A network engineer is analyzing a Wireshark file to determine the HTTP request that caused the initial Ursnif banking Trojan binary to download. Which filter did the engineer apply to sort the Wireshark traffic logs?
D) tcp.window_size ==0? What kind of weird filter is that? I'm pretty sure the answer has to be one of the HTTP-related options. Maybe Jolanda is onto something with that http.request.un matches filter.
Hmm, I was leaning towards C) tcp.port eq 25, since that could detect the SMTP traffic associated with the malware. But I guess the HTTP request is the more direct way to identify the initial download.
I was thinking B) tls.handshake.type ==1 might be the right answer, since the Ursnif malware is likely using encrypted communication. But you make a good point, A) is probably the best choice here.
I'm pretty sure the answer is A) http.request.un matches. The question is specifically asking about the HTTP request that triggered the Ursnif download, so that filter seems like the most relevant one.
Marti
1 months agoPage
6 days agoIrving
14 days agoFredric
18 days agoAmie
2 months agoJettie
2 days agoAleisha
3 days agoMammie
5 days agoAlbina
2 months agoHerman
16 days agoHaley
1 months agoKenneth
1 months agoAlisha
2 months agoJolanda
2 months agoTruman
2 months agoBerry
2 months agoTruman
2 months agoDavida
2 months agoShanice
2 months agoDavida
3 months ago