Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.🎧 Each course is divided into a series of short, focused episodes that take you from beginner to ad... more
FAQs about CyberCode Academy:How many episodes does CyberCode Academy have?The podcast currently has 212 episodes available.
November 14, 2025Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 4: Integrating Secure Coding, Code Review, and Application Security TestiIn this lesson, you’ll learn about: Secure Build — SDLC Phase 4 1. Overview Secure Build is the practice of applying secure requirements and design principles during the development phase. Its goal is to ensure that applications used by the organization are secure from threats. Key Participants:Software developersDesktop teamsDatabase teamsInfrastructure teams2. Core Development Practices Secure Coding GuidelinesDevelopers follow standardized rules to ensure threat-resistant code.Security libraries in frameworks are used for critical tasks, such as:Input validationAuthenticationData accessSecure Code ReviewInvolves manual and automated review of source code to uncover security weaknesses.Essential checks include:Proper logging of security eventsAuthentication bypass preventionValidation of user inputFormal Code Review Steps:Source Code Access: Obtain access to the codebase.Vulnerability Review: Identify weaknesses, categorized by risk impact (e.g., financial, reputation).Reporting: Remove false positives, document issues, and assess risk severity.Remediation: Track and fix vulnerabilities using bug tracking systems like Jira.3. Automated Application Security Testing Static Application Security Testing (SAST)White-box testing that scans source code or binaries without execution.Integrates with CI/CD pipelines or developer IDEs for immediate feedback.Supports the “shift left” approach, finding vulnerabilities early in the SDLC.Tools demonstrated: Coverity, LGTMInteractive Application Security Testing (IAST)Gray-box testing performed while the application is running, often during functional tests.Monitors application activity in real-time and pinpoints exact lines of code needing fixes.Advantages:Eliminates false positivesFits Agile, DevOps, and CI/CD workflows4. Third-Party Component Security and Code Quality Open Source Analyzers (OSA) / Secure Component Analysis (SCA)Ensure open-source libraries are current and free of known vulnerabilities.Can integrate with SAST and IAST tools.Resources: OWASP Dependency Check (free tool for detecting vulnerable components).Code Quality ToolsIdentify poor coding practices, dead code, and potential security issues.Improving code quality correlates with enhanced overall security.Tools mentioned: SpotBugs, SonarQube5. SummarySecure Build is Phase 4 of the Secure SDLC.Integrates practices including:Following secure coding standardsPerforming code reviewsApplying automated testing (SAST & IAST)Ensuring component security and code qualityGoal: Proactively address security during development, rather than remediating later.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more11minPlay
November 14, 2025Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 3: Defining, Implementing 20 Controls, and Mitigating OWASP Top 10 in SDLIn this lesson, you’ll learn about: Secure Requirements — SDLC Phase 2 1. Overview of Secure Requirements Definition and Purpose:Secure requirements are functional and non-functional security features that a system must meet to protect its users, ensure trust, and maintain compliance.They define security expectations during the planning and analysis stage, and are documented in product or business requirements.Timing and Integration:Security requirements should be defined early in planning and design.Early integration reduces costly late-stage changes and ensures that security is embedded throughout the SDLC.Requirements must be continuously updated to reflect functional changes, compliance needs, and evolving threat landscapes.Collaboration:Requires coordination between business developers, system architects, and security specialists.Early risk analysis prevents security flaws from propagating through subsequent stages.2. The 20 Secure Recommendations The course details 20 key recommendations, each tied to mitigation of common application security risks. These cover input validation, authentication, cryptography, and more. Input and Data ValidationInput Validation: Server-side validation using whitelists to prevent injection attacks and XSS.Database Security Controls: Use parameterized