Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
TV & Film
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/72/9c/78/729c78c8-dd4a-83f1-d865-c815a52fcb4a/mza_18143718259370525373.jpg/600x600bb.jpg
CyberCode Academy
CyberCode Academy
62 episodes
21 hours ago
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.
Show more...
Courses
Education,
Technology
RSS
All content for CyberCode Academy is the property of CyberCode Academy and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.
Show more...
Courses
Education,
Technology
https://d3wo5wojvuv7l.cloudfront.net/t_rss_itunes_square_1400/images.spreaker.com/original/9cdfe536dcc8274316092a647b27188e.jpg
Course 6 - Network Traffic Analysis for Incident Response | Episode 4: Mapping, Decoding, and Decrypting Network Traffic Intelligence
CyberCode Academy
11 minutes
1 week ago
Course 6 - Network Traffic Analysis for Incident Response | Episode 4: Mapping, Decoding, and Decrypting Network Traffic Intelligence
In this lesson, you’ll learn about: Intelligence Collection from Network Traffic Captures — focusing on anomalies, attacker behavior, and extracting actionable intelligence. 1. Network Mapping & Visualization
  • Humans struggle with long lists → visualizing traffic helps you feel the environment.
  • Tools like pcap viz generate maps at different OSI layers:
Layer 3 (IP Addresses)
  • Shows which machines talk to each other.
  • Helps detect unusual communication paths.
Layer 4 (TCP/UDP Ports)
  • Shows communication between applications.
  • Unusual ports (e.g., 900) may indicate custom or C2 protocols.
2. Content Deobfuscation Attackers often hide traffic with simple encodings (not strong encryption).
Goal → recover the original content, often a payload or second-stage executable. XOR Encoding
  • Common in malware traffic.
  • Repeated patterns in streams (especially when encoding zeros) reveal the key.
  • Example: fixed-length 4-byte key like MLVR.
Base64 (B64)
  • Seen in C2 frameworks like Onion Duke.
  • Recognizable by:
    • A–Z, a–z, 0–9, “+”, “/”
    • Ends with “=” padding
  • Easy to decode using built-in libraries or online tools.
3. Credential Capture from Insecure Protocols Focus: credentials leaking in plaintext protocols. Telnet & IMAP
  • Send usernames/passwords in clear text.
  • Easy to extract directly from the TCP stream.
SMTP
  • Encodes credentials in Base64 → trivial to decode.
  • Python or online decoders reveal username + password.
  • Reinforces the need for TLS encryption.
4. SSL/TLS Decryption in Wireshark Encrypted traffic looks like random “gibberish” unless you have the right keys. Using RSA Private Keys
  • If the RSA private key is available, Wireshark can decrypt sessions directly.
Ephemeral Keys (ECDHE)
  • Cannot be decrypted using the server’s private key.
  • Must capture the session keys using a pre-master secret log file:
    • Often done by setting an SSL key log file environment variable in browsers.
  • Without that log, the sessions are not recoverable.
5. Web Proxy Interception (Deep Packet Inspection) Enterprise method for inspecting encrypted HTTPS traffic. How it works
  • A corporate proxy (e.g., Burp Suite) intercepts connections:
    • Breaks the client → server TLS session.
    • Decrypts → inspects → re-encrypts all traffic.
Requirements
  • Clients must install the proxy’s self-signed root certificate.
  • Needed to bypass controls like HSTS.
Risks
  • Proxy becomes a single high-value target for attackers.
  • Raises privacy concerns, especially when employees do personal browsing (banking, etc.).


You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cybercode_academy
CyberCode Academy
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.