From the course: Ethical Hacking: Introduction to Ethical Hacking

Unlock the full course today

Join today to access over 23,200 courses taught by industry experts.

Discovering indicators of compromise

Discovering indicators of compromise

- [Instructor] Indicators of compromise or IoCs represents forensic evidence that a cyber threat may have infiltrated a system. In this segment, we'll review some categories of IoCs along with viewing an example using Wireshark. IoCs can be grouped according to the type of indicators the evidence represents. Let's talk about some of the types of IoCs. You might see file-based indicators and these are associated with known malicious files. For instance, a hash, file name or other artifacts, such as email addresses, registry keys, or configuration files. Network-oriented indicators include IP addresses, domain names, or URLs that are related to malicious sites, such as malware or phishing sites. You could also see behavioral indicators. Now, these are signatures related to unusual or suspicious behavior on a system or network, such as excessive network traffic. IoC artifacts enable the security professionals to piece…

Contents