Detecting Keylogger Data Exfiltration Using Wireshark
This video demonstrates how to identify keylogger activity involved in data exfiltration by analyzing network traffic with Wireshark. Learn methods to detect malicious data transfer and enhance your cybersecurity skills.

RedBlue Labs
1.0K views β’ Nov 25, 2024

About this video
In this video we identify keylogger behaviour used in data exfiltration
https://www.redbubble.com/people/RedBlueLabs/shop?asc=u
https://www.malware-traffic-analysis.net/2024/09/17/index.html
0:00-0:41 Intro
0:42-10:32 Whole Process
10:33-13-33 Finding Keylogger Behaviour
https://www.redbubble.com/people/RedBlueLabs/shop?asc=u
https://www.malware-traffic-analysis.net/2024/09/17/index.html
0:00-0:41 Intro
0:42-10:32 Whole Process
10:33-13-33 Finding Keylogger Behaviour
Video Information
Views
1.0K
Likes
20
Duration
13:33
Published
Nov 25, 2024
User Reviews
4.5
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.