PodParley PodParley
Course 6 - Network Traffic Analysis for Incident Response | Episode 4: Mapping, Decoding, and Decrypting Network Traffic Intelligence

EPISODE · Nov 14, 2025 · 11 MIN

Course 6 - Network Traffic Analysis for Incident Response | Episode 4: Mapping, Decoding, and Decrypting Network Traffic Intelligence

from CyberCode Academy · host CyberCode Academy

In this lesson, you’ll learn about: Intelligence Collection from Network Traffic Captures — focusing on anomalies, attacker behavior, and extracting actionable intelligence. 1. Network Mapping & VisualizationHumans struggle with long lists → visualizing traffic helps you feel the environment.Tools like pcap viz generate maps at different OSI layers:Layer 3 (IP Addresses)Shows which machines talk to each other.Helps detect unusual communication paths.Layer 4 (TCP/UDP Ports)Shows communication between applications.Unusual ports (e.g., 900) may indicate custom or C2 protocols.2. Content Deobfuscation Attackers often hide traffic with simple encodings (not strong encryption).Goal → recover the original content, often a payload or second-stage executable. XOR EncodingCommon in malware traffic.Repeated patterns in streams (especially when encoding zeros) reveal the key.Example: fixed-length 4-byte key like MLVR.Base64 (B64)Seen in C2 frameworks like Onion Duke.Recognizable by:A–Z, a–z, 0–9, “+”, “/”Ends with “=” paddingEasy to decode using built-in libraries or online tools.3. Credential Capture from Insecure Protocols Focus: credentials leaking in plaintext protocols. Telnet & IMAPSend usernames/passwords in clear text.Easy to extract directly from the TCP stream.SMTPEncodes credentials in Base64 → trivial to decode.Python or online decoders reveal username + password.Reinforces the need for TLS encryption.4. SSL/TLS Decryption in Wireshark Encrypted traffic looks like random “gibberish” unless you have the right keys. Using RSA Private KeysIf the RSA private key is available, Wireshark can decrypt sessions directly.Ephemeral Keys (ECDHE)Cannot be decrypted using the server’s private key.Must capture the session keys using a pre-master secret log file:Often done by setting an SSL key log file environment variable in browsers.Without that log, the sessions are not recoverable.5. Web Proxy Interception (Deep Packet Inspection) Enterprise method for inspecting encrypted HTTPS traffic. How it worksA corporate proxy (e.g., Burp Suite) intercepts connections:Breaks the client → server TLS session.Decrypts → inspects → re-encrypts all traffic.RequirementsClients must install the proxy’s self-signed root certificate.Needed to bypass controls like HSTS.RisksProxy becomes a single high-value target for attackers.Raises privacy concerns, especially when employees do personal browsing (banking, etc.).You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy

NOW PLAYING

Course 6 - Network Traffic Analysis for Incident Response | Episode 4: Mapping, Decoding, and Decrypting Network Traffic Intelligence

0:00 11:52

No transcript for this episode yet

We transcribe on demand. Request one and we'll notify you when it's ready — usually under 10 minutes.

Simple Marketing Academy - by Fox Social Media Jill W. Fox & Tanner J. Fox Welcome to Simple Marketing Academy, where entrepreneurs & small business owners learn how to successfully market their businesses in a simple and inexpensive way, in order to reach more of their ideal customers & increase their sales! South West London Vineyard Church South West London Vineyard South West London Vineyard is a Christian church that meets in Putney. The church started with a small group of people in 1987 who wanted to see how following Jesus could make a difference, not only to their lives, but also to the lives of the people in the city around them.Sundays from 10:30-12pm at Ark, Putney, Academy, Pullman Gardens, London, SW15 3DG. You'd be really welcome. Leading With Purpose Nathan R Mitchell: Increase your self-awareness, lead to your full potential, & achieve more in less time with the Leading with Purpose - Empowering Talk Radio Podcast | Inspired by Tony Robbins, Simon Sinek, Daniel Pink, Seth Godin, Brendon Burchard, Bob INCREASE YOUR SELF-AWARENESS | LEAD TO YOUR POTENTIAL | ACHIEVE MORE IN LESS TIME: Let America's Leading Empowerment Coach, Founder of Clutch Consulting, LPX Academy, and Certified Member of The John Maxwell Team, Nathan R Mitchell, empower you to increase your self-awareness, lead to your full potential, and achieve more in less time. Drawing upon inspiration from Tony Robbins, Simon Sinek, Daniel Pink, Seth Godin, Bob Burg, John Maxwell, Brendon Burchard and others, on each episode of Leading With Purpose – Empowering Talk Radio, Nathan interviews top coaches, speakers, business owners, authors, and other experts to provide leaders and achievers with the information they need to get from where they are now to where they desire to be. Past guests have included Brian Smith - Founder of UGG Shoes, Lisa Nichols of Motivating the Masses, Lee Milteer, Dr. Josh Davis, Ben Gay III, Eric Lofholm, and many others. Beyond The Basics Health Academy Podcast Dr. Meaghan Kirschling Are you looking for practical, holistic, real-life solutions for healthier living? Join Dr. Meaghan Kirschling for real life education as she discusses and explores topics that affect everyday living. Dr. Meaghan brings in expert guests for a lively discussion about nutrition, supplements, holistic health, integrative medicine, and the latest research on a variety of topics. Join the Academy for the University of You!
URL copied to clipboard!