queries and minimal privilege accounts to prevent SQL injection and XSS.File Upload Validation: Require authentication for uploads, validate file type and headers, and scan for malware to prevent injection or XML external entity attacks.Authentication and Session Management 4–11. Authentication & Session Management:Strong password policiesSecure failure handlingSingle Sign-On (SSO) and Multi-Factor Authentication (MFA)HTTP security headersProper session invalidation and reverificationGoal: Prevent broken authentication and session hijacking.Output Handling and Data ProtectionOutput Encoding: Encode all responses to display untrusted input as data rather than code, mitigating XSS attacks.Data Protection: Validate user roles for CRUD operations to prevent insecure deserialization and unauthorized access.Memory, Error, and System ManagementSecure Memory Management: Use safe functions and integrity checks (like digital signatures) to reduce buffer overflow and insecure deserialization risks.Error Handling and Logging: Avoid exposing sensitive information in logs (SSN, credit cards) and ensure auditing is in place to prevent security misconfiguration.System Configuration Hardening: Patch all software, lock down servers, and isolate development from production environments.Transport and Access ControlTransport Security: Use strong TLS (1.2/1.3), trusted CAs, and robust ciphers to protect data in transit.Access Control: Enforce Role-Based or Policy-Based Access Control, apply least privilege, and verify authorization on every request.General Coding Practices and CryptographySecure Coding Practices: Protect against CSRF, enforce safe URL redirects, and prevent privilege escalation or phishing attacks.Cryptography: Apply strong, standard-compliant encryption (symmetric/asymmetric) and avoid using vulnerable components.3. Mitigation StrategyEach of the 20 recommendations is directly linked to OWASP Top 10 vulnerabilities.Following these recommendations ensures that security is embedded into the SDLC rather than added as an afterthought.This phase emphasizes proactive security design, minimizing risk before coding begins.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more15minPlay
November 14, 2025Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 2: Malware, Social Engineering, GRC, and Secure Development PracticesIn this lesson, you’ll learn about: Security Awareness Training — Secure SDLC Phase 1 1. Security Awareness Training (SAT) FundamentalsSAT is the education process that teaches employees and users about cybersecurity, IT best practices, and regulatory compliance.Human error is the biggest factor in breaches: 95% of breaches are caused by human error.SAT reduces human mistakes, protects sensitive PII, prevents data breaches, and engages developers, network teams, and business users.Topics covered in SAT:Password policy and secure authenticationPII managementPhishing and phone scamsPhysical securityBYOD (Bring Your Own Device) threatsPublic Wi-Fi protectionTraining delivery methods:New employee onboardingOnline self-paced modulesClub-based training portalsInteractive video trainingTraining with certification exams2. Malware & Social Engineering Threats Malware ClassificationsVirus: Infects other files by modifying legitimate hosts (the only malware that infects files).Adware: Exposes users to unwanted or malicious advertising.Rootkit: Grants stealthy, unauthorized access and hides its presence; may require OS reinstallation to remove.Spyware: Logs keystrokes to steal passwords or intellectual property.Ransomware: Encrypts data and demands cryptocurrency payments, usually spread via Trojans.Trojans: Malicious programs disguised as legitimate files or software.RAT (Remote Access Trojan): Allows long-term remote control of systems without the user’s knowledge.Worms: Self-replicating malware that spreads without user action.Keyloggers: Capture keystrokes to steal credentials or financial information.Social Engineering AttacksSocial engineering = manipulating people to obtain confidential information.Attackers target trust because it is easier to exploit than software.5 Common Types:Phishing: Most common attack; uses fraudulent links, urgency, and fake messages.93% of successful breaches start with phishing.Baiting: Offers something attractive (free downloads/USBs) to trick users into installing malware or revealing credentials.Pretexting: Creates a false scenario to build trust and steal information.Distrust Attacks: Creates conflict or threatens exposure to