Rate this post
Main Point
Here, we are going to discuss different types of traffic that are used frequently in network communication and could be misused by malicious actors to achieve their goals.
When analyzing network traffics or analyzing network forensics, especially when using Wireshark, we must focus our understanding on the core types of protocols, their structure form and how do they work, so that we can distinguish between their natural form or misuse of them.
So, the main idea here is the understanding the core network protocols that used frequently at any connection.
There is no doubt that there are other harmful messages traveling across the network, but our focus here is on the type of traffic and not the content of the message itself.
Views: 2


















































