Home
Categories
EXPLORE
Society & Culture
True Crime
Comedy
History
Science
News
Sports
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/72/9c/78/729c78c8-dd4a-83f1-d865-c815a52fcb4a/mza_18143718259370525373.jpg/600x600bb.jpg
CyberCode Academy
CyberCode Academy
62 episodes
20 hours ago
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.
Show more...
Courses
Education,
Technology
RSS
All content for CyberCode Academy is the property of CyberCode Academy and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.
Show more...
Courses
Education,
Technology
https://d3wo5wojvuv7l.cloudfront.net/t_rss_itunes_square_1400/images.spreaker.com/original/dc91ce143781f7626a73ac2275ad14e3.jpg
Course 6 - Network Traffic Analysis for Incident Response | Episode 5: Scanning, Covert Data Exfiltration, DDoS Attacks and IoT Exploitation
CyberCode Academy
11 minutes
6 days ago
Course 6 - Network Traffic Analysis for Incident Response | Episode 5: Scanning, Covert Data Exfiltration, DDoS Attacks and IoT Exploitation
In this lesson, you’ll learn about: Network Threat Analysis — understanding how common attacks and advanced malware appear in real traffic captures, and how to extract intelligence from them. Part 1 — Analysis of Common Network Threats 1. Network Scanning Techniques Attackers scan networks to discover targets, services, and vulnerabilities. Demonstrations cover several scanning styles: SYN / Half-Open Scan
  • Sends SYN packets without completing the handshake.
  • Target responses reveal open vs. closed ports.
Full Connect Scan
  • Completes the full TCP three-way handshake.
  • More noticeable but highly accurate.
Xmas Tree Scan
  • Uses abnormal TCP flags: FIN + PUSH + URG.
  • Leveraged to probe how systems respond to malformed packets.
Zombie / Idle Scan
  • Uses an unwitting third-party host (“zombie”) to hide attacker identity.
  • Tracks incremental IP ID numbers to infer open ports.
Network Worm Scanning (e.g., WannaCry)
  • Worms scan many IPs for a single vulnerable port, such as SMB 445.
  • High-volume, repetitive traffic is a key signature.
2. Data Exfiltration (Covert Channels) Focus: understanding how attackers hide stolen data inside legitimate-appearing traffic. Covert SMB Channel
  • Data leaked one byte at a time inside SMB packets.
  • Requires:
    • Reviewing thousands of similar packets,
    • Extracting embedded data,
    • Base64 decoding,
    • Reversing the result,
    • Revealing hidden Morse code.
ICMP Abuse
  • Attackers embed data into ICMP type fields, reconstructing files (e.g., a GIF).
  • Difficult to detect because ICMP is normally used for diagnostics, not data transfer.
3. Distributed Denial of Service (DDoS) Attacks Explains why DDoS attacks remain common—cheap cloud resources, insecure IoT devices, accessible botnets. Volumetric SYN Flood
  • Floods a port (like HTTP 80) with incomplete handshakes.
  • Exhausts server connection capacity.
HTTP Flood
  • Sends massive amounts of GET/POST requests.
  • Harder to distinguish from normal traffic.
Amplification / Reflection Attacks
  • Small spoofed request → massive response to victim.
  • Examples:
    • Cargen protocol: 1-byte request → 748-byte response.
    • Memcache: tiny request → multi-megabyte responses from cached data.
4. IoT Device Exploitation Demonstration focuses on how attackers compromise weak devices such as DVRs.
  • Many IoT devices use default credentials and insecure services like Telnet.
  • Attack flow typically involves:
    1. Logging in via Telnet.
    2. Attempting to download malware (e.g., Mirai ELF binary).
    3. When automated delivery (TFTP) fails → manually reconstructing binaries using echo.
    4. Device joins a botnet and starts scanning other victims.
Part 2 — In-Depth Malware Case Studies 1. Remote Access Trojans (RATs)
  • Traffic begins with system information reporting from the infected host.
  • Followed by persistent command-and-control (C2) communication.
2. Fileless Malware
  • Malware runs directly in memory, leaving minimal filesystem artifacts.
  • Often, network traffic is the only complete copy of the payload available.
3. Network Worms
  • Automate scanning and propagation.
  • Look for specific open ports, then exploit and install themselves.
4. Multi-Stage Malware
  • Downloader retrieves multiple malware families.
  • Identifying...
CyberCode Academy
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.
🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.
From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.
Study anywhere, anytime — and level up your skills with CyberCode Academy.
🚀 Learn. Code. Secure.