extort money or access.Tailgating/Piggybacking: Attacker physically follows an authorized employee into a restricted area.Defense strategies include:Understanding the difference between phishing and spear phishing.Recognizing that 53% of all attacks are phishing-based.Using 10 email verification steps, including:Check sender display nameLook for spelling errorsBe skeptical of urgency/threatsInspect URLs before clicking3. Governance, Risk, and Compliance (GRC) GRC Components:Governance: Board-level processes to lead the organization and achieve business goals.Risk Management: Predicting, assessing, and managing uncertainty and security risks.Compliance: Ensuring adherence to laws, regulations, and internal policies.Key compliance frameworks:HIPAA — Healthcare data protectionSOX — Corporate financial reporting integrityFISMA — Federal information system standardsPCI-DSS — Secure cardholder data; employees must acknowledge policies in writingISO/IEC 27001 — International information security standardGDPR — EU data privacyCCPA — California privacy law4. Secure Development & Operations Awareness Focused training for developers, security engineers, and network consultants. Core resources include:OWASP Top 10 — Most critical web application security risksSANS CWE Top 25 — Most dangerous software weaknessesOWASP ASVS — Security verification requirements for secure developmentBSIMM — Framework for building and assessing software security programsOWASP Mobile Top 10 — Mobile application security risksAPI and IoT security guidelinesThis training ensures developers write secure code, configure systems safely, and understand modern threats across web, mobile, API, and embedded systems. 5. Continuous Improvement & Organizational RolesSecurity awareness must be continuously updated to address new threats.Security Operations Center (SOC):Monitors systemsDetects and analyzes threatsCoordinates defense and responseInformation Security Communication:Acts as the bridge between business units and IT securityEnsures employees remain informed and educatedYou can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more12minPlay
November 14, 2025Course 7 - Secure SDLC (Software Development Life Cycle) | Episode 1: Approaches, Eight Phases, and Risk ManagementIn this lesson, you’ll learn about: Secure Software Development Life Cycle (Secure SDLC) — Full OverviewDefinition of Secure SDLCA framework that integrates security into every phase of system development:Planning → Design → Build → Validation → Deployment → MaintenanceWhy Secure SDLC MattersRising security concerns: DDoS, account takeover, OWASP Top 10Managing business risks such as breach penaltiesAchieving GRC (Governance, Risk Management, Compliance) with PCI DSS, HIPAA, GDPR/CCPAEnabling the Shift Left strategy to catch gaps early and reduce cost, time, and effort laterApproaches to Secure SDLCProactive Approach (for new systems)Preventing and protecting against known threats in advanceSecuring code and configurations early in the development processReactive Approach (for existing systems)Detecting and stopping threats before exploitation or breachActing as a corrective controlThe Eight Secure SDLC PhasesAwareness TrainingRegular security training, phishing exercises, and compliance awarenessNote: 93% of successful breaches begin with phishingSecure RequirementsPlanning phase to define and continuously update security requirements based on functionality and GRC expectationsSecure DesignArchitectural phase to establish secure requirementsSelecting appropriate secure design principles and patternsSecure BuildImplementation phase focused on building secure systemsUsing standardized, repeatable componentsApplying Static Application Security Testing (SAST)Secure DeploymentEnsuring security and integrity during the deployment processEmphasizing automation and protecting sensitive data (passwords, tokens)Secure ValidationValidating artifacts through security testing such as:Dynamic Application Security Testing (DAST), fuzzing, penetration testingSecure ResponseOperations and maintenanceExecuting the incident response planActive monitoring and responding to threats to maintain Confidentiality, Integrity, and Availability (CIA)Collaborative ModelAn approach used to solve security issues in enterprise or distributed environmentsInvolves collaboration among development, security, QA, and operationsSecure SDLC Snapshot & Performance ViewBottom → Top:Shows investment and performance (proactive approach)Top → Bottom:Shows remediation cost (reactive approach)Risk Management & Threat Analysis Impact StudyThreats:Possible dangers (intentional or accidental) like hacking, natural disasters, phishing, password theft, shoulder surfing, and email malwareSecurity Incidents:Events where information assets are accessed, modified, or lost without authorizationVulnerabilities:Weaknesses that threats may exploitImpact:Outcome of threats and incidentsRisk Analysis & Scoring (NIST Representation)Risk = Likelihood × ImpactLikelihood depends on:Threats, incident history, ease of discovery, and ease of exploitImpact includes:Technical Impact: Loss of confidentiality, integrity, availability, accountabilityBusiness Impact: Financial loss, reputation damage, non-compliance, privacy violationsExample:Stored XSS = higher likelihood & higher impactReflected XSS = lower likelihood & moderate impactTaxonomy of an IncidentClassification includes:AttackersTools usedVulnerabilities targetedActions performedUnauthorized impact (information disclosure, DoS, manipulation)Objectives (financial gain, challenge, disruption)You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more13minPlay
November 14, 2025Course 6 - Network Traffic Analysis for Incident Response | Episode 7: Network Data Analysis Toolkit: Tools, Techniques and Threat SignatureIn this lesson, you’ll learn about: The complete toolkit and techniques for analyzing network traffic using Connection Analysis, Statistical Analysis, and Event-Based (signature-focused) Analysis. 1. Data Analysis Toolkit General-Purpose Tools These are foundational command-line utilities used to search, filter, and reshape data:grep → pattern searchingawk → field extraction and manipulationcut → selecting specific columnsUsed together, they form powerful pipelines for rapid, custom analysis.Scripting Languages PythonMost important language for packet analysis.Scapy allows:Parsing PCAPsInspecting packet structureAccessing fields (IP, ports)Filtering traffic (e.g., HTTP GET requests)Deobfuscating malware trafficExample: Extracting useful strings from compressed Ghostrat C2 payloads.RUseful for statistical modeling and clustering of network data.Specialized ToolsNetstat → enumerates active connectionsSilk → large-scale flow analysis (CERT tool)Yara → rule-based threat matching (binary/text patterns)Snort → signature-based intrusion detection2. The Three Core Data Analysis Techniques A. Connection Analysis Purpose: High-level visibility into which systems are connecting to which. Ideal for:Detecting unauthorized servers or suspicious programsSpotting lateral movement (e.g., odd SSH usage)Identifying database misuseEnsuring compliance across security zonesPrimary Tool: NetstatShows all active connections + states(LISTENING, ESTABLISHED, TIME_WAIT, etc.)Example Uses:Spotting malware opening a hidden portIdentifying unauthorized remote accessFinding systems connecting to suspicious IPsB. Statistical Analysis A macro-level technique designed to spot deviations from normal behavior. Techniques: 1. Clustering Group similar traffic together to identify families or variants.Demonstrated by clustering Ghostrat variants through similarities in their C2 protocol.2. Stack Counting Sort traffic by count of activity on:Destination portsHost connectionsPacket typesUsed to find anomalies:Single visits to rare ports (2266, 3333)Unexpected FTP traffic (port 21)3. Wireshark Statistics Using built-in metrics:Packet lengths (large packets → possible exfiltration or malware downloads)EndpointsProtocol hierarchySpecialized Tool: SilkDesigned for massive enterprise networksSupports both command line & Python (Pysilk)Ideal for flow-level analysis, anomaly detection, and trend discovery.C. Event-Based Analysis (Signature Focused) A micro-level technique used to identify known threats via rules and signatures. 1. Yara SignaturesRules match known binary or text patterns.Example uses:Detecting Ghostrat via identifying strings like "lurk zero" or "v2010"Multi-string matching to detect multi-stage malwareMatching malicious hostnames or indicatorsUsed for:Malware classificationReverse-engineering supportDeep content inspection2. Snort Rules Snort provides concise detection logic for network traffic. Rule Structure Includes:Action (alert, log)Protocol (TCP/UDP)Source/destination + portsOptions (content matches, flags, byte tests)Examples Provided:Detecting Nmap Xmas scans (FIN + PUSH + URG flags)Detecting SMTP credential leakage (plaintext “authentication succeeded” over port 25)Snort highlights:Excellent for IDS/IPSSimple to