

These infections can follow many different paths before the malware, usually a Windows executable file, infects a Windows host. This tutorial uses examples of Windows infection traffic from commodity malware distributed through mass-distribution methods like malicious spam (malspam) or web traffic.


Instead, it shows some tips and tricks for Wireshark filters. This is not a comprehensive tutorial on how to analyze malicious network traffic. And you should also have a basic understanding of how malware infections occur. Keep in mind you must understand network traffic fundamentals to effectively use Wireshark. Pcaps for this tutorial are available here. It covers display filter expressions I find useful in reviewing pcaps of malicious network traffic from infected Windows hosts. Today's post provides more tips for analysts to better use Wireshark. To better accomplish this work, I use a customized Wireshark column display as described my previous blog about using Wireshark. However, if you know the TCP port used (see above), you can filter on that one.As a Threat Intelligence Analyst for Palo Alto Networks Unit 42, I often use Wireshark to review packet captures (pcaps) of network traffic generated by malware samples. You cannot directly filter SMTP protocols while capturing. Show only the SMTP based traffic with the "MAIL FROM" command: contains "FROM" Display FilterĪ complete list of SMTP display filter fields can be found in the display filter reference Keep it short, it's also a good idea to gzip it to make it even smaller, as Wireshark can open gzipped files automatically.

XXX - Add a simple example capture file to the SampleCaptures page and link from here. (XXX add links to preference settings affecting how SMTP is dissected). XXX - Add example traffic here (as plain text or Wireshark screenshot). SMTP uses MIME_multipart to transfer attachments The well known TCP port for SMTP traffic is 25. TCP: Typically, SMTP uses TCP as its transport protocol. SMTP is existing since the early days of the internet and was one of the first protocols used. Receiving mail from a server - on the other hand - is done using POP or IMAP. This protocol is widely use to send e-Mail from the authors mail program to the mail server and between servers too.
