

PCAP files are in /nsm/sensor_data/securityonion_eth1/dailylogs/ as specified in the training documentationįorensic Challenge 14 – “Weird Python“ (The Honeynet ProjectThe Honeynet Project).VM login credentials are: user/password.4.4 GB PCAP with malware, client- and server side attacks as well as “normal” internet traffic.Hands-on Network Forensics – Training PCAP dataset from FIRST 2015 Network forensics training, challenges and contests. Shadowbrokers PCAPs by Eric Conrad, including ETERNALBLUE and ETERNALROMANCE. PCAP download available for analyzed sites. Online client honeypot for sharing, browsing and analyzing web-based malware. Malware samples can be uploaded or searched, PCAP files from sandbox execution can be downloaded. see original source (password protected zip) and analysis writeup (text)įree malware analysis sandbox. Regin malware PCAP files, created by (see his blog post) Stratosphere IPS – PCAP and Argus datasets with malware traffic, created by Sebastian Garcia ( at the ATG group of the Czech Technical University GTISK PANDA Malrec – PCAP files from malware samples run in PANDA, created by and GTISK Malware analysis blog that shares malware as well as PCAP files

FREE PCAP FILES FOR WIRESHARK TRAINING PASSWORD
WARNING: The password protected zip files contain real malware Captured malware traffic from honeypots, sandboxes or real world intrusions.Ĭontagio Malware Dump: Collection of PCAP files categorized as APT, Crime or Metasplot
