We would love to invite you to our next Hackerinnen Training!
At this #Shecurity female hacker training, we will look at systematic procedures for collecting, analyzing and securing digital evidence to find out what happened in a cybercrime or security breach.
Together we will look at the Wireshark tool, which can be used to read and analyze data traffic. Wireshark is able to read data traffic on different interfaces such as Ethernet, USB or WLAN interfaces, record the data and analyze it.
Important areas of application include network monitoring, troubleshooting and error analysis, protocol analysis and IT security monitoring. The program is also a popular tool among hackers.
Topics
- Introduction to the Lua scripting language and the Lua API in Wireshark
- Writing your own protocol dissectors for protocol reverse engineering, support of unusual protocols, etc.
- Create listeners to trigger events based on traffic patterns.
Trainer
Registration
Please register via forms.
Photo credit: © CSA