write and testWidely used in enterprise SOCs3. Practical Demonstrations A. Scapy + Yara Workflow shown:Use Scapy to load and parse PCAPExtract payloadsFeed payloads to YaraDetect Ghostrat, multi-stage malware, or other known threatsThis combination gives both:PCAP-level filteringPayload-level signature inspectionB. Scapy + Snort Two key demonstrations: 1. Automatic Snort Rule GenerationTools like packet_to_snort.py generate draft Snort rules from suspicious packets.2. Packet Manipulation for Rule TestingScapy is used to modify packet captures (e.g., IP address changes)Allows testing Snort signatures under different conditionsHelps ensure rules are stable and do not create false positivesSummary: Combined Defense Strategy Effective network security requires all three techniques working together:TechniquePurposeCatchable ThreatsConnection AnalysisHigh-level visibilityUnauthorized access, lateral movementStatistical AnalysisDetect anomalies and unknown threatsData exfiltration, malware downloadsEvent-Based AnalysisDetect known, signature-based attacksRATs, worms, exploit kitsA mature SOC or network defense operation relies on all three to defend against:Known threatsZero-daysMisconfigurationsInsider activityAdvanced malware campaignsYou can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more13minPlay
November 14, 2025Course 6 - Network Traffic Analysis for Incident Response | Episode 6: Investigating RATs, Worms, Fileless, and Multi-Stage Malware VariantsIn this lesson, you’ll learn about: Advanced Malware Traffic Analysis — how to detect, decode, and investigate RATs, fileless exploits, worms, and multi-stage infections using real network captures. 1. Remote Access Trojans (RATs) WSH RATUses plaintext beaconing for C2 → very easy to identify.Key data exfiltrated in HTTP requests:Unique device IDComputer nameUsername (“admin”)RAT version (often hidden in the User-Agent field)NJRATShows extensive data exfiltration:Windows XP build infoCPU type (Intel Core i7)Username (“Laura”)Contains custom data blocks:Likely a proprietary C2 formatExample: 4-byte value representing payload length (e.g., 16 bytes)2. Fileless Malware (Angler Exploit Kit) DetectionTraffic contains obfuscated script + random literature quotes→ used to evade heuristic scanners.Streams show signs of XOR encoding.Extraction & Deobfuscation Using Network Miner:Extracted files include:A Shockwave Flash file (.swf)Three large application/octet-stream filesXOR decoding reveals:Shellcode +Windows executable (DLL)PurposeShellcode injects the malicious DLL into a running process (e.g., Internet Explorer).Because nothing is written to disk → bypasses traditional antivirus, making network analysis essential.3. Network Worm Behavior WannaCry (SMB Worm)Exploits SMB on port 445 using Eternal-family vulnerabilities.Behavior includes:High-volume IP scanning for vulnerable systemsSMB exploitation setup (NOP sled → shellcode → payload transfer)MyDoom (SMTP Mailer Worm)Attempts spreading via SMTP (port 25).Tries to send spoofed “delivery failed” emails with malicious attachments:e.g., mail.zip → actually .exe hidden using spaces + triple dots.In the demonstration, all spreading attempts were blocked, showing modern protections in action.4. Multi-Stage Malware Infection Tracking Stage 1 — Initial CompromiseSuspicious HTTP request containing Base64 ID.Decodes to an email address (e.g., Reginald/Reggie Cage) → privacy red flag.Download of a malicious Microsoft Word file.Stage 2 — Downloader ActivityTraffic to known malware-downloader domains (e.g., Pony botnet infrastructure).Malware sends detailed victim metadata:GUIDOS build numberIP addressHardware infoStage 3 — Command & ControlMultiple C2 messages observed:Some Base64-encodedMany encrypted → indicating later-stage payloadsStrong evidence that:Word file → downloader (Pony) → secondary malware → possible tertiary stage5. Key Techniques DemonstratedIdentifying IOCs in network capturesDetecting plaintext, encoded, and encrypted C2 protocolsCarving files and reconstructing injected payloadsAnalyzing worm scanning patternsTracking infection chains across multiple malicious componentsYou can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more11minPlay
