diff --git a/SUMMARY.md b/SUMMARY.md index 81cf4b3d..11058bc7 100644 --- a/SUMMARY.md +++ b/SUMMARY.md @@ -386,7 +386,7 @@ * [Pcaps analysis](forensics/pcaps-analysis/README.md) * [USB Keyboard pcap analysis](forensics/pcaps-analysis/usb-keyboard-pcap-analysis.md) * [DNSCat pcap analysis](forensics/pcaps-analysis/dnscat-exfiltration.md) - * [WireShark tricks](forensics/pcaps-analysis/wireshark-tricks.md) + * [Wireshark tricks](forensics/pcaps-analysis/wireshark-tricks.md) * [Volatility - Examples](forensics/volatility-examples.md) * [Basic Forensics \(ESP\)](forensics/basic-forensics-esp/README.md) * [USB logs analysis](forensics/basic-forensics-esp/usb-logs-analysis.md) diff --git a/forensics/pcaps-analysis/README.md b/forensics/pcaps-analysis/README.md index d2c68a90..039c6046 100644 --- a/forensics/pcaps-analysis/README.md +++ b/forensics/pcaps-analysis/README.md @@ -24,7 +24,11 @@ Inside wireshark you can see different **statistics** that could be useful. Some If you want to **search** for **content** inside the **packets** of the sessions press _CTRL+f_ You can add new layers to the main information bar _\(No., Time, Source...\)_ pressing _right bottom_ and _Edit Column_ -[Some WireShark tricks here.](wireshark-tricks.md) +Practice: [https://www.malware-traffic-analysis.net/](https://www.malware-traffic-analysis.net/) + +_**You can find more Wireshark trick in:**_ + +{% page-ref page="wireshark-tricks.md" %} ## Suricata diff --git a/forensics/pcaps-analysis/wireshark-tricks.md b/forensics/pcaps-analysis/wireshark-tricks.md index 71a595ee..f785105f 100644 --- a/forensics/pcaps-analysis/wireshark-tricks.md +++ b/forensics/pcaps-analysis/wireshark-tricks.md @@ -1,4 +1,4 @@ -# WireShark tricks +# Wireshark tricks ## Decrypting TLS