura”)
  • Contains custom data blocks:
    • Likely a proprietary C2 format
    • Example: 4-byte value representing payload length (e.g., 16 bytes)
2. Fileless Malware (Angler Exploit Kit) Detection
  • Traffic contains obfuscated script + random literature quotes
    → used to evade heuristic scanners.
  • Streams show signs of XOR encoding.
Extraction & Deobfuscation Using Network Miner:
  • Extracted files include:
    • A Shockwave Flash file (.swf)
    • Three large application/octet-stream files
  • XOR decoding reveals:
    • Shellcode +
    • Windows executable (DLL)
Purpose
  • Shellcode injects the malicious DLL into a running process (e.g., Internet Explorer).
  • Because nothing is written to disk → bypasses traditional antivirus, making network analysis essential.
3. Network Worm Behavior WannaCry (SMB Worm)
  • Exploits SMB on port 445 using Eternal-family vulnerabilities.
  • Behavior includes:
    • High-volume IP scanning for vulnerable systems
    • SMB exploitation setup (NOP sled → shellcode → payload transfer)
MyDoom (SMTP Mailer Worm)
  • Attempts spreading via SMTP (port 25).
  • Tries to send spoofed “delivery failed” emails with malicious attachments:
    • e.g., mail.zip → actually .exe hidden using spaces + triple dots.
  • In the demonstration, all spreading attempts were blocked, showing modern protections in action.
4. Multi-Stage Malware Infection Tracking Stage 1 — Initial Compromise
  • Suspicious HTTP request containing Base64 ID.
    • Decodes to an email address (e.g., Reginald/Reggie Cage) → privacy red flag.
  • Download of a malicious Microsoft Word file.
Stage 2 — Downloader Activity
  • Traffic to known malware-downloader domains (e.g., Pony botnet infrastructure).
  • Malware sends detailed victim metadata:
    • GUID
    • OS build number
    • IP address
    • Hardware info
Stage 3 — Command & Control
  • Multiple C2 messages observed:
    • Some Base64-encoded
    • Many encrypted → indicating later-stage payloads
  • Strong evidence that:
    • Word file → downloader (Pony) → secondary malware → possible tertiary stage
5. Key Techniques Demonstrated
  • Identifying IOCs in network captures
  • Detecting plaintext, encoded, and encrypted C2 protocols
  • Carving files and reconstructing injected payloads
  • Analyzing worm scanning patterns
  • Tracking infection chains across multiple malicious components


You can listen and download our episodes for free on more than 10 different platforms:
Back to Episodes
CyberCode Academy
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.