November 14, 2025Course 6 - Network Traffic Analysis for Incident Response | Episode 5: Scanning, Covert Data Exfiltration, DDoS Attacks and IoT ExploitationIn this lesson, you’ll learn about: Network Threat Analysis — understanding how common attacks and advanced malware appear in real traffic captures, and how to extract intelligence from them. Part 1 — Analysis of Common Network Threats 1. Network Scanning Techniques Attackers scan networks to discover targets, services, and vulnerabilities. Demonstrations cover several scanning styles: SYN / Half-Open ScanSends SYN packets without completing the handshake.Target responses reveal open vs. closed ports.Full Connect ScanCompletes the full TCP three-way handshake.More noticeable but highly accurate.Xmas Tree ScanUses abnormal TCP flags: FIN + PUSH + URG.Leveraged to probe how systems respond to malformed packets.Zombie / Idle ScanUses an unwitting third-party host (“zombie”) to hide attacker identity.Tracks incremental IP ID numbers to infer open ports.Network Worm Scanning (e.g., WannaCry)Worms scan many IPs for a single vulnerable port, such as SMB 445.High-volume, repetitive traffic is a key signature.2. Data Exfiltration (Covert Channels) Focus: understanding how attackers hide stolen data inside legitimate-appearing traffic. Covert SMB ChannelData leaked one byte at a time inside SMB packets.Requires:Reviewing thousands of similar packets,Extracting embedded data,Base64 decoding,Reversing the result,Revealing hidden Morse code.ICMP AbuseAttackers embed data into ICMP type fields, reconstructing files (e.g., a GIF).Difficult to detect because ICMP is normally used for diagnostics, not data transfer.3. Distributed Denial of Service (DDoS) Attacks Explains why DDoS attacks remain common—cheap cloud resources, insecure IoT devices, accessible botnets. Volumetric SYN FloodFloods a port (like HTTP 80) with incomplete handshakes.Exhausts server connection capacity.HTTP FloodSends massive amounts of GET/POST requests.Harder to distinguish from normal traffic.Amplification / Reflection AttacksSmall spoofed request → massive response to victim.Examples:Cargen protocol: 1-byte request → 748-byte response.Memcache: tiny request → multi-megabyte responses from cached data.4. IoT Device Exploitation Demonstration focuses on how attackers compromise weak devices such as DVRs.Many IoT devices use default credentials and insecure services like Telnet.Attack flow typically involves:Logging in via Telnet.Attempting to download malware (e.g., Mirai ELF binary).When automated delivery (TFTP) fails → manually reconstructing binaries using echo.Device joins a botnet and starts scanning other victims.Part 2 — In-Depth Malware Case Studies 1. Remote Access Trojans (RATs)Traffic begins with system information reporting from the infected host.Followed by persistent command-and-control (C2) communication.2. Fileless MalwareMalware runs directly in memory, leaving minimal filesystem artifacts.Often, network traffic is the only complete copy of the payload available.3. Network WormsAutomate scanning and propagation.Look for specific open ports, then exploit and install themselves.4. Multi-Stage MalwareDownloader retrieves multiple malware families.Identifying each stage helps determine full attack scope and remediation steps.Network traffic often reveals multiple URLs, payloads, or C2 servers involved.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more12minPlay
November 14, 2025Course 6 - Network Traffic Analysis for Incident Response | Episode 4: Mapping, Decoding, and Decrypting Network Traffic IntelligenceIn this lesson, you’ll learn about: Intelligence Collection from Network Traffic Captures — focusing on anomalies, attacker behavior, and extracting actionable intelligence. 1. Network Mapping & VisualizationHumans struggle with long lists → visualizing traffic helps you feel the environment.Tools like pcap viz generate maps at different OSI layers:Layer 3 (IP Addresses)Shows which machines talk to each other.Helps detect unusual communication paths.Layer 4 (TCP/UDP Ports)Shows communication between applications.Unusual ports (e.g., 900) may indicate custom or C2 protocols.2. Content Deobfuscation Attackers often hide traffic with simple encodings (not strong encryption).Goal → recover the original content, often a payload or second-stage executable. XOR EncodingCommon in malware traffic.Repeated patterns in streams (especially when encoding zeros) reveal the key.Example: fixed-length 4-byte key like MLVR.Base64 (B64)Seen in C2 frameworks like Onion Duke.Recognizable by:A–Z, a–z, 0–9, “+”, “/”Ends with “=” paddingEasy to decode using built-in libraries or online tools.3. Credential Capture from Insecure Protocols Focus: credentials leaking in plaintext protocols. Telnet & IMAPSend usernames/passwords in clear text.Easy to extract directly from