π΅οΈ Angler Exploit Kit β PCAP Network Forensics Case Study
This case study presents analysis of a .pcap
file linked to the Angler Exploit Kit.
It simulates a multi-stage exploit chain involving malicious Java archive files and a PE32 payload.
Highlights
- DNS queries and malicious domain resolution
- HTTP patterns showing exploit delivery
- Hash-based file validation via VirusTotal
- Timeline of attack chain
β οΈ Disclaimer: This is an educational scenario, not a real incident.
π About the Report
The report (in Turkish) is structured like an expert forensic analysis document and includes hash tables, threat analysis, and timeline breakdowns. Itβs suitable for:
- Cybersecurity students
- Digital forensics learners
- Incident response training