the TCP stream.SMTPEncodes credentials in Base64 → trivial to decode.Python or online decoders reveal username + password.Reinforces the need for TLS encryption.4. SSL/TLS Decryption in Wireshark Encrypted traffic looks like random “gibberish” unless you have the right keys. Using RSA Private KeysIf the RSA private key is available, Wireshark can decrypt sessions directly.Ephemeral Keys (ECDHE)Cannot be decrypted using the server’s private key.Must capture the session keys using a pre-master secret log file:Often done by setting an SSL key log file environment variable in browsers.Without that log, the sessions are not recoverable.5. Web Proxy Interception (Deep Packet Inspection) Enterprise method for inspecting encrypted HTTPS traffic. How it worksA corporate proxy (e.g., Burp Suite) intercepts connections:Breaks the client → server TLS session.Decrypts → inspects → re-encrypts all traffic.RequirementsClients must install the proxy’s self-signed root certificate.Needed to bypass controls like HSTS.RisksProxy becomes a single high-value target for attackers.Raises privacy concerns, especially when employees do personal browsing (banking, etc.).You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more12minPlay
November 14, 2025Course 6 - Network Traffic Analysis for Incident Response | Episode 3: Wireshark Alternatives: Network Miner, Terminal Shark, and CloudSharkIn this lesson, you’ll learn about:Three powerful alternatives to Wireshark that expand your capabilities in network traffic analysis.How to use Network Miner for passive intelligence, T-shark for automation, and CloudShark for collaborative, web-based analysis.When and why each tool is more effective than Wireshark in specific scenarios.Network Miner — Passive Data Collection & File ExtractionPurpose: A passive network forensics tool excellent for extracting intelligence without actively interfering with traffic.Key CapabilitiesHost Intelligence (Auto-Recon):Automatically breaks traffic down by host.Extracts IP/MAC, hostnames, OS fingerprints (e.g., Red Hat Linux), NIC vendor, open TCP ports, and even web server banners (e.g., Apache 2.0.40).Provides a detailed, Nmap-like overview without performing any active scans.Data Extraction (File Carving):Automatically pulls files transmitted during the capture (images, documents, etc.).Makes recovery of transferred files extremely easy.Credential Extraction:Effective at pulling credentials from clear-text protocols like:SMTP (usernames and passwords when TLS is not used)HTTP cookies (considered credentials because they allow authentication)Traffic Review Tools:Lists DNS queries for browsing activity.Breaks HTTP and SMTP header fields into searchable tables for instant lookup (e.g., search by user agent).Terminal Shark (T-shark) — Command-Line AutomationPurpose: A command-line version of Wireshark designed for automation, scripting, and large-scale analysis.Key CapabilitiesSame Power as Wireshark, but CLI-Based:Uses the same filtering language as Wireshark (e.g., http.request, tcp.port == 80).Ideal for environments without a GUI or for remote analysis over SSH.Automation & Integration:Perfect for batch processing, cron jobs, or running inside scripts.Output can be piped into other tools for threat intel or blacklist checks.Custom Output:Extract specific fields only (e.g., HTTP hostnames, source IPs).Reduces noise and makes threat hunting more efficient.Simple Threat Detection:Analysts can filter important fields and check them against malicious blocklists.Enables lightweight, fast, automated detection workflows.CloudShark — Web-Based Visualization & CollaborationPurpose: A browser-based network analysis platform similar to Wireshark, designed for team collaboration.Key CapabilitiesCollaborative Interface:Apply filters just like in Wireshark.Add comments/annotations directly to packets for team-based investigations.Advanced Visualization Tools:Traffic-over-time graph: Helps analysts zoom into sudden spikes or suspicious bursts.Ladder diagrams: Show packet flow between hosts — extremely useful for understanding sequences like handshakes or attack chains.Bytes-over-time visualization: Helps detect anomalies such as large outbound data spikes (e.g., from SQL injection exfiltration).Interoperability:Upload PCAPs to CloudShark for analysis.Download them again (with or without comments) to continue work in Wireshark.Works as a complementary tool rather than a replacement.Key TakeawaysNetwork Miner excels at passive forensics, credential discovery, and file extraction.T-shark is ideal for automation, scripting, and environments without a GUI.CloudShark shines in collaboration, visual analysis, and team-based investigations.Together, these tools form a specialized toolkit—like having precise surgical instruments instead of relying solely on Wireshark’s general-purpose capabilities.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more11minPlay
November 14, 2025Course 6 - Network Traffic Analysis for Incident Response | Episode 2: Wireshark Features and Comprehensive Protocol DissectionIn this lesson, you’ll learn about:Transitioning from theoretical networking concepts to hands-on traffic analysis.Using Wireshark to capture, dissect, filter, and understand live network traffic.Identifying how common protocols appear in real packet captures, including their structure and behavior.Recognizing how different protocols handle communication, reliability, and security.Wireshark: Introduction & Core FeaturesWhat Wireshark Is:A free, GUI-based network traffic analyzer (formerly Ethereal).Supports live packet capture and loading .cap / .pcap files.Key Features Covered:Capture Management:Start live captures with options like promiscuous mode.Load and inspect previously saved capture files.File Handling & Exporting:Merge capture files (if timestamps align).Import packets from hex dumps.Export selected packets or full dissections in text, CSV, JSON, XML.Export TLS session keys for decrypting certain encrypted traffic.UI Navigation:Color-coded packet list (e.g., green = TCP/HTTP, red = errors/retransmissions).Three-pane layout: Packet list → Protocol dissection → Raw hex/ASCII.Analysis Tools:Display filters for precise inspection (e.g., tcp.port == 80).Follow TCP/HTTP Stream to trace entire conversations.Decode As to reinterpret traffic running on uncommon ports.Protocol Dissection: What You’ll See in Wireshark 1. IP (IPv4/IPv6)View IP headers, including TTL (Time To Live) as hop count.Look at IPv6 structures and tunneling protocols such as:6to46in4Learn how IPv6 packets travel across IPv4 networks.2. TCP (Transmission Control Protocol)Understand reliability and session management.Observe:The 3-way handshake: SYN → SYN-ACK → ACKConnection teardown: FIN/FIN-ACK or RSTFlags, sequence numbers, acknowledgments, and retransmissions.3. UDP (User Datagram Protocol)Minimal, fast, connectionless protocol.No handshake, no retransmission.Used in scenarios requiring speed over reliability.4. ICMP (Internet Control Message Protocol)Used for error reporting and diagnostic tools like:Ping (Echo Request/Reply – Type 8/Type 0)TracerouteNote: While essential, ICMP must be carefully controlled on networks.5. ARP (Address Resolution Protocol)Maps IP → MAC inside local networks.Stateless nature allows ARP poisoning, a common man-in-the-middle technique.Higher-Level / Application Protocols in Wireshark 1. DNS (Domain Name System)Seen mostly over UDP.Analyze queries, recursion, multiple responses (A, MX, etc.).2. HTTP (Hypertext Transfer Protocol)Review request lines, headers (User-Agent, Host, URI) and response codes.HTTP is common in analysis due to high traffic volume.Also widely monitored because attackers often misuse it for hidden communications.3. FTP (File Transfer Protocol)A clear-text protocol:Credentials and transfers visible in packet captures.Highlights the need for secure alternatives (FTPS / SFTP).4. IRC (Internet Relay Chat)Simple text-based protocol.Multi-user channels make it useful for automation and remote coordination tools.5. SMTP (Simple Mail Transfer Protocol)Clear-text protocol for sending emails.Username/password often appear in Base64, easily decoded.Typically secured using TLS.6. SSH (Secure Shell)Encrypted remote terminal access.Only early handshake is readable; session content is encrypted by design.Demonstrates why encrypted protocols prevent content inspection.7. TFTP (Trivial File Transfer Protocol)Runs over UDP.Very simple; no authentication.Traffic, including files, appears in clear text.Key TakeawaysYou’ll gain practical experience by capturing, filtering, and interpreting traffic directly in Wireshark.Observing how protocols appear “on the wire” builds intuition for normal vs. abnormal behavior.This hands-on section prepares you for real-world network forensics, troubleshooting, and security analysis in an ethical academic environment.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more13minPlay
FAQs about CyberCode Academy:How many episodes does CyberCode Academy have?The podcast currently has 212 episodes available.